Zero Trust Score-based Network-level Access Control in Enterprise Networks

L Bradatsch, O Miroshkin, N Trkulja… - 2023 IEEE 22nd …, 2023 - ieeexplore.ieee.org
Zero Trust security has recently gained attention in enterprise network security. One of its
key ideas is making network-level access decisions based on trust scores. However, score …

Cost Optimization in Security-Aware Service Function Chain Deployment with Diverse Vendors

D Zheng, X Liu, W Tang, H Xu… - GLOBECOM 2023-2023 …, 2023 - ieeexplore.ieee.org
Frequent cyber-attacks force the service provider to employ security-aware service functions
(SFs) to accommodate client network requests. Thanks to virtualization techniques' maturity …

ZTSFC: A Service Function Chaining-Enabled Zero Trust Architecture

L Bradatsch, O Miroshkin, F Kargl - IEEE Access, 2023 - ieeexplore.ieee.org
Recently, zero trust security has received notable attention in the security community.
However, while many networks use monitoring and security functions like firewalls, their …

Torrent Poisoning Protection with a Reverse Proxy Server

A Godinho, J Rosado, F Sá, F Caldeira, F Cardoso - Electronics, 2022 - mdpi.com
A Distributed Denial-of-Service attack uses multiple sources operating in concert to attack a
network or site. A typical DDoS flood attack on a website targets a web server with multiple …

Efficient Zero-Trust-enabled Service Function Chain Deployment in Multi-Vendor Networks

D Zheng, H Xing, X Cao, J Xu - techrxiv.org
With the advent of zero trust (ZT) security architectures, vendors can bolster their services'
security by continuously verifying every end-to-end traffic flow through the policy …

Provably Efficient Security-Aware Service Function Tree Composing and Embedding in Multi-Vendor Networks

D Zheng, H Xing, L Feng, X Cao - Available at SSRN 4829507 - papers.ssrn.com
Multicast offers great benefits in many emerging applications such as federated learning,
metaverse, and data warehouse. Recently, due to the frequent cyber-attacks, multicast …