Editorial System and Network Security: Anomaly Detection...
Transcript of Editorial System and Network Security: Anomaly Detection...
![Page 1: Editorial System and Network Security: Anomaly Detection ...downloads.hindawi.com/journals/jece/2016/2093790.pdf · security threat detection which can trigger appropriate reac-tions.](https://reader036.fdocuments.us/reader036/viewer/2022070811/5f09e26a7e708231d428f67d/html5/thumbnails/1.jpg)
EditorialSystem and Network Security:Anomaly Detection and Monitoring
Michele Vadursi,1 Andrea Ceccarelli,2 Elias P. Duarte Jr.,3 and Aniket Mahanti4
1University of Naples “Parthenope”, 80143 Napoli, Italy2University of Florence, 50134 Florence, Italy3Federal University of Parana, 19018 Curitiba, PR, Brazil4University of Auckland, Auckland 1142, New Zealand
Correspondence should be addressed to Michele Vadursi; [email protected]
Received 9 May 2016; Accepted 9 May 2016
Copyright © 2016 Michele Vadursi et al.This is an open access article distributed under theCreativeCommonsAttribution License,which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.
Large-scale systems and networks often operate under vari-able and unpredictable conditions, thus requiring efficientand adaptive monitoring and error detection solutions.Furthermore, the increasing complexity and dynamicity ofcurrent systems and networks ask for solutions that infer thestatus by looking for anomalies rather than directly detectingerrors. Anomalous behavior is an indication not only ofhardware and software faults, but also of security threatsincluding intrusion attempts and frauds, which representan increasingly relevant challenge from both scientific andsocioeconomic point of view. The timely identification ofanomalies in dependable systems allows timely error andsecurity threat detection which can trigger appropriate reac-tions.
This special issue covers a wide range of topics that areof interest to researchers and practitioners in the field ofsecurity and anomaly detection in computer systems andnetworks. The papers contained in this special issue includeresearch articles focused on network intrusion detection,malware detection in mobile devices, clock synchronizationvulnerabilities in industrial networks, privacy preservation inIP version 6, and abrupt changes of the available bandwidth.
Distributed Denial of Service (DDoS) attacks are con-structed by malicious entities by flooding the target hostwith traffic thus denying it from servicing legitimate requests.Network intrusion detection systems are deployed to identifyand thwart such attacks. Several techniques based on sig-natures and observed anomalies have been proposed in theliterature. The paper by O. Cepheli et al. entitled “HybridIntrusion Detection System for DDoS Attacks” proposes a
hybrid framework combining signature-based and anomaly-based methods for improved DDoS attack detection.
Intrusion detection involves sifting through largeamounts of network traffic. Data compression can improvethe efficacy of the intrusion detection system. The paperentitled “SVM Intrusion Detection Model Based onCompressed Sampling” by S. Chen et al. presents a SupportVector Machine (SVM) intrusion detection model basedon compressive sampling. The paper shows that by usingcompressed sensing theory the proposed SVM intrusiondetection system can utilize a small sample of the networkdata for training its classifiers and detection time isreduced.
With mobile device sales surpassing those of desktopdevices, more people are connecting to the Internet throughtheir smartphones and tablets. This shift to a new platformhas attracted the attention of attackers to target mobiledevices. O. Somarriba et al. in their paper entitled “Detectionand Visualization of Android Malware Behavior” presenta monitoring architecture to identify malicious Androidapplications.
Clock synchronization is an important requirement inseveral industrial networks such as automation, stockmarket,and telecommunications. The IEEE 1588 standard allowsclock synchronization across the nodes in an Ethernet net-work; however, this standard does not provide adequatesecurity. In the paper entitled “ProtectingClock Synchroniza-tion: Adversary Detection through Network Monitoring” E.Lisova et al. describe clock synchronization vulnerabilitiesand evaluate solutions to mitigate these attacks.
Hindawi Publishing CorporationJournal of Electrical and Computer EngineeringVolume 2016, Article ID 2093790, 2 pageshttp://dx.doi.org/10.1155/2016/2093790
![Page 2: Editorial System and Network Security: Anomaly Detection ...downloads.hindawi.com/journals/jece/2016/2093790.pdf · security threat detection which can trigger appropriate reac-tions.](https://reader036.fdocuments.us/reader036/viewer/2022070811/5f09e26a7e708231d428f67d/html5/thumbnails/2.jpg)
2 Journal of Electrical and Computer Engineering
Entities sharing sensitive information over the Internetshould remain anonymous. Address rotation of the senderand receiver can prevent an attacker from discovering theidentities of the communicating parties. The Moving Tar-get IPv6 Defense (MT6D) architecture implements useranonymity by automatically changing IP version 6 addresses.D. Basam et al. in their paper entitled “Strengthening MT6DDefenses with LXC-Based Honeypot Capabilities” extendtheir work on MT6D to study suspicious activity on thediscarded addresses and strengthen the MT6D parameters.
Available bandwidth is an important network perfor-mance metric, which helps in routing, Quality of Service(QoS), and traffic engineering on the Internet. D. SantoroandM. Vadursi in their paper entitled “Performance Analysisof a DEKF for Available Bandwidth Measurement” presenta characterization of a measurement algorithm based on aDiscrete-time Extended Kalman Filter (DEKF) for trackingabrupt changes of the available bandwidth.
We sincerely believe this special issue has highlightedrelevant emerging issues in security of computer systems andnetworks, in particular the Internet. We hope the researchresults presented in this special issue will enable the researchcommunity to further the field, by proposing novel andefficient solutions to challenges facing the computer systemsand network security community.
Acknowledgments
We thank the authors who made submissions to this specialissue and the reviewers for their support and detailed reviewsin making this special issue possible.
Michele VadursiAndrea CeccarelliElias P. Duarte Jr.Aniket Mahanti
![Page 3: Editorial System and Network Security: Anomaly Detection ...downloads.hindawi.com/journals/jece/2016/2093790.pdf · security threat detection which can trigger appropriate reac-tions.](https://reader036.fdocuments.us/reader036/viewer/2022070811/5f09e26a7e708231d428f67d/html5/thumbnails/3.jpg)
International Journal of
AerospaceEngineeringHindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
RoboticsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Active and Passive Electronic Components
Control Scienceand Engineering
Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
International Journal of
RotatingMachinery
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporation http://www.hindawi.com
Journal ofEngineeringVolume 2014
Submit your manuscripts athttp://www.hindawi.com
VLSI Design
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Shock and Vibration
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Civil EngineeringAdvances in
Acoustics and VibrationAdvances in
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Electrical and Computer Engineering
Journal of
Advances inOptoElectronics
Hindawi Publishing Corporation http://www.hindawi.com
Volume 2014
The Scientific World JournalHindawi Publishing Corporation http://www.hindawi.com Volume 2014
SensorsJournal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Modelling & Simulation in EngineeringHindawi Publishing Corporation http://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Chemical EngineeringInternational Journal of Antennas and
Propagation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
Navigation and Observation
International Journal of
Hindawi Publishing Corporationhttp://www.hindawi.com Volume 2014
DistributedSensor Networks
International Journal of