Editorial System and Network Security: Anomaly Detection...

3
Editorial System and Network Security: Anomaly Detection and Monitoring Michele Vadursi, 1 Andrea Ceccarelli, 2 Elias P. Duarte Jr., 3 and Aniket Mahanti 4 1 University of Naples “Parthenope”, 80143 Napoli, Italy 2 University of Florence, 50134 Florence, Italy 3 Federal University of Paran´ a, 19018 Curitiba, PR, Brazil 4 University of Auckland, Auckland 1142, New Zealand Correspondence should be addressed to Michele Vadursi; [email protected] Received 9 May 2016; Accepted 9 May 2016 Copyright © 2016 Michele Vadursi et al. is is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Large-scale systems and networks oſten operate under vari- able and unpredictable conditions, thus requiring efficient and adaptive monitoring and error detection solutions. Furthermore, the increasing complexity and dynamicity of current systems and networks ask for solutions that infer the status by looking for anomalies rather than directly detecting errors. Anomalous behavior is an indication not only of hardware and soſtware faults, but also of security threats including intrusion attempts and frauds, which represent an increasingly relevant challenge from both scientific and socioeconomic point of view. e timely identification of anomalies in dependable systems allows timely error and security threat detection which can trigger appropriate reac- tions. is special issue covers a wide range of topics that are of interest to researchers and practitioners in the field of security and anomaly detection in computer systems and networks. e papers contained in this special issue include research articles focused on network intrusion detection, malware detection in mobile devices, clock synchronization vulnerabilities in industrial networks, privacy preservation in IP version 6, and abrupt changes of the available bandwidth. Distributed Denial of Service (DDoS) attacks are con- structed by malicious entities by flooding the target host with traffic thus denying it from servicing legitimate requests. Network intrusion detection systems are deployed to identify and thwart such attacks. Several techniques based on sig- natures and observed anomalies have been proposed in the literature. e paper by ¨ O. Cepheli et al. entitled “Hybrid Intrusion Detection System for DDoS Attacks” proposes a hybrid framework combining signature-based and anomaly- based methods for improved DDoS attack detection. Intrusion detection involves siſting through large amounts of network traffic. Data compression can improve the efficacy of the intrusion detection system. e paper entitled “SVM Intrusion Detection Model Based on Compressed Sampling” by S. Chen et al. presents a Support Vector Machine (SVM) intrusion detection model based on compressive sampling. e paper shows that by using compressed sensing theory the proposed SVM intrusion detection system can utilize a small sample of the network data for training its classifiers and detection time is reduced. With mobile device sales surpassing those of desktop devices, more people are connecting to the Internet through their smartphones and tablets. is shiſt to a new platform has attracted the attention of attackers to target mobile devices. O. Somarriba et al. in their paper entitled “Detection and Visualization of Android Malware Behavior” present a monitoring architecture to identify malicious Android applications. Clock synchronization is an important requirement in several industrial networks such as automation, stock market, and telecommunications. e IEEE 1588 standard allows clock synchronization across the nodes in an Ethernet net- work; however, this standard does not provide adequate security. In the paper entitled “Protecting Clock Synchroniza- tion: Adversary Detection through Network Monitoring” E. Lisova et al. describe clock synchronization vulnerabilities and evaluate solutions to mitigate these attacks. Hindawi Publishing Corporation Journal of Electrical and Computer Engineering Volume 2016, Article ID 2093790, 2 pages http://dx.doi.org/10.1155/2016/2093790

Transcript of Editorial System and Network Security: Anomaly Detection...

Page 1: Editorial System and Network Security: Anomaly Detection ...downloads.hindawi.com/journals/jece/2016/2093790.pdf · security threat detection which can trigger appropriate reac-tions.

EditorialSystem and Network Security:Anomaly Detection and Monitoring

Michele Vadursi,1 Andrea Ceccarelli,2 Elias P. Duarte Jr.,3 and Aniket Mahanti4

1University of Naples “Parthenope”, 80143 Napoli, Italy2University of Florence, 50134 Florence, Italy3Federal University of Parana, 19018 Curitiba, PR, Brazil4University of Auckland, Auckland 1142, New Zealand

Correspondence should be addressed to Michele Vadursi; [email protected]

Received 9 May 2016; Accepted 9 May 2016

Copyright © 2016 Michele Vadursi et al.This is an open access article distributed under theCreativeCommonsAttribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Large-scale systems and networks often operate under vari-able and unpredictable conditions, thus requiring efficientand adaptive monitoring and error detection solutions.Furthermore, the increasing complexity and dynamicity ofcurrent systems and networks ask for solutions that infer thestatus by looking for anomalies rather than directly detectingerrors. Anomalous behavior is an indication not only ofhardware and software faults, but also of security threatsincluding intrusion attempts and frauds, which representan increasingly relevant challenge from both scientific andsocioeconomic point of view. The timely identification ofanomalies in dependable systems allows timely error andsecurity threat detection which can trigger appropriate reac-tions.

This special issue covers a wide range of topics that areof interest to researchers and practitioners in the field ofsecurity and anomaly detection in computer systems andnetworks. The papers contained in this special issue includeresearch articles focused on network intrusion detection,malware detection in mobile devices, clock synchronizationvulnerabilities in industrial networks, privacy preservation inIP version 6, and abrupt changes of the available bandwidth.

Distributed Denial of Service (DDoS) attacks are con-structed by malicious entities by flooding the target hostwith traffic thus denying it from servicing legitimate requests.Network intrusion detection systems are deployed to identifyand thwart such attacks. Several techniques based on sig-natures and observed anomalies have been proposed in theliterature. The paper by O. Cepheli et al. entitled “HybridIntrusion Detection System for DDoS Attacks” proposes a

hybrid framework combining signature-based and anomaly-based methods for improved DDoS attack detection.

Intrusion detection involves sifting through largeamounts of network traffic. Data compression can improvethe efficacy of the intrusion detection system. The paperentitled “SVM Intrusion Detection Model Based onCompressed Sampling” by S. Chen et al. presents a SupportVector Machine (SVM) intrusion detection model basedon compressive sampling. The paper shows that by usingcompressed sensing theory the proposed SVM intrusiondetection system can utilize a small sample of the networkdata for training its classifiers and detection time isreduced.

With mobile device sales surpassing those of desktopdevices, more people are connecting to the Internet throughtheir smartphones and tablets. This shift to a new platformhas attracted the attention of attackers to target mobiledevices. O. Somarriba et al. in their paper entitled “Detectionand Visualization of Android Malware Behavior” presenta monitoring architecture to identify malicious Androidapplications.

Clock synchronization is an important requirement inseveral industrial networks such as automation, stockmarket,and telecommunications. The IEEE 1588 standard allowsclock synchronization across the nodes in an Ethernet net-work; however, this standard does not provide adequatesecurity. In the paper entitled “ProtectingClock Synchroniza-tion: Adversary Detection through Network Monitoring” E.Lisova et al. describe clock synchronization vulnerabilitiesand evaluate solutions to mitigate these attacks.

Hindawi Publishing CorporationJournal of Electrical and Computer EngineeringVolume 2016, Article ID 2093790, 2 pageshttp://dx.doi.org/10.1155/2016/2093790

Page 2: Editorial System and Network Security: Anomaly Detection ...downloads.hindawi.com/journals/jece/2016/2093790.pdf · security threat detection which can trigger appropriate reac-tions.

2 Journal of Electrical and Computer Engineering

Entities sharing sensitive information over the Internetshould remain anonymous. Address rotation of the senderand receiver can prevent an attacker from discovering theidentities of the communicating parties. The Moving Tar-get IPv6 Defense (MT6D) architecture implements useranonymity by automatically changing IP version 6 addresses.D. Basam et al. in their paper entitled “Strengthening MT6DDefenses with LXC-Based Honeypot Capabilities” extendtheir work on MT6D to study suspicious activity on thediscarded addresses and strengthen the MT6D parameters.

Available bandwidth is an important network perfor-mance metric, which helps in routing, Quality of Service(QoS), and traffic engineering on the Internet. D. SantoroandM. Vadursi in their paper entitled “Performance Analysisof a DEKF for Available Bandwidth Measurement” presenta characterization of a measurement algorithm based on aDiscrete-time Extended Kalman Filter (DEKF) for trackingabrupt changes of the available bandwidth.

We sincerely believe this special issue has highlightedrelevant emerging issues in security of computer systems andnetworks, in particular the Internet. We hope the researchresults presented in this special issue will enable the researchcommunity to further the field, by proposing novel andefficient solutions to challenges facing the computer systemsand network security community.

Acknowledgments

We thank the authors who made submissions to this specialissue and the reviewers for their support and detailed reviewsin making this special issue possible.

Michele VadursiAndrea CeccarelliElias P. Duarte Jr.Aniket Mahanti

Page 3: Editorial System and Network Security: Anomaly Detection ...downloads.hindawi.com/journals/jece/2016/2093790.pdf · security threat detection which can trigger appropriate reac-tions.

International Journal of

AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

RoboticsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Active and Passive Electronic Components

Control Scienceand Engineering

Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

International Journal of

RotatingMachinery

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporation http://www.hindawi.com

Journal ofEngineeringVolume 2014

Submit your manuscripts athttp://www.hindawi.com

VLSI Design

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Shock and Vibration

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Civil EngineeringAdvances in

Acoustics and VibrationAdvances in

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Electrical and Computer Engineering

Journal of

Advances inOptoElectronics

Hindawi Publishing Corporation http://www.hindawi.com

Volume 2014

The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014

SensorsJournal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Chemical EngineeringInternational Journal of Antennas and

Propagation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

Navigation and Observation

International Journal of

Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014

DistributedSensor Networks

International Journal of