Latest news from SHIELD

Today SHIELD co-organisation...
SHIELD co-organised, in collaboration with C3ISP and PROTECTIVE projects, the 1st International W...
Jul 9, 2018 SHIELD Newsletter n.3 ...
A universal security infrastructure for ISPs and corporate networks using NFV-enabled technologie...
Jul 1, 2018 SHIELD participation t...
A paper entitled “Container-based design of a Virtual Network Security Function” has been accepte...

More news...

Data Analysis and Remediation Engine (DARE)

An information-driven IDPS platform capable of predicting specific vulnerabilities and attacks by relying on Big Data, Threat Monitoring and Machine Learning to analyise the output produced by vNSFs. Pattern discovery techniques analyse data to identify current malicious behaviours or predict likely threats. Analysis' results are accessible by systems and security administrators via a dashboard.

Network Functions Virtualisation (NFV) and virtual Network Security Functions (vNSFs)

NFV enables the virtualisation of network and security appliances. The resulting virtual appliances, named vNSFs, are instantiated within the network infrastructure by a vNSFs orchestrator in order to effectively monitor and filter network traffic in a distributed manner. Advertisement, browsing, selection and trading of vNSFs in a secure manner is provided by a logically centralised repository, named vNSFs store.

Trusted Computing (TC)

The trustworthiness of the secure SHIELD framework is implemented by relying on TC technologies. The infrastructure attestation binds the vNSFs and the network configuration with the store and orchestration of the network. The key components of the secure SHIELD framework will be protected by using the TPM, a TC hardware that assures the integrity of the software and the configuration.

Watch the SHIELD video