Banner
Home      Log In      Contacts      FAQs      INSTICC Portal
 
Documents

Tutorials

The role of the tutorials is to provide a platform for a more intensive scientific exchange amongst researchers interested in a particular topic and as a meeting point for the community. Tutorials complement the depth-oriented technical sessions by providing participants with broad overviews of emerging fields. A tutorial can be scheduled for 1.5 or 3 hours.



Modern Network-based Security: Softwarized Networking, Trusted Computing, and Artificial Intelligence for Cybersecurity


Instructor

Antonio Lioy
DAUIN, Politecnico di Torino
Italy
 
Brief Bio
Antonio Lioy holds a M.Sc. in Electronic Engineering "summa cum laude", and a Ph.D. in Computer Engineering, both from Politecnico di Torino, Italy. He is currently Full Professor of Computer Engineering at DAUIN (the Department of Computer and Control Engineering) of the Politecnico di Torino where he is in charge of the courses "Computer systems security" and "Design of web systems and computer networks". The current research interests of Prof. Lioy are in the fields of computer and network security, with special emphasis on PKI, electronic identity, network and application security, trusted computing, and policy-based and ontology-based design of the protection for large information systems. Prof. Lioy leads the TORSEC research group which performs research and consultancy projects in IT security, for both public agencies and private companies. This group took part to several EU-funded projects over the last 20 years, the most recent ones being Stork-2.0, e-Sens, SECURED, ASPIRE, SHIELD, DeepAugur, and eID4U. Prof. Lioy is an evaluator and reviewer for the EC and a consultant to Italian public and private bodies. Prof. Lioy has published more than 100 papers, mostly about various cybersecurity topics.
Abstract

This tutorial will briefly introduce modern network technologies (SDN, Software Defined Networking, and NFV, Network Function Virtualization) and then show how to use them along with trusted computing (TC), machine-learning (ML), and artificial intelligence (AI) techniques to create a trusted protection infrastructure to effectively counter cyberattacks. The technical aspects will be complemented by a market and economical analysis, to evaluate benefits versus costs.

Keywords

SDN, NFV, trusted infrastructure, machine learning, security economics

Aims and Learning Objectives

At the end of this tutorial, the participants will grasp the basics of several advanced network and security techniques (SDN, NFV, TC, ML, AI) and understand how to effectively mix them to protect end-users or a whole site from cyberattacks.
The open-source components needed for implementing the protection infrastructure will also be introduced, to let participants easily experiment by themselves with the concepts explained.


Target Audience

Security architects
Security managers
Network architects
Network managers
Network and security researchers


Prerequisite Knowledge of Audience

TCP/IP networking
Basics of cybersecurity


Detailed Outline

1. Introduction to modern networking: SDN and NFV

2. Static and dynamic integrity verification in a distributed infrastructure: trusted computing and remote attestation

3. Machine learning and artificial intelligence for cybersecurity

4. Putting all together: how to create a trusted protection infrastructure with open-source components

5. Market and economic analysis of a network-based protection infrastructure

Secretariat Contacts
e-mail: icissp.secretariat@insticc.org

footer