Tiefpreis
CHF60.00
Print on Demand - Exemplar wird für Sie besorgt.
This book is open access under a CC BY 4.0 license.
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.
The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
Includes supplementary material: sn.pub/extras
Klappentext
This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
Zusammenfassung
This book is open access under a CC BY 4.0 license.
This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017.
The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure.
Inhalt
Making Flow-Based Security Detection Parallel.- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts.- Achieving Reproducible Network Environments with INSALATA.- Towards a Software-Defined Security Framework for Supporting Distributed Cloud.- Optimal Service Function Chain Composition in Network Functions Virtualization.- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services.- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications.- Towards Internet Scale Quality-of-Experience Measurement with Twitter.- Hunting SIP Authentication Attacks Efficiently.- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks.- Flow-Based Detection of IPv6-specific Network Layer Attacks.- Towards a Hybrid Cloud Platform Using Apache Mesos.- Visual Analytics for Network Security and Critical Infrastructures.- Preserving Relations in Parallel Flow Data Processing.- SmartDEMAP: A Smart Contract Deployment and Management Platform.- Optimizing the Integration of Agent-Based Cloud Orchestrators andHigher-Level Workloads.- Situational Awareness: Detecting Critical Dependencies and Devices in a Network.- A Framework for SFC Integrity in NFV Environments.- Multi-domain DDoS Mitigation based on Blockchains.