{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:29:52Z","timestamp":1763458192938,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783031212796"},{"type":"electronic","value":"9783031212802"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21280-2_7","type":"book-chapter","created":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:30:15Z","timestamp":1668760215000},"page":"115-139","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["A Low-Cost and\u00a0Cloud Native Solution for\u00a0Security Orchestration, Automation, and\u00a0Response"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7638-7091","authenticated-orcid":false,"given":"Juan","family":"Christian","sequence":"first","affiliation":[]},{"given":"Luis","family":"Paulino","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6311-9672","authenticated-orcid":false,"given":"Alan Oliveira","family":"de S\u00e1","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,11,19]]},"reference":[{"key":"7_CR1","unstructured":"AWS: Amazon simple notification service. https:\/\/aws.amazon.com\/sns\/. Accessed 14 Aug 2022"},{"key":"7_CR2","unstructured":"AWS: Aws CloudFormation. https:\/\/aws.amazon.com\/cloudformation\/. Accessed 14 Aug 2022"},{"key":"7_CR3","unstructured":"AWS: Aws CloudFormation pricing. https:\/\/aws.amazon.com\/cloudformation\/pricing\/. Accessed 14 Aug 2022"},{"key":"7_CR4","unstructured":"AWS: Aws CodePipeline. https:\/\/aws.amazon.com\/codepipeline\/. Accessed 14 Aug 2022"},{"key":"7_CR5","unstructured":"AWS: Aws lambda. https:\/\/aws.amazon.com\/lambda\/. Accessed 14 Aug 2022"},{"key":"7_CR6","unstructured":"AWS: Aws lambda powertools for python. https:\/\/awslabs.github.io\/aws-lambda-powertools-python\/latest\/. Accessed 14 Aug 2022"},{"key":"7_CR7","unstructured":"AWS: Aws organizations. https:\/\/aws.amazon.com\/organizations\/. Accessed 14 Aug 2022"},{"key":"7_CR8","unstructured":"AWS: Aws secrets manager. https:\/\/aws.amazon.com\/secrets-manager\/. Accessed 14 Aug 2022"},{"key":"7_CR9","unstructured":"AWS: Aws secrets manager quotas. https:\/\/docs.aws.amazon.com\/secretsmanager\/latest\/userguide\/reference_limits.html. Accessed 14 Aug 2022"},{"key":"7_CR10","unstructured":"AWS: Aws serverless application model. https:\/\/aws.amazon.com\/cloudformation\/pricing\/. Accessed 14 Aug 2022"},{"key":"7_CR11","unstructured":"AWS: Aws step functions. https:\/\/aws.amazon.com\/step-functions\/. Accessed 14 Aug 2022"},{"key":"7_CR12","unstructured":"AWS: Aws step functions standard vs. express workflows. https:\/\/docs.aws.amazon.com\/step-functions\/latest\/dg\/concepts-standard-vs-express.html. Accessed 14 Aug 2022"},{"key":"7_CR13","unstructured":"AWS: Creating and sharing lambda layers. https:\/\/docs.aws.amazon.com\/lambda\/latest\/dg\/configuration-layers.html. Accessed 14 Aug 2022"},{"key":"7_CR14","unstructured":"AWS: pricing calculator. https:\/\/calculator.aws\/. Accessed 14 Aug 2022"},{"key":"7_CR15","unstructured":"AWS: service endpoints and quotas. https:\/\/docs.aws.amazon.com\/general\/latest\/gr\/aws-service-information.html. Accessed 14 Aug 2022"},{"key":"7_CR16","unstructured":"Beswick, J.: Operating lambda: performance optimization - part 1. https:\/\/aws.amazon.com\/blogs\/compute\/operating-lambda-performance-optimization-part-1\/. Accessed 14 Aug 2022"},{"key":"7_CR17","unstructured":"Neiva, C., et al.: Innovation insight for security orchestration, automation and response. https:\/\/www.gartner.com\/en\/documents\/3834578\/innovation-insight-for-security-orchestration-automation. Accessed 14 Aug 2022"},{"key":"7_CR18","unstructured":"McCandless, D., et al.: World\u2019s biggest data breaches & hacks. https:\/\/www.informationisbeautiful.net\/visualizations\/worlds-biggest-data-breaches-hacks\/. Accessed 14 Aug 2022"},{"key":"7_CR19","doi-asserted-by":"publisher","unstructured":"Edwards, W.K., Poole, E.S., Stoll, J.: Security automation considered harmful? In: Proceedings of the 2007 Workshop on New Security Paradigms. NSPW 2007, pp.. 33\u201342. Association for Computing Machinery, New York, NY, USA (2008). https:\/\/doi.org\/10.1145\/1600176.1600182","DOI":"10.1145\/1600176.1600182"},{"issue":"2","key":"7_CR20","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3305268","volume":"52","author":"C Islam","year":"2019","unstructured":"Islam, C., Babar, M.A., Nepal, S.: A multi-vocal review of security orchestration. ACM Comput. Surv. 52(2), 1\u201345 (2019). https:\/\/doi.org\/10.1145\/3305268","journal-title":"ACM Comput. Surv."},{"key":"7_CR21","unstructured":"Turpin, K., et al.: Owasp secure coding practices-quick reference guide. https:\/\/owasp.org\/www-project-secure-coding-practices-quick-reference-guide\/migrated_content. Accessed 14 Aug 2022"},{"key":"7_CR22","doi-asserted-by":"publisher","unstructured":"Luo, S., Ben Salem, M.: Orchestration of software-defined security services. In: IEEE International Conference on Communications Workshops (ICC), pp. 436\u2013441 (2016). DOI: https:\/\/doi.org\/10.1109\/ICCW.2016.7503826","DOI":"10.1109\/ICCW.2016.7503826"},{"key":"7_CR23","doi-asserted-by":"publisher","unstructured":"Montesino, R., Fenz, S.: Information security automation: how far can we go? In: 2011 Sixth International Conference on Availability, Reliability and Security. pp. 280\u2013285 (2011). DOI: https:\/\/doi.org\/10.1109\/ARES.2011.48","DOI":"10.1109\/ARES.2011.48"},{"key":"7_CR24","unstructured":"Souppaya , M., Scarfone, K., Dodson, D.: Sp 800\u2013218, secure software development framework (ssdf). https:\/\/csrc.nist.gov\/publications\/detail\/sp\/800-218\/final. Accessed 14 Aug 2022"},{"key":"7_CR25","doi-asserted-by":"publisher","first-page":"564","DOI":"10.2197\/ipsjjip.27.564","volume":"27","author":"M Ohmori","year":"2019","unstructured":"Ohmori, M.: On automation and orchestration of an initial computer security incident response by introducing centralized incident tracking system. J. Inf. Process. 27, 564\u2013573 (2019). https:\/\/doi.org\/10.2197\/ipsjjip.27.564","journal-title":"J. Inf. Process."},{"key":"7_CR26","unstructured":"Smith, B.: Orchestrating a security incident response with AWS step functions. https:\/\/aws.amazon.com\/blogs\/compute\/orchestrating-a-security-incident-response-with-aws-step-functions\/. Accessed 14 Aug 2022"},{"key":"7_CR27","doi-asserted-by":"publisher","unstructured":"Wang, W., Qiu, X., Sun, Li; Zhao, R.: A data driven orchestration framework in software defined security. In: IEEE International Conference on Communications Workshops (ICC), pp. 34\u201339 (2016). DOI: https:\/\/doi.org\/10.1109\/ICNIDC.2016.7974531","DOI":"10.1109\/ICNIDC.2016.7974531"}],"container-title":["Lecture Notes in Computer Science","Information Security Practice and Experience"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21280-2_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,18]],"date-time":"2022-11-18T08:32:15Z","timestamp":1668760335000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21280-2_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031212796","9783031212802"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21280-2_7","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"19 November 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ISPEC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Security Practice and Experience","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taipei","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Taiwan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 November 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ispec2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ispec2022.ndhu.edu.tw\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"87","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"38% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2.3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2 invited papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}