• Non ci sono risultati.

System and Network Security: Anomaly Detection and Monitoring

N/A
N/A
Protected

Academic year: 2021

Condividi "System and Network Security: Anomaly Detection and Monitoring"

Copied!
3
0
0

Testo completo

(1)

Editorial

System and Network Security:

Anomaly Detection and Monitoring

Michele Vadursi,

1

Andrea Ceccarelli,

2

Elias P. Duarte Jr.,

3

and Aniket Mahanti

4

1University of Naples “Parthenope”, 80143 Napoli, Italy 2University of Florence, 50134 Florence, Italy

3Federal University of Paran´a, 19018 Curitiba, PR, Brazil 4University of Auckland, Auckland 1142, New Zealand

Correspondence should be addressed to Michele Vadursi; vadursi@uniparthenope.it Received 9 May 2016; Accepted 9 May 2016

Copyright © 2016 Michele Vadursi et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Large-scale systems and networks often operate under vari-able and unpredictvari-able conditions, thus requiring efficient and adaptive monitoring and error detection solutions. Furthermore, the increasing complexity and dynamicity of current systems and networks ask for solutions that infer the status by looking for anomalies rather than directly detecting errors. Anomalous behavior is an indication not only of hardware and software faults, but also of security threats including intrusion attempts and frauds, which represent an increasingly relevant challenge from both scientific and socioeconomic point of view. The timely identification of anomalies in dependable systems allows timely error and security threat detection which can trigger appropriate reac-tions.

This special issue covers a wide range of topics that are of interest to researchers and practitioners in the field of security and anomaly detection in computer systems and networks. The papers contained in this special issue include research articles focused on network intrusion detection, malware detection in mobile devices, clock synchronization vulnerabilities in industrial networks, privacy preservation in IP version 6, and abrupt changes of the available bandwidth. Distributed Denial of Service (DDoS) attacks are con-structed by malicious entities by flooding the target host with traffic thus denying it from servicing legitimate requests. Network intrusion detection systems are deployed to identify and thwart such attacks. Several techniques based on sig-natures and observed anomalies have been proposed in the literature. The paper by ¨O. Cepheli et al. entitled “Hybrid Intrusion Detection System for DDoS Attacks” proposes a

hybrid framework combining signature-based and anomaly-based methods for improved DDoS attack detection.

Intrusion detection involves sifting through large amounts of network traffic. Data compression can improve the efficacy of the intrusion detection system. The paper entitled “SVM Intrusion Detection Model Based on Compressed Sampling” by S. Chen et al. presents a Support Vector Machine (SVM) intrusion detection model based on compressive sampling. The paper shows that by using compressed sensing theory the proposed SVM intrusion detection system can utilize a small sample of the network data for training its classifiers and detection time is reduced.

With mobile device sales surpassing those of desktop devices, more people are connecting to the Internet through their smartphones and tablets. This shift to a new platform has attracted the attention of attackers to target mobile devices. O. Somarriba et al. in their paper entitled “Detection and Visualization of Android Malware Behavior” present a monitoring architecture to identify malicious Android applications.

Clock synchronization is an important requirement in several industrial networks such as automation, stock market, and telecommunications. The IEEE 1588 standard allows clock synchronization across the nodes in an Ethernet net-work; however, this standard does not provide adequate security. In the paper entitled “Protecting Clock Synchroniza-tion: Adversary Detection through Network Monitoring” E. Lisova et al. describe clock synchronization vulnerabilities and evaluate solutions to mitigate these attacks.

Hindawi Publishing Corporation

Journal of Electrical and Computer Engineering Volume 2016, Article ID 2093790, 2 pages http://dx.doi.org/10.1155/2016/2093790

(2)

2 Journal of Electrical and Computer Engineering Entities sharing sensitive information over the Internet

should remain anonymous. Address rotation of the sender and receiver can prevent an attacker from discovering the identities of the communicating parties. The Moving Tar-get IPv6 Defense (MT6D) architecture implements user anonymity by automatically changing IP version 6 addresses. D. Basam et al. in their paper entitled “Strengthening MT6D Defenses with LXC-Based Honeypot Capabilities” extend their work on MT6D to study suspicious activity on the discarded addresses and strengthen the MT6D parameters.

Available bandwidth is an important network perfor-mance metric, which helps in routing, Quality of Service (QoS), and traffic engineering on the Internet. D. Santoro and M. Vadursi in their paper entitled “Performance Analysis of a DEKF for Available Bandwidth Measurement” present a characterization of a measurement algorithm based on a Discrete-time Extended Kalman Filter (DEKF) for tracking abrupt changes of the available bandwidth.

We sincerely believe this special issue has highlighted relevant emerging issues in security of computer systems and networks, in particular the Internet. We hope the research results presented in this special issue will enable the research community to further the field, by proposing novel and efficient solutions to challenges facing the computer systems and network security community.

Acknowledgments

We thank the authors who made submissions to this special issue and the reviewers for their support and detailed reviews in making this special issue possible.

Michele Vadursi Andrea Ceccarelli Elias P. Duarte Jr. Aniket Mahanti

(3)

International Journal of

Aerospace

Engineering

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Robotics

Journal of

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Active and Passive Electronic Components

Control Science and Engineering Journal of

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

International Journal of

Rotating Machinery

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Journal of

Engineering

Volume 2014

Submit your manuscripts at

http://www.hindawi.com

VLSI Design

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Shock and Vibration Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Civil Engineering

Advances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Advances in OptoElectronics

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

The Scientific

World Journal

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Sensors

Journal of Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Modelling & Simulation in Engineering

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Chemical Engineering

International Journal of Antennas and Propagation

International Journal of

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporation

http://www.hindawi.com Volume 2014

Distributed

Sensor Networks

Riferimenti

Documenti correlati

To train the neural network used in stage one to serve as an accurate filter, a large number of face and nonface im- ages are needed. Nearly 1,050 face examples were gathered from

Furthermore, we have been able to show that nuclear Ca 2+ spiking can also be activated by germinated spore exudates in both Medicago and carrot epidermal cells from the root

Mancando un libero dibattito sul contributo che le religioni, come altre espressioni del patrimonio umano intangibile, possono dare allo sviluppo della ricerca comune della pace,

Therefore the aims of this study were to investigate the expression profiles and protein profiles of candidate genes which have a high impact on the host’s disease response to

[r]

Existing invariant-based detection approaches, such as the ones proposed in [5,6], only consider a training dataset representing the correct behavior of a system to be used for

Currently, although the majority of works focus on research- ing algorithms that can yield improved detection results, a few studies have been dedicated to evaluating the reliability

In particular, the focus of this study is to compare the effects of oxaliplatin, a well-known neurotoxic anticancer agent, and of oleic acid Gc-protein-derived macrophage-activat-