Cookies Policy
The website need some cookies and similar means to function. If you permit us, we will use those means to collect data on your visits for aggregated statistics to improve our service. Find out More
Accept Reject
  • Menu
About

About

António Pinto has a PhD in Electrical and Computers Engineering from Porto University (2010). Currently, he is an Assistant Professor at Escola Superior de Tecnologia e Gestão (ESTG) of the Polytechnic of Porto, where he gives courses in computer networks, operating systems, network security and digital forensics. He is also a researcher of CRACS at INESC TEC research institute. His current research interests include information security management systems, computer and network security, digital forensics, and data privacy. António Pinto has published 15+ papers and participated in 5+ research projects, including the following European projects: Smart UNattended airborne sensor Network for detection of vessels used for cross border crime and irregular entrY (SUNNY), Media Ecosystem Deployment Through Ubiquitous Content-Aware Network Environments (IST ALICANTE), and End-to-End QoS through Integrated Management of Content, Networks and Terminals (ENTHRONE)

Interest
Topics
Details

Details

  • Name

    António Pinto
  • Role

    Senior Researcher
  • Since

    13th January 2005
004
Publications

2024

On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks

Authors
Lopes, J; Partida, A; Pinto, P; Pinto, A;

Publication
OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, PT I, OL2A 2023

Abstract
Information systems depend on security mechanisms to detect and respond to cyber-attacks. One of the most frequent attacks is the Distributed Denial of Service (DDoS): it impairs the performance of systems and, in the worst case, leads to prolonged periods of downtime that prevent business processes from running normally. To detect this attack, several supervised Machine Learning (ML) algorithms have been developed and companies use them to protect their servers. A key stage in these algorithms is feature pre-processing, in which, input data features are assessed and selected to obtain the best results in the subsequent stages that are required to implement supervised ML algorithms. In this article, an innovative approach for feature selection is proposed: the use of Visibility Graphs (VGs) to select features for supervised machine learning algorithms used to detect distributed DoS attacks. The results show that VG can be quickly implemented and can compete with other methods to select ML features, as they require low computational resources and they offer satisfactory results, at least in our example based on the early detection of distributed DoS. The size of the processed data appears as the main implementation constraint for this novel feature selection method.

2024

A blockchain architecture with smart contracts for an additive symbiotic network - a case study

Authors
Ferreira, IA; Palazzo, G; Pinto, A; Pinto, P; Sousa, P; Godina, R; Carvalho, H;

Publication
OPERATIONS MANAGEMENT RESEARCH

Abstract
Adopting innovative technologies such as blockchain and additive manufacturing can help organisations promote the development of additive symbiotic networks, thus pursuing higher sustainable goals and implementing circular economy strategies. These symbiotic networks correspond to industrial symbiosis networks in which wastes and by-products from other industries are incorporated into additive manufacturing processes. The adoption of blockchain technology in such a context is still in a nascent stage. Using the case study method, this research demonstrates the adoption of blockchain technology in an additive symbiotic network of a real-life context. The requirements to use a blockchain network are identified, and an architecture based on smart contracts is proposed as an enabler of the additive symbiotic network under study. The proposed solution uses the Hyperledger Fabric Attribute-Based Access Control as the distributed ledger technology. Even though this solution is still in the proof-of-concept stage, the results show that adopting it would allow the elimination of intermediary entities, keep available tracking records of the resources exchanged, and improve trust among the symbiotic stakeholders (that do not have any trust or cooperation mechanisms established before the symbiotic relationship). This study highlights that the complexity associated with introducing a novel technology and the technology's immaturity compared to other data storage technologies are some of the main challenges related to using blockchain technology in additive symbiotic networks.

2024

Use of Visibility Graphs for the Early Detection of DoS Attacks

Authors
Lopes, J; Pinto, P; Partida, A; Pinto, A;

Publication
2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR

Abstract
The world economy depends on information systems. Business value resides in the data stored on Information Technology (IT) systems and on the processes run with those data. Malicious actors target these IT systems to extract value out of them using different cyberattacks. Denial of Service (DoS) attacks are a common and harmful method to render IT systems connected to the Internet and, consequently, business processes running on top of them, unavailable. Cybersecurity researchers in the industry and academia are in search of early warning and detection systems to detect and mitigate these DoS attacks. This article proposes a novel early detection strategy for DoS attacks based on the information provided by Horizontal Visibility Graphs (HVG) and Natural Visibility Graphs (VG) obtained out of the network flows monitored at the receiving end of the attack. From the primary results obtained, this strategy can detect a DoS attack under 70ms and 30 packets. These results point out that the application HVGs and VGs is a relevant and promising research direction to prevent or mitigate the impact of a DoS attack.

2023

On the Implementation of a Blockchain-Assisted Academic Council Electronic Vote System

Authors
Alves, J; Pinto, A;

Publication
SMART CITIES

Abstract
The digitisation of administrative tasks and processes is a reality nowadays, translating into added value such as agility in process management, or simplified access to stored data. The digitisation of processes of decision-making in collegiate bodies, such as Academic Councils, is not yet a common reality. Voting acts are still carried out in person, or at most in online meetings, without having a real confirmation of the vote of each element. This is particularly complex to achieve in remote meeting scenarios, where connection breaks or interruptions of audio or video streams may exist. A new digital platform was already previously proposed. It considered decision-making, by voting in Academic Councils, to be supported by a system that guarantees the integrity of the decisions taken, even when meeting online. Our previous work mainly considered the overall design. In this work, we bettered the design and specification of our previous proposal and describe the implemented prototype, and validate and discuss the obtained results.

2023

On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities

Authors
Fernandes, R; Bugla, S; Pinto, P; Pinto, A;

Publication
SENSORS

Abstract
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP). However, the MISP was considered limited if its information was deemed as classified or shared only for a given period of time. A solution using searchable encryption techniques that better control the sharing of information was previously proposed by the same authors. This paper describes a prototype implementation for two key functionalities of the previous solution, considering multiple entities sharing information with each other: the symmetric key generation of a sharing group and the functionality to update a shared index. Moreover, these functionalities are evaluated regarding their performance, and enhancements are proposed to improve the performance of the implementation regarding its execution time. As the main result, the duration of the update process was shortened from around 2922 s to around 302 s, when considering a shared index with 100,000 elements. From the security analysis performed, the implementation can be considered secure, thus confirming the secrecy of the exchanged nonces. The limitations of the current implementation are depicted, and future work is pointed out.

Supervised
thesis

2019

Secure Remote Storage of Logs With Search Capabilities

Author
Rui Manuel Vieira Araújo

Institution
IPP-ESTG

2019

Forder application

Author
David Emanuel Torres Mendes

Institution
IPP-ESTG

2019

Sistema de gestão de eventos de segurança de informação em alta disponibilidade

Author
Hélio Celso Pinto de Sousa

Institution
IPP-ESTG

2019

Sistema de Consentimento Informado e Reputação persistido em Blockchain

Author
Hélder Miguel Ribeiro de Sousa

Institution
IPP-ESTG

2014

Admission Control based on End-to-end Delay Estimation to Enhance the Support of Real-Time Traffic in Wireless Sensor Networks

Author
Pedro Filipe Cruz Pinto

Institution
UP-FEUP