Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2019

24.01.2019

Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case

verfasst von: Yannis Nikoloudakis, Evangelos Pallis, George Mastorakis, Constandinos X. Mavromoustakis, Charalabos Skianis, Evangelos K. Markakis

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2019

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Modern ICT ecosystems such as healthcare environments (hospitals, care-centers etc.), operate in different abstraction layers (cloud, fog, extreme-edge) and comprise large numbers of network entities such as terminals, devices, sensors or even specialized appliances (virtual or physical). It is common in such environments, that several network entities with intermittent connectivity, join and leave the network in an unstructured and unsupervised manner (Wi-Fi access-points, BYOD policies, IoT, etc.). Such devices of frivolous nature, or even trusted devices/terminals, are prone to security vulnerabilities, since they are operated by regular, non-expert users who are not aware of any security aspects whatsoever. To effectively manage and proactively protect such large, complex and multilayered networks, dedicated personnel (system administrators, security specialists etc.) must be employed and specialized appliances must be deployed. On the other hand, modern cyber-warfare has become even more elaborate and insightful. Thus, ICT infrastructures must continuously evolve and adapt to the everchanging cyber-threats, which is a rather cumbersome and expensive task to accomplish. Towards addressing the above-mentioned issues, this paper proposes a cross-layered system, which leverages the Software Defined Networking (SDN) paradigm and the distributed Fog architecture, for network slicing and task offloading to provide dynamic, security-aware Vulnerability-Assessment as a service for large ICT infrastructures. The presented system provides seamless assessment for all existing and newly introduced network entities against all known security vulnerabilities, certifies them through a Common Vulnerability Scoring System (CVSS), classifies them according to the cyber-threat they introduce, and finally assigns them to a connectivity-appropriate VLAN. The presented system was preliminarily evaluated under a controlled-conditions simulation environment.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Andreassen HK , Bujnowska-Fedak MM , Chronaki CE, Dumitru RC, Pudule I, Santana S, Voss H, Wynn R (2007) European citizens’ use of E-health services: a study of seven countries. BMC Public Health 7(1):53CrossRef Andreassen HK , Bujnowska-Fedak MM , Chronaki CE, Dumitru RC, Pudule I, Santana S, Voss H, Wynn R (2007) European citizens’ use of E-health services: a study of seven countries. BMC Public Health 7(1):53CrossRef
2.
Zurück zum Zitat Pope J (2016) Ransomware: minimizing the risks. Innovations in Clinical Neuroscience 13(11-12):37–40 Pope J (2016) Ransomware: minimizing the risks. Innovations in Clinical Neuroscience 13(11-12):37–40
3.
Zurück zum Zitat Stine I, Rice M, Dunlap S, John P (2017) A cyber risk scoring system for medical devices. International Journal of Critical Infrastructure Protection 19:32–46CrossRef Stine I, Rice M, Dunlap S, John P (2017) A cyber risk scoring system for medical devices. International Journal of Critical Infrastructure Protection 19:32–46CrossRef
4.
Zurück zum Zitat Nist (2018) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. Technical report, National institute of standards and technology, Gaithersburg Nist (2018) Framework for Improving Critical Infrastructure Cybersecurity, Version 1.1. Technical report, National institute of standards and technology, Gaithersburg
5.
Zurück zum Zitat Cao C, Yuan L-P, Singhal A, Liu P, Sun X, Zhu S (2018) Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs. In: Data and applications security and privacy XXXII, Springer, Cham, pp 330–348 Cao C, Yuan L-P, Singhal A, Liu P, Sun X, Zhu S (2018) Assessing attack impact on business processes by interconnecting attack graphs and entity dependency graphs. In: Data and applications security and privacy XXXII, Springer, Cham, pp 330–348
6.
Zurück zum Zitat ET, Richard Y, Seth D (2017) Barrier free internet access: evaluating the cyber security risk posed by the adoption of bring your own devices to e-learning network infrastructure. Int J Comput Appl 176(3):53–62 ET, Richard Y, Seth D (2017) Barrier free internet access: evaluating the cyber security risk posed by the adoption of bring your own devices to e-learning network infrastructure. Int J Comput Appl 176(3):53–62
7.
Zurück zum Zitat Ficco M, Choraś M, Kozik R (2017) Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. J Comput Sci 22:179–186CrossRef Ficco M, Choraś M, Kozik R (2017) Simulation platform for cyber-security and vulnerability analysis of critical infrastructures. J Comput Sci 22:179–186CrossRef
8.
Zurück zum Zitat Furfaro A, Argento L, Parise A, Antonio P (2017) Using virtual environments for the assessment of cybersecurity issues in IoT scenarios. Simul Model Pract Theory 73:43–54CrossRef Furfaro A, Argento L, Parise A, Antonio P (2017) Using virtual environments for the assessment of cybersecurity issues in IoT scenarios. Simul Model Pract Theory 73:43–54CrossRef
9.
Zurück zum Zitat Vilalta R, Ciungu R, Mayoral A, Casellas R, Martinez R, Pubill D, Serra J, Munoz R, Christos V (2016) Improving security in internet of things with software defined networking. In: IEEE global communications conference (GLOBECOM), IEEE, pp 1–6 Vilalta R, Ciungu R, Mayoral A, Casellas R, Martinez R, Pubill D, Serra J, Munoz R, Christos V (2016) Improving security in internet of things with software defined networking. In: IEEE global communications conference (GLOBECOM), IEEE, pp 1–6
10.
Zurück zum Zitat Markakis EK, Karras K, Sideris A, Alexiou G, Pallis E (2017) Computing, caching, and communication at the edge: the cornerstone for building a versatile 5G ecosystem. IEEE Commun Mag 55(11):152–157CrossRef Markakis EK, Karras K, Sideris A, Alexiou G, Pallis E (2017) Computing, caching, and communication at the edge: the cornerstone for building a versatile 5G ecosystem. IEEE Commun Mag 55(11):152–157CrossRef
11.
Zurück zum Zitat Stuart J (2011) Engineering Information Security. John Wiley, Hoboken Stuart J (2011) Engineering Information Security. John Wiley, Hoboken
Metadaten
Titel
Vulnerability assessment as a service for fog-centric ICT ecosystems: A healthcare use case
verfasst von
Yannis Nikoloudakis
Evangelos Pallis
George Mastorakis
Constandinos X. Mavromoustakis
Charalabos Skianis
Evangelos K. Markakis
Publikationsdatum
24.01.2019
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2019
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-019-0716-y

Weitere Artikel der Ausgabe 5/2019

Peer-to-Peer Networking and Applications 5/2019 Zur Ausgabe