This deliverable will provide the requirements, the general architecture and design for the different component of SHIELD, along with the description of their interaction. This deliverable will be based on the use cases analysis. Additionally it will contain also the technical KPIs to measure the performance of the project with respect to the requirements and the tests (containing data requirements needed to evaluate the KPIs).
This Deliverable will provide an initial report on SHIELD exploitation activities including: analysis of global cybersecurity market and environment, identification of SHIELD positioning in the market and its unique value proposition. This deliverable will also demonstrate the barriers that may limit system’s development. Furthermore, the factors that influence the success of the proposed technology are identified.
This document will provide the specifications of the different components of the DARE as well as their design and architecture.
A detailed plan describing the designated dissemination and communication activities of each partner in the SHIELD consortium.
This document will update D3.1 according to the inputs received in the integration (T5.1) and evaluation (T5.2)
This document will update D4.1 according to the inputs received in the integration(T5.1) and evaluation (T5.2)
Roadmap of SHIELD’s contributions in order to plan and keep track of the project’s inputs to standardization. In the roadmap procedure, targeted standardisation bodies, fora and work groups will be defined. SHIELD will initially aim at the following standardization bodies and open-source projects: • ETSI, and in particular those groups related to NFV technologies (the NFV and MEC ISGs) and cybersecurity (the CYBER and LI WGs). • IETF, focusing on those WGs related with security automation (SACM) and the coming activities related to virtual security functions (the proposed I2NSF WG), and contributing to general efforts in what relates to security applications, as in the cases of the ANIMA (autonomic networking), SFC (function chaining) and I2RS (network programmability) WGs. • IRTF, mostly on the activities of the NFV and the SDN RGs • ONF, especially in the Security group, but with potential contributions in the Operator Area and issues related to the Northbound Interfaces group. • TM Forum, with special emphasis on the SDN/NFV Interest Group, and the Security and Privacy Management Community. • The OpenStack project, as the main upstream open-source reference for NFV and virtualization activities in general. • The OPNFV project, as the common reference for NFV open-source integration • The OpenDayLight project, as the most comprehensive software-based networking open-source implementation. • The ONOS project, as the emerging carrier-grade software networking open-source solution.
This document will provide the specifications of the different components of the vNSF ecosystem, as well as their design and architecture.
This deliverable will update the requirements, design and architecture gathered in D2.1 with a second iteration taking into account the inputs given by evaluation (T5.2).
D6.4 will provide the final report on SHIELD exploitation activities including: financial and economic analysis, sensitivity and risk analyses in order to assess technology and market risks. Strategic guidelines for the most appropriate services for development will also be provided. Individual exploitation plans will also be reported.
This deliverable contains all the necessary information to support management of the project, with highlights on the procedures covering, the online collaboration for effective co-operation, Project Deliverables: production process, ensuring quality, here to store, how to review, monthly reporting of effort, and progress and the mechanisms for working effectively on the project.
The last deliverable shall provide a final view on the DARE. This document will extend D4.1 and D4.2 and will contain all the description and usage of the modules composing the DARE. It will also contain the related software.
Report on the integrated SHIELD modules, their interconnection, the use cases implemented and evaluation results. Description and deployment of the platform tests, including the equipment to complement the developed SHIELD modules. This deliverable will also contain the final prototype.
Description of the component testing and integration of SHIELD parts. Report on the results of the integrated prototypes validation and associated performance assessments.
The last deliverable shall provide a final view on the vNSF environment. This document will extend D3.1 and D3.2 and will contain all the description and usage of the modules composing the vNSF ecosystem. It will also contain the related software.
Searching for OpenAIRE data...
Author(s): A. Lioy, G. Gardikis, B. Gaston, L. Jacquin, M. De Benedictis, Y. Angelopoulos, C. Xylouris
Published in: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Issue 6-8 November 2017, 2017, Page(s) 1-2
Author(s): Marco De Benedictis, Antonio Lioy
Published in: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Issue 6-8 November 2017, 2017, Page(s) 280-285
Author(s): D. Katsianis, I. Neokosmidis, A. Pastor, L. Jacquin, G. Gardikis
Published in: 2018 European Conference on Networks and Communications (EuCNC), Issue 18-21 June 2018, 2018, Page(s) 1-5
Author(s): Marco De Benedictis, Antonio Lioy, Paolo Smiraglia
Published in: 2018 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Issue 25-29 June 2018, 2018, Page(s) 55-63
Author(s): Hamza Attak, Marc Combalia, Georgios Gardikis, Bernat Gastón, Ludovic Jacquin, Dimitris Katsianis, Antonis Litke, Nikolaos Papadakis, Dimitris Papadopoulos, Antonio Pastor, Marc Roig, Olga Segou
Published in: Computer & Electronics Security Applications Rendez-vous (C&ESAR) 2018, Issue 19-21 November 2018, 2018
Author(s): Christos M. Mathas, Olga E. Segou, Georgios Xylouris, Dimitris Christinakis, Michail-Alexandros Kourtis, Costas Vassilakis, Anastasios Kourtis
Published in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, Issue 27-30 August 2018, 2018, Page(s) 1-10
Author(s): Antonio Pastor, Alberto Mozo, Diego R. Lopez, Jesus Folgueira, Angeliki Kapodistria
Published in: Proceedings of the 13th International Conference on Availability, Reliability and Security - ARES 2018, Issue 27-30 August 2018, 2018, Page(s) 1-6
Author(s): H. Attak, L. Jacquin, A.L. Shaw, M. Casassa-Mont and Y. Beresna
Published in: C&ESAR 2016 - Computer & Electronics Security Applications Rendez-vous - Internet des Objets Vous avez dit sécurité ?, Issue 21-23 November, 2016, 2016, Page(s) 171-181
Author(s): G. Gardikis, K. Tzoulas, K. Tripolitis, A. Bartzas, S. Costicoglou, Antonio Lioy, B. Gaston, C. Fernandez, C. Davila, A. Litke, N. Papadakis, D. Papadopoulos, A. Pastor, J. Nunez, L. Jacquin, H. Attak, N. Davri, G. Xylouris, M. Kafetzakis, D. Katsianis, I. Neokosmidis, M. Terranova, C. Giustozzi, T. Batista, R. Preto, E. Trouva, Y. Angelopoulos, A. Kourtis
Published in: 2017 IEEE Conference on Network Softwarization (NetSoft), Issue 3-7 July, 2017, 2017, Page(s) 1-6
Author(s): N.Papadakis, A.Litke, D.Papadopoulos
Published in: 4th International Conference on Operational Planning, Technological Innovations and Mathematical Applications (OPTIMA), Issue 25th-26th May, 2017, 2017, Page(s) 206
Author(s): Marco De Benedictis, Antonio Lioy
Published in: Future Generation Computer Systems, Issue 97, 2019, Page(s) 236-246, ISSN 0167-739X
Author(s): Cataldo Basile, Fulvio Valenza, Antonio Lioy, Diego R. Lopez, Antonio Pastor Perales
Published in: IEEE/ACM Transactions on Networking, Issue 27/2, 2019, Page(s) 707-720, ISSN 1063-6692
Author(s): Fulvio Valenza, Cataldo Basile, Daniele Canavese, Antonio Lioy
Published in: IEEE/ACM Transactions on Networking, Issue 25/5, 2017, Page(s) 2601-2614, ISSN 1063-6692