語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
FindBook
Google Book
Amazon
博客來
Data-centric security in software defined networks (SDN)
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
Data-centric security in software defined networks (SDN)/ by Marek Amanowicz, Sebastian Szwaczyk, Konrad Wrona.
作者:
Amanowicz, Marek.
其他作者:
Szwaczyk, Sebastian.
出版者:
Cham :Springer Nature Switzerland : : 2024.,
面頁冊數:
xix, 118 p. :ill., digital ;24 cm.
內容註:
Introduction -- Data-centric security -- Software Defined Networks -- Cross-layer enforcement of data security in SDN -- Risk-aware routing in SDN -- Risk-aware routing applicability for DCS enforcement -- DCS deployment in SDN-based systems.
Contained By:
Springer Nature eBook
標題:
Software-defined networking (Computer network technology) - Security measures. -
電子資源:
https://doi.org/10.1007/978-3-031-55517-6
ISBN:
9783031555176
Data-centric security in software defined networks (SDN)
Amanowicz, Marek.
Data-centric security in software defined networks (SDN)
[electronic resource] /by Marek Amanowicz, Sebastian Szwaczyk, Konrad Wrona. - Cham :Springer Nature Switzerland :2024. - xix, 118 p. :ill., digital ;24 cm. - Studies in big data,v. 1492197-6511 ;. - Studies in big data ;v. 149..
Introduction -- Data-centric security -- Software Defined Networks -- Cross-layer enforcement of data security in SDN -- Risk-aware routing in SDN -- Risk-aware routing applicability for DCS enforcement -- DCS deployment in SDN-based systems.
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aim to provide defence under the assumption that the boundary protections will be breached. Based on experience and lessons learned from research on the application of DCS to defence systems, the authors present an approach to integrating the DCS concept with SDN. They introduce a risk-aware approach to routing in SDN, enabling defence-in-depth and enhanced security for data in transit. The book describes possible paths for an organisation to transition towards DCS, indicating some open and challenging issues requiring further investigation. To allow interested readers to conduct detailed studies and evaluate the exemplary implementation of DCS over SDN, the text includes a short tutorial on using the emulation environment and links to the websites from which the software can be downloaded.
ISBN: 9783031555176
Standard No.: 10.1007/978-3-031-55517-6doiSubjects--Topical Terms:
3715800
Software-defined networking (Computer network technology)
--Security measures.
LC Class. No.: TK5105.5833
Dewey Class. No.: 004.6
Data-centric security in software defined networks (SDN)
LDR
:03044nmm a22003375a 4500
001
2370441
003
DE-He213
005
20240429160339.0
006
m d
007
cr nn 008maaau
008
241127s2024 sz s 0 eng d
020
$a
9783031555176
$q
(electronic bk.)
020
$a
9783031555169
$q
(paper)
024
7
$a
10.1007/978-3-031-55517-6
$2
doi
035
$a
978-3-031-55517-6
040
$a
GP
$c
GP
041
0
$a
eng
050
4
$a
TK5105.5833
072
7
$a
UN
$2
bicssc
072
7
$a
COM018000
$2
bisacsh
072
7
$a
UN
$2
thema
082
0 4
$a
004.6
$2
23
090
$a
TK5105.5833
$b
.A484 2024
100
1
$a
Amanowicz, Marek.
$3
3715796
245
1 0
$a
Data-centric security in software defined networks (SDN)
$h
[electronic resource] /
$c
by Marek Amanowicz, Sebastian Szwaczyk, Konrad Wrona.
260
$a
Cham :
$b
Springer Nature Switzerland :
$b
Imprint: Springer,
$c
2024.
300
$a
xix, 118 p. :
$b
ill., digital ;
$c
24 cm.
490
1
$a
Studies in big data,
$x
2197-6511 ;
$v
v. 149
505
0
$a
Introduction -- Data-centric security -- Software Defined Networks -- Cross-layer enforcement of data security in SDN -- Risk-aware routing in SDN -- Risk-aware routing applicability for DCS enforcement -- DCS deployment in SDN-based systems.
520
$a
The book focuses on applying the data-centric security (DCS) concept and leveraging the unique capabilities of software-defined networks (SDN) to improve the security and resilience of corporate and government information systems used to process critical information and implement business processes requiring special protection. As organisations increasingly rely on information technology, cyber threats to data and infrastructure can significantly affect their operations and adversely impact critical business processes. Appropriate authentication, authorisation, monitoring, and response measures must be implemented within the perimeter of the system to protect against adversaries. However, sophisticated attackers can compromise the perimeter defences and even remain in the system for a prolonged time without the owner being aware of these facts. Therefore, new security paradigms such as Zero Trust and DCS aim to provide defence under the assumption that the boundary protections will be breached. Based on experience and lessons learned from research on the application of DCS to defence systems, the authors present an approach to integrating the DCS concept with SDN. They introduce a risk-aware approach to routing in SDN, enabling defence-in-depth and enhanced security for data in transit. The book describes possible paths for an organisation to transition towards DCS, indicating some open and challenging issues requiring further investigation. To allow interested readers to conduct detailed studies and evaluate the exemplary implementation of DCS over SDN, the text includes a short tutorial on using the emulation environment and links to the websites from which the software can be downloaded.
650
0
$a
Software-defined networking (Computer network technology)
$x
Security measures.
$3
3715800
650
1 4
$a
Data Engineering.
$3
3409361
650
2 4
$a
Computational Intelligence.
$3
1001631
650
2 4
$a
Data and Information Security.
$3
3538510
650
2 4
$a
Artificial Intelligence.
$3
769149
650
2 4
$a
Big Data.
$3
3134868
700
1
$a
Szwaczyk, Sebastian.
$3
3715797
700
1
$a
Wrona, Konrad.
$3
3715798
710
2
$a
SpringerLink (Online service)
$3
836513
773
0
$t
Springer Nature eBook
830
0
$a
Studies in big data ;
$v
v. 149.
$3
3715799
856
4 0
$u
https://doi.org/10.1007/978-3-031-55517-6
950
$a
Intelligent Technologies and Robotics (SpringerNature-42732)
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9491395
電子資源
11.線上閱覽_V
電子書
EB TK5105.5833
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入