Security of Systems and Software Resiliency

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (1 February 2013) | Viewed by 29389

Special Issue Editors


E-Mail Website
Guest Editor
LIFO, Bâtiment IIIA, Rue Léonard de Vinci, B.P. 6759, F-45067 Orleans, Cedex 2, France

E-Mail Website
Guest Editor
Laboratoire Cedric, CNAM, 292 Rue St Martin, 75141 Paris, CEDEX 03, France
Interests: wireless networks; IoT; network configuration & management; distributed systems; security

Special Issue Information

Dear Colleagues,

This special issue aims at bringing together contributions of researchers and practitioners working in the areas of system security and dependability in relation with the Internet of the things. Many systems are highly connected and distributed over the internet. These systems require innovative policies, trust enforcement and reliable infrastructures to provide safe software services. This special issue focuses on all aspect of security and reliability of such connected systems. These aspects remain in relation with a wide range of other topics such as programming languages, operating systems, middlewares, intrusion detection, evaluation and measure, architecture setup, transactions, visualization. These topics and their particular relations with the security of connected systems are the main interests of this special issue.

This special issue also publishes selected contributions from the 3SL workshop (http://www.univ-orleans.fr/lifo/evenements/3SL/index.php). The 3SL worshop is collocated with IEEE iThings'12 which focuses on the Internet of Things. The authors of the best papers presented at the 3SL workshop will be invited to submit extended versions of their paper to this special issue.

Dr. Jean-Francois Lalande
Dr. Francoise Sailhan
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • security
  • reliability
  • dependability

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

267 KiB  
Article
Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network
by Matti Mantere, Mirko Sailio and Sami Noponen
Future Internet 2013, 5(4), 460-473; https://doi.org/10.3390/fi5040460 - 25 Sep 2013
Cited by 46 | Viewed by 8738
Abstract
The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. [...] Read more.
The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Show Figures

Figure 1

1006 KiB  
Article
Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
by Igor Kotenko, Olga Polubelova, Andrey Chechulin and Igor Saenko
Future Internet 2013, 5(3), 355-375; https://doi.org/10.3390/fi5030355 - 09 Jul 2013
Cited by 10 | Viewed by 11505
Abstract
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, [...] Read more.
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for the representation of heterogeneous security events, their storage in the data repository, and the extraction of relevant data for analytical modules of SIEM systems. The paper discusses the key issues of design and implementation of a hybrid SIEM data repository, which combines relational and ontological data representations. Based on the analysis of existing SIEM systems and standards, the ontological approach is chosen as a core component of the repository, and an example of the ontological data model for vulnerabilities representation is outlined. The hybrid architecture of the repository is proposed for implementation in SIEM systems. Since the most of works on the repositories of SIEM systems is based on the relational data model, the paper focuses mainly on the ontological part of the hybrid approach. To test the repository we used the data model intended for attack modeling and security evaluation, which includes both ontological and relational dimensions. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Show Figures

Graphical abstract

2882 KiB  
Article
A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies
by Nelson Uto
Future Internet 2013, 5(2), 140-167; https://doi.org/10.3390/fi5020140 - 25 Apr 2013
Cited by 3 | Viewed by 7711
Abstract
This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic analysis, [...] Read more.
This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic analysis, by using cryptanalysis and related knowledge as much as possible. In order to illustrate how it works, we present three case studies, taken from a big Brazilian company that was victimized by directed attacks focused on stealing information from a special purpose hardware they use in their environment. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Show Figures

Figure 1

Back to TopTop