IEEE International Conference on Network Softwarization
28 June–2 July 2021 // Virtual Conference

SecSoft 2021

3rd International Workshop on Cyber-Security Threats, Trust and Privacy Management in Software-Defined and Virtualized Infrastructures

Website: SecSoft 2021

Friday, July 2, 2021

Opening

1:30pm – 1:40pm JST
Session Chair: Fulvio Valenza, Politecnico di Torino, Italy

TS1 – ML-techniques for Attack Detection

1:40pm – 2:55pm JST
Session Chair: Joerg Keller, FernUniversitaet in Hagen, Germany

DDoS Attack Detection and Mitigation in SDN using Machine Learning
Fatima Khashab, Lebanese University, Lebanon
Joanna Moubarak, Saint Joseph University of Beirut, Lebanon
Antoine Feghali, Potech Labs, Lebanon
Carole Bassil, Lebanese University, Lebanon

Evaluating ML-based DDoS Detection with Grid Search Hyperparameter Optimization
Odnan Ref Sanchez, University of Genoa, Italy
Matteo Repetto, CNR, Italy
Alessandro Carrega, CNIT, Italy
Raffaele Bolla, University of Genoa, Italy

Intrusion Detection using Network Traffic Profiling and Machine Learning for IoT
Joseph R Rose, Portsmouth University, United Kingdom
Matthew Swann, United Kingdom
Gueltoum Bendiab, Beckley Point – Student AccommodationAddress, United Kingdom, Freres Mentouri, Constantine, Algeria
Stavros Shiaeles, University of Portsmouth, United Kingdom
Nicholas Kolokotronis, University of Peloponnese, Greece

TS2 – Network Traffic Analysis

3:05pm – 4:20pm JST
Session Chair: Thanassis Giannetsos, Technical University of Denmark, Denmark

Encapcap: Transforming Network Traces to Virtual Networks
Daniel Spiekermann, Polizeiakademie Niedersachsen, Germany
Joerg Keller, FernUniversitaet in Hagen, Germany

Leveraging the 5G architecture to mitigate amplification attacks
Matteo Repetto, CNR, Italy
Alessandro Carrega, CNIT, Italy
Guerino Lamanna, Infocom, Italy
Jalolliddin Yusupov, Turin Polytechnic University in Tashkent, Uzbekistan
Orazio Toscano, Ericsson Telecomunicazioni SpA, Italy
Gianmarco Bruno, Ericsson, Italy
Michele Nuovo, Ericsson Telecomunicazioni SpA, Italy
Marco Cappelli, Ericsson Telecomunicazioni SpA, Italy

Code Augmentation for Detecting Covert Channels Targeting the IPv6 Flow Label
Luca Caviglione, National Research Council (CNR), Italy
Marco Zuppelli, IMATI, Italy
Wojciech Mazurczyk, Warsaw University of Technology & Faculty of Electronics and Information Technology, Institute of Telecommunications, Poland
Andreas Schaffhauser, FernUniversität in Hagen, Germany
Matteo Repetto, CNR, Italy

TS3 – Security Models and Trust Schemes

4:30pm – 5:45pm JST
Session Chair: Nicholas Kolokotronis, University of Peloponnese, Greece

A novel approach for security function graph configuration and deployment
Daniele Bringhenti, Politecnico di Torino, Italy
Guido Marchetto, Politecnico di Torino, Italy
Riccardo Sisto, Politecnico di Torino, Italy
Fulvio Valenza, Politecnico di Torino, Italy

A Dynamic Recommendation-based Trust Scheme for the Smart Grid
Dimitrios Pliatsios, University of Western Macedonia, Greece
Panagiotis Sarigiannidis, University of Western Macedonia, Greece
George Fragulis, University of Western Macedonia, Greece
Apostolos Tsiakalos, Sidroco Holdings Ltd, Cyprus
Dimitrios Margounakis, Sidroco Holdings Ltd, Cyprus

Impacts of Service Decomposition Models on Security Attributes: A Case Study with 5G Network Repository Function
Shanay Behrad, IRT b-com, France
David Espes, University of Brest & LabSTICC, France
Philippe Bertin, Orange Labs & Bcom, France
Cao-Thanh Phan, BCOM, France

Keynote

5:55pm – 7:05pm JST
Session Chair: Riccardo Sisto, Politecnico di Torino, Italy

Adversaries in the Network
Sandra Scott-Hayward, Queen’s University Belfast, United Kingdom

Description

The communication networks on which we rely for so many aspects of our daily lives are constantly under attack. This is increasingly the case as we have adapted to remote working, schooling, health service provision etc. The emergence of technologies such as Software-Defined Networking (SDN), Network Functions Virtualization (NFV), and Multi-Access Edge Computing (MEC) enable innovation in network security, but these technologies create additional attack surfaces. Dramatic advances in Machine Learning (ML) and Artificial Intelligence (AI) techniques are influencing security services and design for security, but they can also be exploited to produce sophisticated attacks.

Biography

Sandra Scott-Hayward is a Lecturer (Assistant Professor) with the School of Electronics, Electrical Engineering and Computer Science, and a Member of the Centre for Secure Information Technologies at Queen’s University Belfast (QUB). She began her career in industry and became a Chartered Engineer in 2006 having worked as a Systems Engineer and Engineering Group Leader with Airbus. Since joining academia, she has published a series of IEEE/ACM papers on security designs and solutions for softwarized networks based on her research on the development of network security architectures and security functions for emerging networks. She received Outstanding Technical Contributor and Outstanding Leadership awards from the Open Networking Foundation in 2015 and 2016, respectively, having been elected and serving as the Vice-Chair of the ONF Security Working Group from 2015 to 2017. Amongst many other service memberships, she was the TPC Co-Chair for IEEE NFV-SDN 2020 and is an Associate Editor of IEEE Transactions on Network and Service Management. She is Director of the QUB Academic Centre of Excellence in Cyber Security Education (ACE-CSE), one of the first universities to be awarded this recognition by the U.K. National Cyber Security Centre.

PS – Cyber Security EU funded projects

8:35pm – 10:20pm JST

ASTRID – AddreSsing ThReats for virtualIseD services
Matteo Repetto, CNR-IMATI, Italy

CYBER-TRUST – Advanced Cyber-Threat Intelligence, Detection, and Mitigation Platform for a Trusted Internet of Things
Nicholas Kolokotronis, University of Peloponnese, Greece

SPEAR – Secure and PrivatE smArt gRid
Panagiotis Sarigiannidis, University of Western Macedonia, Greece

SIMARGL – Secure Intelligent Methods for Advanced Recognition of Malware and Stegomalware
Joerg Keller, FernUniversitaet in Hagen, Germany

GUARD – Guarantee Reliability and trust for Digital service chains
Antonino Albanese Italtel, Italy

PALANTIR – Practical Autonomous Cyberhealth for resilient SMEs & Microenterprises
Antonio Lioy, Politecnico di Torino, Italy

DataVaults
Sotiris Kousouris, SUITE5, Cyprus

RAINBOW
Athanasios Giannetsos, Danmarks Tekniske Universitet, Denmark

Closing Session

10:20pm – 10:30pm JST
Session Chair: Fulvio Valenza, Politecnico di Torino, Italy

2021 Patrons


  • Platinum

  • ITOCHU Techno-Solutions Corporation logo

    Bronze

  • Hitachi logo

    Bronze

  • NEC logo

    Bronze


  • Bronze

Technical Co-Sponsors