Defining the Threat Manufacturer Usage Description Model for Sharing Mitigation Actions
Description
While the growing development of paradigms such as the 5G or the Internet of Things (IoT) enlarges the attack surface due to its high inter-connectivity, an effective prompt response to discovered vulnerabilities arises as a crucial need to guarantee the security of these systems throughout their lifecycle. Based on the threat signalling mechanism proposed by NIST and the Manufacturer Usage Description (MUD) standard, this article defines the threat MUD model, its architecture and usage to share security information about threats, compromised domains and possible mitigation actions in terms of security policies.
Files
IEEE_Conference_INSPIRE5g (1).pdf
Files
(204.1 kB)
Name | Size | Download all |
---|---|---|
md5:0817d6088be9943b5d9ff1f391d0ca99
|
204.1 kB | Preview Download |