Security of Networks and Services in an All-Connected World 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings

This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with...

Full description

Bibliographic Details
Other Authors: Tuncer, Daphne (Editor), Koch, Robert (Editor), Badonnel, Rémi (Editor), Stiller, Burkhard (Editor)
Format: eBook
Language:English
Published: Cham Springer International Publishing 2017, 2017
Edition:1st ed. 2017
Series:Computer Communication Networks and Telecommunications
Subjects:
Online Access:
Collection: Springer eBooks 2005- - Collection details see MPG.ReNa
LEADER 03842nmm a2200445 u 4500
001 EB001492638
003 EBX01000000000000000922227
005 00000000000000.0
007 cr|||||||||||||||||||||
008 170703 ||| eng
020 |a 9783319607740 
100 1 |a Tuncer, Daphne  |e [editor] 
245 0 0 |a Security of Networks and Services in an All-Connected World  |h Elektronische Ressource  |b 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, Zurich, Switzerland, July 10-13, 2017, Proceedings  |c edited by Daphne Tuncer, Robert Koch, Rémi Badonnel, Burkhard Stiller 
250 |a 1st ed. 2017 
260 |a Cham  |b Springer International Publishing  |c 2017, 2017 
300 |a XX, 192 p. 55 illus  |b online resource 
505 0 |a Making Flow-Based Security Detection Parallel -- A Blockchain-Based Architecture for Collaborative DDoS Mitigation with Smart Contracts -- Achieving Reproducible Network Environments with INSALATA -- Towards a Software-Defined Security Framework for Supporting Distributed Cloud -- Optimal Service Function Chain Composition in Network Functions Virtualization -- An Optimized Resilient Advance Bandwidth Scheduling for Media Delivery Services -- The Evaluation of the V2VUNet Concept to Improve Inter-vehicle Communications -- Towards Internet Scale Quality-of-Experience Measurement with Twitter -- Hunting SIP Authentication Attacks Efficiently -- MoDeNA: Enhancing User Security for Devices in Wireless Personal and Local Area Networks -- Flow-Based Detection of IPv6-specific Network Layer Attacks -- Towards a Hybrid Cloud Platform Using Apache Mesos -- Visual Analytics for Network Security and Critical Infrastructures -- Preserving Relations in Parallel Flow Data Processing -- SmartDEMAP: A Smart Contract Deployment and Management Platform -- Optimizing the Integration of Agent-Based Cloud Orchestrators and Higher-Level Workloads -- Situational Awareness: Detecting Critical Dependencies and Devices in a Network -- A Framework for SFC Integrity in NFV Environments -- Multi-domain DDoS Mitigation based on Blockchains 
653 |a Computer Communication Networks 
653 |a Electronic digital computers / Evaluation 
653 |a Computers and Society 
653 |a System Performance and Evaluation 
653 |a Data Structures and Information Theory 
653 |a Application software 
653 |a Computer networks  
653 |a Data protection 
653 |a Information theory 
653 |a Data structures (Computer science) 
653 |a Computer and Information Systems Applications 
653 |a Data and Information Security 
653 |a Computers and civilization 
700 1 |a Koch, Robert  |e [editor] 
700 1 |a Badonnel, Rémi  |e [editor] 
700 1 |a Stiller, Burkhard  |e [editor] 
041 0 7 |a eng  |2 ISO 639-2 
989 |b Springer  |a Springer eBooks 2005- 
490 0 |a Computer Communication Networks and Telecommunications 
028 5 0 |a 10.1007/978-3-319-60774-0 
856 4 0 |u https://doi.org/10.1007/978-3-319-60774-0?nosfx=y  |x Verlag  |3 Volltext 
082 0 |a 004.6 
520 |a This book is open access under a CC BY 4.0 license. This book constitutes the refereed proceedings of the 11th IFIP WG 6.6 International Conference on Autonomous Infrastructure, Management, and Security, AIMS 2017, held in Zurich, Switzerland, in July 2017. The 8 full papers presented together with 11 short papers were carefully reviewed and selected from 24 submissions. The papers are organized in the following topical sections: security management; management of cloud environments and services, evaluation and experimental study of rich network services; security, intrusion detection, and configuration; autonomic and self-management solutions; and methods for the protection of infrastructure