Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ludovic Jacquin is active.

Publication


Featured researches published by Ludovic Jacquin.


ieee conference on network softwarization | 2015

Towards trusted software-defined networks using a hardware-based Integrity Measurement Architecture

Ludovic Jacquin; Adrian Shaw; Chris I. Dalton

The rise of software-defined networks in recent years has allowed unprecedented agility in network configuration and orchestration. As physical links and configurations become virtualised, this has created many opportunities for dynamic and transparent deployment of services. This however, opens up a potential attack surface for new forms of attack. Thus, with the combination of SDN elements abstracting their administration to network administrators and the growing attack surface in network element software, this creates the possibility for malicious routers which do not comply with the higher-level abstractions used by their respective controllers. This paper focuses on building an assurable SDN network using Trusted computing mechanisms to: (A) provide a strong hardware-based platform identity to check that network element software is healthy, and (B) increase assurance that traffic flows are being forwarded to their intended destinations by dynamically monitoring the low-level configurations used to route virtual LANs. The architecture as a whole provides a mechanism to check the network posture, bridging the gap between the areas of remote attestation and virtual networking.


privacy forum | 2015

The Trust Problem in Modern Network Infrastructures

Ludovic Jacquin; Antonio Lioy; Diego R. Lopez; Adrian Shaw; Tao Su

SDN and NFV are modern techniques to implement networking infrastructures and can be used also to implement other advanced functionalities, such as the protection architecture designed by the SECURED project. This paper discusses a couple of techniques – trustworthy network infrastructure monitoring and remote attestation of virtual machines – useful towards a trusted and secure usage of SDN and NFV.


ieee conference on network softwarization | 2017

SHIELD: A novel NFV-based cybersecurity framework

Georgios Gardikis; K. Tzoulas; K. Tripolitis; A. Bartzas; Socrates Costicoglou; Antonio Lioy; B. Gaston; C. Fernandez; C. Davila; Antonios Litke; Nikolaos Papadakis; D. Papadopoulos; Antonio Pastor; J. Nunez; Ludovic Jacquin; Hamza Attak; N. Davri; George Xylouris; M. Kafetzakis; Dimitris Katsianis; Ioannis Neokosmidis; M. Terranova; C. Giustozzi; T. Batista; R. Preto; Eleni Trouva; Y. Angelopoulos; Akis Kourtis

SHIELD is an EU-funded project, targeting at the design and development of a novel cybersecurity framework, which offers security-as-a-Service in an evolved telco environment. The SHIELD framework leverages NFV (Network Functions Virtualization) and SDN (Software-Defined Networking) for virtualization and dynamic placement of virtualised security appliances in the network (virtual Network Security Functions - vNSFs), Big Data analytics for real-time incident detection and mitigation, as well as attestation techniques for securing both the infrastructure and the services. This papers discusses key use cases and requirements for the SHIELD framework and presents a high-level architectural approach.


Archive | 2017

SHIELD: Securing Against Intruders and Other Threats Through an NFV-Enabled Environment

Hamza Attak; Marco Casassa-Mont; Cristian Dávila; Eleni-Constantina Davri; Carolina Fernandez; Georgios Gardikis; Bernat Gastón; Ludovic Jacquin; Antonio Lioy; Antonis Litke; Nikolaos Papadakis; Dimitris Papadopoulos; Jerónimo Núñez; Eleni Trouva

Organisations are witnessing an unprecedented escalation of cyber-crime attacks and struggle to protect against them. Rethinking security is required to cope with numerous new challenges arising today: the sophistication of new attacks, the increasing weakness of traditional security controls, the explosion of data to be collected and analysed to detect threats and the ongoing transformation of IT – such as virtualisation and cloud computing.


IEEE Communications Magazine | 2015

Virtualized security at the network edge: a user-centric approach

Diego Montero; Marcelo Yannuzzi; Adrian Shaw; Ludovic Jacquin; Antonio Pastor; René Serral-Gracià; Antonio Lioy; Fulvio Giovanni Ottavio Risso; Cataldo Basile; Roberto Sassu; Mario Nemirovsky; Francesco Ciaccia; Michael Georgiades; Savvas Charalambides; Jarkko Kuusijärvi; Francesca Bosco


Archive | 2017

VERIFYING A NETWORK CONFIGURATION

Ludovic Jacquin; Adrian Shaw; Chris I. Dalton


european conference on networks and communications | 2018

Factors Influencing Market Adoption and Evolution of NFV/SDN Cybersecurity Solutions. Evidence from SHIELD Project

Dimitris Katsianis; Ioannis Neokosmidis; Antonio Pastor; Ludovic Jacquin; Georgios Gardikis


Archive | 2018

INTEGRITY VALUES FOR BEGINNING BOOTING INSTRUCTIONS

Ludovic Jacquin; Thomas M. Laffey; Adrian Shaw


Archive | 2017

ENCRYPTION FOR TRANSACTIONS IN A MEMORY FABRIC

Ludovic Jacquin; Liqun Chen; Chris I. Dalton


Archive | 2015

Remote attestation of a network endpoint device

Adrian Shaw; Ludovic Jacquin; David Plaquin

Collaboration


Dive into the Ludovic Jacquin's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Dimitris Katsianis

National and Kapodistrian University of Athens

View shared research outputs
Top Co-Authors

Avatar

Ioannis Neokosmidis

National and Kapodistrian University of Athens

View shared research outputs
Top Co-Authors

Avatar

Nikolaos Papadakis

National and Kapodistrian University of Athens

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge