Link Layer Connectivity as a Service for Ad-Hoc Microservice Platforms

  • Luis F. Gonzalez Universidad Carlos III de Madrid ; Ivan Vidal; Francisco Valera; Diego R. Lopez
Microservice platforms have brought many advantages to support the deployment of light-weight applications at both near the edge and data centers. Still, their suitability to support telecommunication and vertical services beyond the network edge is far from being a reality. On one hand, their flat networking approach does not support the establishment of link-layer connectivity among the different components of telecommunication and vertical services (e.g., access points, routers, specific-purpose servers, etc.) due to their reliance on high-level APIs.

A Secure Link-Layer Connectivity Platform for Multi-Site NFV Services

  • Ivan Vidal; Borja Nogales; Diego Lopez; Juan Rodriguez; Francisco Valera; Arturo Azcorra
Network Functions Virtualization (NFV) is a key technology for network automation and has been instrumental to materialize the disruptive view of 5G and beyond mobile networks. In particular, 5G embraces NFV to support the automated and agile provision of telecommunication and vertical services as a composition of versatile virtualized components, referred to as Virtual Network Functions (VNFs). It provides a high degree of flexibility in placing these components on distributed NFV infrastructures (e.g., at the network edge, close to end users).

Continuous Industrial Sector Cybersecurity Assessment Paradigm* : Proposed Model of Cybersecurity Certification

  • André da Silva Oliveira; Henrique Santos
The fourth industrial revolution is led by the most recent ICT developments and is associated with a substantial investment directed towards the development of smart manufacturing systems. The Industry 4.0 paradigm is characterized by a modular structure of smart factories, where CPS monitors the physical processes and develops a virtual copy of the physical world to test and make decisions.

A Machine Learning IDS for Known and Unknown Anomalies

  • F. Aguiló–Gost; E. Simó–Mezquita; E. Marín–Tordera; A. Hussain
In this work an Intrusion Detection System to detect anomalies in networks system entries is presented. It is based on Machine Learning models and is composed of two components. The first component detects known anomalies with an accuracy beyond 95%. This component uses supervised models and several algorithms can be applied. In the use case analysed here, the best algorithm that fits the model is Random Forests. The second component detects unknown anomalies and benign entries and it is based on unsupervised models.

Engineering and Experimentally Benchmarking a Serverless Edge Computing System

  • Francisco Carpio, Marc Michalke, Admela Jukan
Thanks to the latest advances in containerization, the serverless edge computing model is becoming close to reality. Serverless at the edge is expected to enable low latency applications with fast autoscaling mechanisms, all running on heterogeneous and resource-constrained devices. In this work, we engineer and experimentally benchmark a serverless edge computing system architecture.

A Combinatorial Reliability Analysis of Generic Service Function Chains in Data Center Networks

  • Anna Engelmann, Admela Jukan
In data center networks, the reliability of Service Function Chain (SFC)—an end-to-end service presented by a chain of virtual network functions (VNFs)—is a complex and specific function of placement, configuration, and application requirements, both in hardware and software. Existing approaches to reliability analysis do not jointly consider multiple features of system components, including, (i) heterogeneity, (ii) disjointness, (iii) sharing, (iv) redundancy, and (v) failure interdependency.

Information Security Assessment and Certification within Supply Chains

  • Henrique Santos, André da Silva Oliveira, Lúcia Soares
Cybersecurity threats have been on the rise lately, along with the digital revolution. In the industrial area and the supply chains, the disruptions that have already occurred require the search for solutions that minimize the impact of those threats without hampering the digital transformation, equally and globally recognized as bringing enormous benefits. At the heart of the solutions is the ability to manage information security conveniently. To this end, it is essential to put a safety assessment program in place using a set of appropriate metrics.

Challenges in the Automotive Software Supply Chain, Connected CAR : Benefits from an Intent Policy framework

  • Jose Soriano, Guillermo Jiménez, Ernesto Correa, Noel Ruiz
Car Manufacturer has to address today growing threats, cars have been incrementally becoming more complex with more code and on the other hand they have to maintain its components during extended life spans of several years compared with other industries. This, together with the increasing connectivity thanks to the connected car and 5G, is becoming a major concern for the industry. FISHY offers a prime opportunity to address some of these challenges since it will offer a homogenous way to tackle some of the threats.

Farm to fork: securing a supply chain with direct impact on food security

  • Panagiotis Trakadas, Helen C. Leligou, Panagiotis Karkazis, Antonis Gonos, Theodore Zahariadis
Food security is currently considered a huge societal challenge which technology providers, technology adopters, policy makers and consumers altogether are facing. A first step towards more secure and safe food has been attempted through the deployment mainly of Internet of Things based solutions and applications that gather information and provide it to the users. However, these systems are susceptible to attacks e.g. data leakage and information modification, keeping our societies away from the target of secure food.

Scaling migrations and replications of Virtual Network Functions based on network traffic forecasting

  • Carpio, Francisco; Bziuk, Wolfgang; Jukan, Admela
Migration and replication of virtual network functions (VNFs) are well-known mechanisms to face dynamic resource requests in Internet Service Provider (ISP) edge networks. They are not only used to reallocate resources in carrier networks, but in case of excessive traffic churns also to offload VNFs to third party cloud providers. We propose to study how traffic forecasting can help to reduce the number of required migrations and replications when the traffic dynamically changes in the network.