Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Network Automation

Design Innovation and Network Architecture for the Future Internet
A set of techniques meant to facilitate the design, the delivery, and the operation of services (e.g., VPN services) supported by a network infrastructure. Within the context of collaborative networking, network automation tools include dynamic security policy enforcement and resource allocation schemes, dynamic signaling mechanisms to report and exchange about a potentially suspicious traffic, as well as a set of Artificial Intelligence (AI) tools such as Machine Learning, computation algorithms like Reinforcement Learning and neural networks that assist attack traffic identification procedures, as well as the elaboration of attack mitigation plans.
Published in Chapter:
From Protected Networks to Protective and Collaborative Networking: An Approach to a Globally Anticipative Attack Mitigation Framework for the Future Internet
Mohamed Boucadair (Orange S.A., France) and Christian Jacquenet (Orange S.A., France)
Copyright: © 2021 |Pages: 23
DOI: 10.4018/978-1-7998-7646-5.ch012
Abstract
Security has always been a major concern of network operators. Despite a pretty rich security toolbox that never ceased to improve over the years (filters, traffic wells, encryption techniques, and intrusion detection systems to name a few), attacks keep on increasing from both a numerical and amplitude standpoints. Such protean attacks demand an adapted security toolkit that should include techniques capable of not only detecting these attacks but also anticipating them even before they reach their target. Strengthening future networking infrastructures so that they become protective, instead of being “just” protected must thus become one of the key strategic objectives of network operators and service providers who ambition to rely upon robust, dynamic, security policy enforcement schemes to develop their business while retaining their existing customers. This chapter discusses the various security challenges that may be further exacerbated by future networking infrastructures. It also presents some of the techniques that are very likely to become cornerstones of protective networking.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR