Improving security with cognitive workflows

1Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Cloud Computing, SDN and virtual networking technologies have completely modified the relationship between the applications and the hardware resources that are used to execute them. They are no more tightly coupled to each other in a static context. However, elastic on-demand provisioning, auto-scaling and migration provided by cloud resources to address fluctuations in workload demands or available resource pools also bring with them new issues in managing security. In this paper, the authors propose a novel security system based on the concept of cognitive control overlay to proactively manage the security of service transactions. In particular, when the application components move, their configuration changes and the conventional intrusion detection systems (IDS) not aware of the mobility will fail. The cognitive overlay makes the IDS become aware of the mobility and take appropriate action. The solution addresses application security independent of server and network based security management systems.

Cite

CITATION STYLE

APA

Cammarata, G., Mikkilineni, R., Morana, G., & Nocita, R. (2018). Improving security with cognitive workflows. In Lecture Notes on Data Engineering and Communications Technologies (Vol. 17, pp. 429–436). Springer Science and Business Media Deutschland GmbH. https://doi.org/10.1007/978-3-319-75928-9_38

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free