<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A distributed cyber-security framework for heterogeneous environments</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Raffaele Bolla</string-name>
          <email>raffaele.bolla@unige.it</email>
          <xref ref-type="aff" rid="aff2">2</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Paolo M. Comi</string-name>
          <email>paolomaria.comi@italtel.com</email>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Matteo Repetto</string-name>
          <email>matteo.repetto@cnit.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>CNIT - Research Unit of Genoa</institution>
          ,
          <addr-line>Genoa</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Italtel SpA</institution>
          ,
          <addr-line>Settimo Milanese (MI)</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>University of Genoa Genoa</institution>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Evolving business models, computing paradigms, and management practices are rapidly re-shaping the usage models of ICT infrastructures, and demanding for more flexibility and dynamicity in enterprise security, beyond the traditional “security perimeter” approach. Since valuable ICT assets cannot be easily enclosed within a trusted physical sandbox any more, there is an increasing need for a new generation of pervasive and capillary cybersecurity paradigms over distributed and geographically-scattered systems. Following the generalized trend towards virtualization, automation, software-definition, and hardware/software disaggregation, in this paper we elaborate on a multi-tier architecture made of a common, programmable, and pervasive data-plane and a powerful set of multi-vendor detection and analysis algorithms. Our approach leverages the growing level of programmability of ICT infrastructures to create a common and unified framework that could be used to monitor and protect distributed heterogeneous environments, including legacy enterprise networks, IoT installations, and virtual resources deployed in the cloud.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>Introduction</title>
      <p>
        • externalization and offloading: the cloud and similar facilities host sensitive processes and
data in third parties infrastructures, even shared with other customers;
• multiplicity and heterogeneity of domains : sensors, actuators, and other things in harsh
environments with limited processing capabilities are more exposed to compromise than
other IT assets in enterprise networks; for instance, recent botnets like Mirai, Brickerbot,
and Hajime have demonstrated the vulnerability of IoT as well as the possibility to exploit
compromised devices to carry out large DDoS attacks (1 Tb/s and above) [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ];
• personal and mobile devices: bringing personal devices as smartphones, tablets, and
removable media at work (Bring Your Own Device, BYOD) is already a major trend in
organizations [
        <xref ref-type="bibr" rid="ref17">17</xref>
        ];
• Inflexible defense: DDoS and high rates of traffic often turn into either failing open
(allowing traffic to pass without inspection to maintain availability), or failing closed
(blocking all traffic to maintain security but causing business disruption).
      </p>
      <p>Since valuable assets cannot anymore be kept inside a trusted physical sandbox, there is an
increasing need for new forms of pervasive and capillary control techniques to tackle network
threats, which are able to correlate events in both time and space dimensions, provide timely
operational information to feed novel disruptive approaches capable of estimating the risk in
real-time, and carry out focused and effective defensive and mitigation actions. Current
cybersecurity technologies suffer from important limitations, which make them less effective in the
evolving scenario, especially against recent complex multi-vector attacks:
• intrinsic rigidity, due to the difficult to change architecture and system configuration:
network partitioning, deployment of hardware or software security appliances (including
the necessary agents), routing and switching policies;
• substantial inefficiency, because a) network traffic is often bounced across different
appliances for analysis, inspection, mitigation, and processing, hence wasting bandwidth and
increasing latency; b) similar or the same operations are carried out by different appliances
(e.g., packet and software inspection, log analysis), which often are not interoperable;
• narrow scope, since most appliances usually deal with specific aspects only (e.g.,
firewalling, antivirus, event and log management, intrusion, deny of service) and consider a
restricted set of events and devices;
• processing overhead to analyze packets, software, behavior, events, and logs, which
eventually slows down systems and may be unsustainable by simplest devices (smartphones,
IoT);
• outdated models: the presence of personal and mobile devices, the broad availability of
removable media, the pervasive coverage of public wireless networks, interconnection to
IoT devices, and externalization and offloading of processing/storage are the main factors
that, especially when combined together, are increasingly opening new breaches in the
security perimeter, making it an ineffective and obsolete concept.</p>
      <p>In this paper, we envision a new paradigm for managing cyber-security threats in
heterogeneous environments. Our approach aims at fostering the transition from multiple independent
security appliances to a common framework, leveraging the increasing level of programmability
of ICT infrastructures. We describe a multi-tier architecture (Fig. 1) that decouples a pervasive
and shared context fabric from centralized business logic; the former is responsible to monitor
the environment and to enforce security actions in a capillary way, whereas the latter collects
detection and mitigation algorithms that are usually provided by different security appliances.
A comprehensive presentation layer will facilitate the interaction with users and other security
systems. Our architecture also includes specific elements for collection and secure conservation
of forensic information for future investigation and possible use as evidence in court, since
compliance to relevant normative will be ever more part of the design of cyber-security systems in
the next future.</p>
      <p>The paper is organized as follows. Section 2 briefly reviews current approaches and trends in
distributed security monitoring. In Section 3 we outline the main concept behind our approach
and describe the overall framework. In Section 4 we discuss the architecture design and the main
components we are going to use for realizing our framework. Finally, we give our conclusions
and describe future work in Section 5.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Related work</title>
      <p>
        With the increasing uptake of cloud and IoT technologies, micro-firewalls and distributed
firewalls are emerging to protect isolated or virtual resources outside of the enterprise perimeter
[
        <xref ref-type="bibr" rid="ref20">20</xref>
        ].
      </p>
      <p>
        Threat identification by exploiting network programmability has already been investigated
by several research papers (e.g., [
        <xref ref-type="bibr" rid="ref21 ref27">27, 21</xref>
        ]. Several tools are already available that collects flow
statistic from network devices through protocols as SMTP, NetFlow, sFlow, IPFIX, and, more
recently, OpenFlow [
        <xref ref-type="bibr" rid="ref23">23</xref>
        ].
      </p>
      <p>We observe a generalized trend from centralized standalone security boxes to more
distributed frameworks, though programmability of networks is still partially exploited and unified
control and management is missing.</p>
    </sec>
    <sec id="sec-3">
      <title>3 A Distributed Framework for Identification of Network</title>
    </sec>
    <sec id="sec-4">
      <title>Threats</title>
      <p>The underpinning concept of our approach is a transition from multiple independent security
appliances to a common framework, where cyber-security is managed in a coordinated way, as
shown in Fig. 1. Our purpose is to exploit and improve available interfaces and protocols for
programmable communication infrastructures, hence our work will focus on network threats.
In this context, the main challenge is to build the necessary knowledge and awareness both in
physical and virtual environments, by real-time collection of massive events from a multiplicity
of capillary sources, their inter- and intra-domain correlation in space and time, and the
applianodfSfi-nelicvnueesretaignreaaplyossiistory
tion
for</p>
      <p>V
manisaugaelmiseantiton,
reamnemadolSiyanyttsiiitctooesnrm,ian-nwgd,ide</p>
      <p>LAN</p>
      <sec id="sec-4-1">
        <title>Lopcraolcessing</title>
      </sec>
      <sec id="sec-4-2">
        <title>Lopcraolcessing</title>
        <p>LAN
!</p>
        <sec id="sec-4-2-1">
          <title>Internet</title>
        </sec>
      </sec>
      <sec id="sec-4-3">
        <title>Lopcraolcessing</title>
        <p>IoT
Server
VM VM VM</p>
      </sec>
      <sec id="sec-4-4">
        <title>Lopcraolcessing</title>
        <sec id="sec-4-4-1">
          <title>Cloud</title>
          <p>Presentation
cation of remediation actions, while maintaining essential properties such as forwarding speed,
scalability, autonomy, usability, fault tolerance, resistance to compromises, and responsiveness.</p>
          <p>Fig. 2 pictorially depicts the reference scenario and the structure for a novel multi-layer
lawful-compliant cyber-security framework over large, distributed, and even virtualized
environments. It drives beyond the legacy “security perimeter” concept by building on pervasive
and capillarity programmability of the communication infrastructure. The framework is
organized in three logical layers: context fabric, business logic, and presentation. The picture also
shows the logical components, together with their main implications and tasks at each layer.</p>
          <p>The context fabric entails a rich set of traffic filtering, packet inspection, processing (and,
likely, storage) functions that are delegated to specific (physical or virtual) networking devices
for performance and privacy matters. In our vision, such functions will no more rely on
dedicated hardware appliances or virtual software functions; rather, the ambition is to shape the
network behavior by building on the growing availability of flexible and programmable data
planes and acceleration features. The business logic combines and correlates local information
from multiple monitoring points, in the same or different domains, and builds system-wide
situational awareness that allows to promptly detect and predict multi-vector and interdisciplinary
cyber-attacks. Knowledge created at this level is presented to users for awareness and for
identification of remediation and mitigation actions; it can then be shared with other administrative
domains to coordinate response to new threats and attacks. In this layer, storage of data with
legal validity is essential for off-line analysis and cyber-crime investigation. Finally,
presentation of the processed information, events, and knowledge to humans provides knowledge of
vulnerabilities, threats, anomalies, and attacks, so that countermeasures can be taken manually
...</p>
          <p>Local
controller</p>
          <p>Management</p>
          <p>plane
Orchestration</p>
          <p>plane
Computing
plane
Control
plane
Data
source
...</p>
          <p>Data
source</p>
          <p>Filtering, Filtering,
inspection, ... inspection,
processing processing
pinFrsoiplcteeercsitnsioignn,g, ... pinFrsoiplcteeercsitnsioignn,g, pDlaantea
Information workflow</p>
          <p>Control, processing, and management architecture
or automatically; in addition, log and proof of suspicious events are to be collected and should
allow backtrace of activity in relevant domains.</p>
          <p>Our design considers the duality and synergy between the information workflow and the
control, processing and management architecture, as shown in Fig. 3. On the one hand, the
information workflow better explains the logical processing flow. Local tasks (to be delegated
to data sources) collect and aggregate data, and filter and process packets; identification
algorithms (deep data analysis and correlation) build system-wide knowledge and situational
awareness; data representation stores and visualize information for humans, and allows system
administrators to identify possible remediation and mitigation actions. On the other hand, the
control, processing, and management architecture shows the architectural elements and the
orchestration functions. Due to its complexity, the architecture is further split into several logical
planes: data, control, computing, orchestration, and management.
3.1</p>
          <p>Context Fabric
The context fabric is responsible for collecting and aggregating information that is relevant for
threat identification, as well as for classification, filtering, and processing of network packets.
Data, events, and security logs must be collected capillary within the system, from
heterogeneous sources in networking and computing devices.</p>
          <p>
            The context fabric runs lightweight tasks in local networking devices. It leverages the
growing level of programmability of networking infrastructures, which enable to push much
more intelligence to network devices, well beyond the flow-level reporting already available
today for anomaly detection (e.g., NetFlow, sFlow, IPFIX). In addition, emerging architectures
and paradigms known as fog computing [
            <xref ref-type="bibr" rid="ref14 ref24">24, 14</xref>
            ] can be used to delegate processing tasks to a
broader range of devices.
          </p>
          <p>
            The architecture of the context fabric is organized in two planes (see Fig. 3). At the data
plane, lightweight filtering and inspection tasks handle packets without putting significant stress
to the computing resources needed. Our interest is not only limited to flow programmability
(e.g., OpenFlow [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ], NetConf [
            <xref ref-type="bibr" rid="ref13">13</xref>
            ]), but it also extends to hardware and software acceleration
frameworks for fast packet processing (e.g., Intel DPDK [
            <xref ref-type="bibr" rid="ref4">4</xref>
            ], FD.io [
            <xref ref-type="bibr" rid="ref5">5</xref>
            ], Snabb switch [
            <xref ref-type="bibr" rid="ref10">10</xref>
            ],
IOVisor [
            <xref ref-type="bibr" rid="ref6">6</xref>
            ], BESS [
            <xref ref-type="bibr" rid="ref2">2</xref>
            ]) that create fast paths inside switching and routing devices, including
virtual functions in hypervisors.
          </p>
          <p>
            At the control plane, the need is the ability to discover, configure, and manage local
heterogeneous resources. The purpose is to build a common and uniform abstraction of the underlying
data planes, by extending existing protocols and interfaces (e.g., OpenFlow [
            <xref ref-type="bibr" rid="ref11">11</xref>
            ], Netconf/Yang
[
            <xref ref-type="bibr" rid="ref13">13</xref>
            ], P4 [
            <xref ref-type="bibr" rid="ref15 ref9">9, 15</xref>
            ], RestConf [
            <xref ref-type="bibr" rid="ref12">12</xref>
            ]), while avoiding to overwhelm the network with excessive
overhead. Access control is expected to provide fine-grained policies for data access, usage, and
storage. This includes the capability of programming the underlying network layer, which may
lead to serious security concerns if carried out in an uncontrolled and untrusted way.
          </p>
          <p>One of the main limitation of existing technologies is that only simple data plane programs
are allowed, i.e., without support for complex programs created according to the split
data/control plane paradigm as originally proposed with SDN/OpenFlow. The challenges are therefore
i) to support more powerful programs, which can operate according to the split data/control
plane paradigm; ii) to support more powerful actions on the data in transit, which enable to
implement some proactive security actions (e.g., drop network traffic, modify packet information,
craft ad-hoc packets for specific purposes) that go beyond simple monitoring.
3.2</p>
          <p>Business Logic
The main task of the business logic layer is to extract knowledge from the multiplicity and
heterogeneity of data collected by the context fabric. The challenge is the definition of innovative
algorithms that define which metrics are needed for each monitored point and correlate them
in both time and space dimensions. Such analysis could be based on Attack Graphs, Attack
Surface analysis, Kill Chain definitions and Attack trees models with the support of the deep
learning techniques, Petri nets, and strategic models such as Stackelberg leadership model,
Artificial Neural Networks.</p>
          <p>The definition of algorithms for threat and anomaly detection should consider big data and
machine learning capabilities to add predictive and proactive capabilities to existing security
tools and systems. Multi-domain analysis and correlation of capillary data allows to promptly
detect and predict multi-vector and interdisciplinary cyber-attacks, and to build wide awareness
and coordinated response to new threats and attacks. The framework should also account for
relevant events and data to be stored as evidence in case of suspicious activity, in order to be
used as evidence in case of forensics investigation.</p>
          <p>Processing and analysis of network traffic flows can reveal personal data, secrets,
intellectual properties, habits, behaviors, etc., hence harming fundamental rights of organizations and
humans. Regulation (EU) 2016/679 of the European Parliament and of the Council of 27 April
2016 on the protection of natural persons with regard to the processing of personal data and
on the free movement of such data is going to revolutionize the privacy landscape in all
European Countries. It is of paramount importance that all data gathered in any cyber-security
monitoring framework will be compliant with said Privacy Regulation. In addition, there are
specific requirements for legal validity of logs and events in court.</p>
          <p>Data protection should consider anonymization and pseudonymization techniques that can
hide the identify and the behavior of systems and users outside criminal investigations. Legal
validity of the extracted data to be used in case of forensics investigation should be tackled, by
considering technologies and mechanisms to protect the integrity, origin, and trustworthiness
of data (e.g., digital signing, timestamping, message integrity codes, one-way encryption, )
according to the requirements and guidelines settled by normative frameworks.
3.3</p>
          <p>Presentation
Risks, vulnerabilities, on-going attacks, and threats must be depicted to organizations and
their security staff in the appropriate manner to support timely and effective reaction to
cybersecurity threats, by settling proper remediation and mitigation actions.</p>
          <p>At the management plane (see Fig. 3), visualization solutions may rely on multi-layer
software architectures and REST-based APIs for accessing threats and attacks database by multiple
devices, flexible graphical layouts defined by templates and style-sheets to adapt the
representation to heterogeneous devices and platforms, event-driven publish/subscription mechanisms for
real-time notification of threats, anomalies, and attacks. The interface should also provide the
ability to trigger pre-defined remediation actions, as well as to define new ones as new threats
are identified. The capability to automate response allows faster mitigation for well-known
attacks.</p>
          <p>Managing the underlying infrastructure and adapting it to the evolving scenario is perhaps
the most challenging issue for the whole framework. The orchestration plane is responsible
for deploying and coordinating the hardware/software components over a mix of pervasive
resources. The purpose is to understand which tasks should be offloaded and which tasks
must be performed centrally. To this end, the target is to run detection algorithms and the
business logic on high-performance, reliable, and protected infrastructures (e.g., private cloud
installations), while offloading monitoring, inspection, and filtering tasks to local resources. In
case of offloading, the orchestrator is responsible to select the proper resource (e.g., hardware
switch or virtual switch in hypervisor) according to specific requirement and constraints by the
algorithms (e.g., inspect incoming traffic, monitor traffic sent by host X, etc.).
4</p>
        </sec>
      </sec>
    </sec>
    <sec id="sec-5">
      <title>Platform Design</title>
      <p>Starting from the main concept and the conceptual architecture devised in Section 3, we have
already derived the preliminary platform design shown in Fig. 4. It entails a number of functional
elements that are necessary to implement the whole framework.</p>
      <p>
        The programmable switch is responsible for traffic inspection and simple analysis, hence
implementing the data plane of the context fabric. It will carry out filtering and processing
operations by hardware or software acceleration mechanisms. Data, events, and measurements
extracted will undergo a certification process to produce trusted information for forensics and
lawful investigation. The switch will offer both a programming interface to configure filtering
rules and offload simple tasks, as well as a data publication interface to export collected
information to the controller (control plane of the context fabric). The switch will be an enhanced
version of existing SDN devices; Open vSwitch [
        <xref ref-type="bibr" rid="ref7">7</xref>
        ] and Quake (user-space switch part of the
OpenVolcano suite [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ]) are two alternatives that will be considered in the implementation.
OpenFlow [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ] will likely be used as protocol interface between the controller and the switch,
but we will also consider the applicability and appropriateness of NetConf [
        <xref ref-type="bibr" rid="ref13">13</xref>
        ]. Our target is
a modular software implementation, which could be used in hypervisors and easily combined
with software/hardware acceleration frameworks.
      </p>
      <p>The controller translates (or “compiles”) technology agnostic programs and configurations
(Northbound interface) into specific SDN protocols (Southbound interface). A similar
operation is performed in the opposite direction for data, events, and measurements. The controller
is responsible for all switches in a domain or subdomain: it manages network topology, recovers
Human
interface</p>
      <p>Data visualisation
Method modelling
Decision support</p>
      <p>Intent framework</p>
      <p>Data harmonisation
Detection algorithm
Distributed computing
framework</p>
      <p>Orchestration
Northbound interface</p>
      <p>Orchestrator</p>
      <p>Legal repository</p>
      <p>Secure storage</p>
      <p>Controller
Compiler</p>
      <p>Data aggregation
and anonimisation</p>
      <p>Southbound interface
Programming
interface</p>
      <p>Local filtering
and processing
Hw acceleration</p>
      <p>Sw acceleration
Data publication
Data certification</p>
      <p>
        Programmable
switch
from errors, collect data and measurements; in our architecture, it will also be responsible for
data aggregation and anonymization. Anonymization is required to use data and measurements
outside of legal investigation for threat identification without breaking confidentiality and
privacy. The RestConf [
        <xref ref-type="bibr" rid="ref12">12</xref>
        ] protocols already provides a descriptive semantics for describing the
network behavior, but it may be unsuitable for task offloading and complex filtering rules;
we will look for existing or new alternatives. OpenDayLight [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ], a modular SDN platform,
and Magma, SDN controller part of the OpenVolcano suite [
        <xref ref-type="bibr" rid="ref16">16</xref>
        ], will be considered as base
technologies to implement the controller.
      </p>
      <p>
        The orchestrator is the smarter engine of the whole platform. It includes abstractions and
models to split detection algorithms and mitigation policies in centralized and distributed
computing tasks; centralized tasks perform data correlations and analysis, whereas distributed tasks
are responsible for filtering, deep packet inspection, simple local processing. The distribution
of tasks between the cloud and local devices is very similar to fog computing, hence we will
consider recent concepts in this field, such as [
        <xref ref-type="bibr" rid="ref18 ref26">18, 26</xref>
        ]. A specific task for the orchestrator is
automation and abstraction of the underlying infrastructure configuration starting from high-level
policies; in this respect, an “intent framework” is envisaged to translate high-level description
of monitoring and analysis information into specific instructions; this can be viewed as special
application of the Network-as-a-Service paradigm to Monitoring/Inspection-as-a-Service [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ].
Finally, data harmonization is necessary to provide common formats and syntax for storage of
data coming from different domains and (possible) different controllers.
      </p>
      <p>
        The legal repository will be responsible for secure and trusted storage of data, information,
and events for successive lawful investigation. Key features in this case is trustworthiness,
availability, integrity, resilience, resistance to attacks, and scalability, in order to prevent alteration
or losses of data in case of attack. The repository will be an innovative storage infrastructure
specifically designed and implemented to comply with requirements for lawful applications. We
target design and implementation of a storage system suitable for preserving data with
innovative reliability, security, availability, and scalability features inherited by existing virtual file
systems for distributed storage of information (e.g., Ceph [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] or Hadoop [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]), through splitting
of sensitive information among different storage facilities.
      </p>
      <p>The human interface is the visualization tools to draw the current cyber-security picture
and to enable quick and intuitive response to attacks. It will correlate attacks and threats with
the actual network topology, suggest remediation and countermeasures, and enable definition
of custom reaction strategies in case of new and unknown threats. Our human interface will be
developed to explicitly address interaction with management of distributed resources.
5</p>
    </sec>
    <sec id="sec-6">
      <title>Conclusions</title>
      <p>In this paper, we have described our concept about a new cyber-security paradigm beyond the
security perimeter model. Our work leverages programmable communication infrastructures
and focus on network threats, but we think it could be easily extended to a broader scope
(including monitoring of application events and system calls) once the first protocols for fog
computing will be available.</p>
      <p>We have already carried out preliminary design and identification of functional components
for the whole framework. We have already gathered complementary skills and expertise in a
research consortium and we are going to start the envisaged research and implementation work
in the next months.
6</p>
    </sec>
    <sec id="sec-7">
      <title>Acknowledgments</title>
      <p>The authors would like to thanks other people who contributed to the discussion and the
preparation of the SAMOA proposal: Joanna Kolodziej (Cracow University of Technology),
Flora Strohmeier (Synyo Gmbh), Olaf Gebauer (Ostfalia University), Stefano Mele (Carnelutti
Law Firm).</p>
      <p>This work was supported in part by the European Commission, under project Matilda (grant
no. 761898).</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Apache</surname>
            <given-names>hadoop.</given-names>
          </string-name>
          [online]. Available at https://hadoop.apache.org, last visited in
          <source>Sep</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <article-title>[2] Berkeley extensible software switch (BESS)</article-title>
          . [online]. Available at http://span.cs.berkeley.edu/ bess.html, last visited in
          <source>Aug</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          <article-title>[3] Ceph - the future of storage</article-title>
          . [online]. Available at http://ceph.com, last visited in
          <source>Sep</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <article-title>[4] DPDK - data plane development kit</article-title>
          . [online]. Available at http://dpdk.org, last visited in
          <source>Aug</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <article-title>[5] Fd.io - the fast data project</article-title>
          . [online]. Available at https://fd.io, last visited in
          <source>Aug</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <article-title>[6] IOVisor project - advancing in-kernel io virtualization by enabling programmable data planes with extensibility, flexibility, and high-performance. [online]</article-title>
          . Available at https://www.iovisor.org, last visited in
          <source>Aug</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          <article-title>[7] Open vswitch (OVS)</article-title>
          . [online]. Available at http://openvswitch.org,
          <source>last visited on Aug</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          <article-title>[8] OpenDayLight - open source SDN platform</article-title>
          . [online]. Available at https://www.opendaylight. org,
          <source>last visited on Sep</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          <article-title>[9] P4 - programming protocol-independent packet processors</article-title>
          . [online]. Available at http://p4.org, last visited in
          <source>Aug</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <article-title>Snabb - simple and fast packet networking</article-title>
          . [online]. Available at https://github.com/snabbco/ snabb, last visited in
          <source>Aug</source>
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <article-title>OpenFlow switch specification</article-title>
          .
          <source>ONF TS-025, March 2015. Version 1.5.1 (Protocol version 0x06)</source>
          , Available at https : //3vf60mmveq1g8vzn48q2o71a - wpengine.netdna - ssl.com/wp - content/ uploads/2014/10/openflow-switch
          <source>-v1.5</source>
          .1.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>A.</given-names>
            <surname>Bierman</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Bjorklund</surname>
          </string-name>
          , and
          <string-name>
            <given-names>K.</given-names>
            <surname>Watsen</surname>
          </string-name>
          .
          <article-title>RESTCONF protocol</article-title>
          .
          <source>RFC 8040</source>
          ,
          <year>January 2017</year>
          . Available at https://tools.ietf.org/html/rfc8040.
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>M.</given-names>
            <surname>Bjorklund</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Schoenwaelder</surname>
          </string-name>
          ,
          <article-title>and</article-title>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bierman</surname>
          </string-name>
          .
          <article-title>Network configuration protocol (NETCONF)</article-title>
          .
          <source>RFC 6241</source>
          ,
          <year>June 2011</year>
          . Available at https://tools.ietf.org/html/rfc6241.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <given-names>F.</given-names>
            <surname>Bonomi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Milito</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Natarajan</surname>
          </string-name>
          , and
          <string-name>
            <given-names>J.</given-names>
            <surname>Zhu</surname>
          </string-name>
          .
          <article-title>Fog computing: A platform for Internet of Things and analytics</article-title>
          . In N. Bessis and C. Dobre, editors,
          <source>Big Data</source>
          and
          <article-title>Internet of Things: A Roadmap for Smart Environments</article-title>
          .
          <source>Studies in Computational Intelligence</source>
          , volume
          <volume>546</volume>
          , pages
          <fpage>169</fpage>
          -
          <lpage>186</lpage>
          . Springer, Cham,
          <year>2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <given-names>P.</given-names>
            <surname>Bosshart</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Daly</surname>
          </string-name>
          , G. Gibb,
          <string-name>
            <given-names>M.</given-names>
            <surname>Izzard</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>McKeown</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Rexford</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Schlesinger</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Talayco</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Vahdat</surname>
          </string-name>
          , G. Varghese, and
          <string-name>
            <given-names>D.</given-names>
            <surname>Walker</surname>
          </string-name>
          .
          <article-title>P4: Programming protocol-independent packet processors</article-title>
          .
          <source>Computer Communication Review</source>
          ,
          <volume>44</volume>
          (
          <issue>3</issue>
          ):
          <fpage>88</fpage>
          -
          <lpage>95</lpage>
          ,
          <year>July 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <given-names>R.</given-names>
            <surname>Bruschi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Lago</surname>
          </string-name>
          , G. Lamanna,
          <string-name>
            <given-names>C.</given-names>
            <surname>Lombardo</surname>
          </string-name>
          , and
          <string-name>
            <given-names>S.</given-names>
            <surname>Mangialardi</surname>
          </string-name>
          . Openvolcano:
          <article-title>An opensource software platform for fog computing</article-title>
          .
          <source>In 28th International Teletraffic Congress (ITC 28)</source>
          , pages
          <fpage>22</fpage>
          -
          <lpage>27</lpage>
          , Wu¨rzburg, Germany, September,
          <fpage>12th</fpage>
          -
          <lpage>16th</lpage>
          ,
          <year>2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>European</surname>
            <given-names>Cyber-Security</given-names>
          </string-name>
          <string-name>
            <surname>Organisation</surname>
          </string-name>
          .
          <article-title>European cybersecurity Strategic Research and Innovation Agenda (SRIA) for a contractual Public-Private Partnership (cPPP)</article-title>
          . , June 2016. Available at http://www.ecs
          <article-title>-org.eu/documents/ecs-cppp-sria</article-title>
          .pdf.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Huber</surname>
            <given-names>Flores</given-names>
          </string-name>
          , Pan Hui, Sasu Tarkoma,
          <string-name>
            <given-names>Yong</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Satish</given-names>
            <surname>Srirama</surname>
          </string-name>
          , and
          <string-name>
            <given-names>Rajkumar</given-names>
            <surname>Buyya</surname>
          </string-name>
          .
          <article-title>Mobile code offloading: From concept to practice and beyond</article-title>
          .
          <source>IEEE Communications Magazine</source>
          ,
          <volume>53</volume>
          (
          <issue>3</issue>
          ):
          <fpage>80</fpage>
          -
          <lpage>88</lpage>
          ,
          <year>March 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>David</given-names>
            <surname>Holmes</surname>
          </string-name>
          .
          <article-title>DDoS attack trends</article-title>
          .
          <source>f5 whitepaper</source>
          ,
          <year>November 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>Wade</given-names>
            <surname>Holmes. VMware NSX</surname>
          </string-name>
          micro-segmentation. Vmware press.
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Hiroyuki</surname>
            <given-names>Kasai</given-names>
          </string-name>
          , Wolfgang Kellerer, and
          <string-name>
            <given-names>Martin</given-names>
            <surname>Kleinsteuber</surname>
          </string-name>
          .
          <article-title>Network volume anomaly detection and identification in large-scale networks based on online time-structured traffic tensor tracking</article-title>
          .
          <source>IEEE Transactions on Network and Service Management</source>
          ,
          <volume>13</volume>
          (
          <issue>3</issue>
          ):
          <fpage>636</fpage>
          -
          <lpage>650</lpage>
          ,
          <year>September 2016</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22] ON.Lab.
          <article-title>Introducing onos - a sdn network operating system for service providers</article-title>
          . Whitepaper,
          <year>November 2014</year>
          . Available at http : //onosproject.org/wp - content/uploads/2014/11/ Whitepaper-ONOS-final.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <article-title>OpenDayLight. Defense4All security SDN application tutorial</article-title>
          . Tutorial,
          <year>Sep 2014</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <given-names>OpenFog</given-names>
            <surname>Consortium Architecture</surname>
          </string-name>
          Working Group.
          <article-title>Openfog reference architecture for fog computing</article-title>
          . [online],
          <year>February 2017</year>
          . Available at https://www.openfogconsortium.org/ra/.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <given-names>J.</given-names>
            <surname>Pescatore</surname>
          </string-name>
          .
          <article-title>How DDoS detection and mitigation can fight advanced targeted attacks</article-title>
          .
          <source>SANS Whitepaper</source>
          ,
          <year>September 2013</year>
          . Available at https://www.sans.org/reading-room/whitepapers/ analyst/ddos
          <article-title>-detection-mitigation-fight-advanced-targeted-attacks-35000.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Mahadev</surname>
            <given-names>Satyanarayanan</given-names>
          </string-name>
          , Rolf Schuster, Maria Ebling, Gerhard Fettweis, Hannu Flinck, Kaustubh Joshi, and
          <string-name>
            <given-names>Krishan</given-names>
            <surname>Sabnani</surname>
          </string-name>
          .
          <article-title>An open ecosystem for mobile-cloud convergence</article-title>
          .
          <source>IEEE Communications Magazine</source>
          ,
          <volume>53</volume>
          (
          <issue>3</issue>
          ):
          <fpage>63</fpage>
          -
          <lpage>70</lpage>
          ,
          <year>March 2015</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>S.</given-names>
            <surname>Shirali-Shahreza</surname>
          </string-name>
          and
          <string-name>
            <given-names>Y.</given-names>
            <surname>Ganjali</surname>
          </string-name>
          .
          <article-title>Efficient implementation of security applications in openflow controller with flexam</article-title>
          .
          <source>In 21st Annual Symposium on High-Performance Interconnects (HOTI)</source>
          , pages
          <fpage>49</fpage>
          -
          <lpage>54</lpage>
          , San Jose, CA - USA,
          <year>August</year>
          ,
          <fpage>21st</fpage>
          -
          <lpage>23rd</lpage>
          ,
          <year>2013</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>