Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Sobre

Sobre

António Pinto é doutorado em Engenharia Eletrotécnica e de Computadores, pela Universidade do Porto. O primeiro contacto com a segurança informática e as redes de computadores surgiu à mais de 15 anos, tendo se mantido até hoje. Atualmente desempenha a função de professor adjunto no Instituto Politécnico do Porto, onde ministra as cadeiras de Redes de Computadores, Sistemas Operativos, Segurança Informática e Informática Forense. Concilia esta atividade com a de investigador no CRACS no INESC TEC. Detêm certificações ISO 27001 Lead Implementer/Auditor.

Tópicos
de interesse
Detalhes

Detalhes

  • Nome

    António Pinto
  • Cargo

    Investigador Sénior
  • Desde

    13 janeiro 2005
004
Publicações

2024

On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks

Autores
Lopes, J; Partida, A; Pinto, P; Pinto, A;

Publicação
OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, PT I, OL2A 2023

Abstract
Information systems depend on security mechanisms to detect and respond to cyber-attacks. One of the most frequent attacks is the Distributed Denial of Service (DDoS): it impairs the performance of systems and, in the worst case, leads to prolonged periods of downtime that prevent business processes from running normally. To detect this attack, several supervised Machine Learning (ML) algorithms have been developed and companies use them to protect their servers. A key stage in these algorithms is feature pre-processing, in which, input data features are assessed and selected to obtain the best results in the subsequent stages that are required to implement supervised ML algorithms. In this article, an innovative approach for feature selection is proposed: the use of Visibility Graphs (VGs) to select features for supervised machine learning algorithms used to detect distributed DoS attacks. The results show that VG can be quickly implemented and can compete with other methods to select ML features, as they require low computational resources and they offer satisfactory results, at least in our example based on the early detection of distributed DoS. The size of the processed data appears as the main implementation constraint for this novel feature selection method.

2024

A blockchain architecture with smart contracts for an additive symbiotic network - a case study

Autores
Ferreira, IA; Palazzo, G; Pinto, A; Pinto, P; Sousa, P; Godina, R; Carvalho, H;

Publicação
OPERATIONS MANAGEMENT RESEARCH

Abstract
Adopting innovative technologies such as blockchain and additive manufacturing can help organisations promote the development of additive symbiotic networks, thus pursuing higher sustainable goals and implementing circular economy strategies. These symbiotic networks correspond to industrial symbiosis networks in which wastes and by-products from other industries are incorporated into additive manufacturing processes. The adoption of blockchain technology in such a context is still in a nascent stage. Using the case study method, this research demonstrates the adoption of blockchain technology in an additive symbiotic network of a real-life context. The requirements to use a blockchain network are identified, and an architecture based on smart contracts is proposed as an enabler of the additive symbiotic network under study. The proposed solution uses the Hyperledger Fabric Attribute-Based Access Control as the distributed ledger technology. Even though this solution is still in the proof-of-concept stage, the results show that adopting it would allow the elimination of intermediary entities, keep available tracking records of the resources exchanged, and improve trust among the symbiotic stakeholders (that do not have any trust or cooperation mechanisms established before the symbiotic relationship). This study highlights that the complexity associated with introducing a novel technology and the technology's immaturity compared to other data storage technologies are some of the main challenges related to using blockchain technology in additive symbiotic networks.

2024

Use of Visibility Graphs for the Early Detection of DoS Attacks

Autores
Lopes, J; Pinto, P; Partida, A; Pinto, A;

Publicação
2024 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR

Abstract
The world economy depends on information systems. Business value resides in the data stored on Information Technology (IT) systems and on the processes run with those data. Malicious actors target these IT systems to extract value out of them using different cyberattacks. Denial of Service (DoS) attacks are a common and harmful method to render IT systems connected to the Internet and, consequently, business processes running on top of them, unavailable. Cybersecurity researchers in the industry and academia are in search of early warning and detection systems to detect and mitigate these DoS attacks. This article proposes a novel early detection strategy for DoS attacks based on the information provided by Horizontal Visibility Graphs (HVG) and Natural Visibility Graphs (VG) obtained out of the network flows monitored at the receiving end of the attack. From the primary results obtained, this strategy can detect a DoS attack under 70ms and 30 packets. These results point out that the application HVGs and VGs is a relevant and promising research direction to prevent or mitigate the impact of a DoS attack.

2023

On the Implementation of a Blockchain-Assisted Academic Council Electronic Vote System

Autores
Alves, J; Pinto, A;

Publicação
SMART CITIES

Abstract
The digitisation of administrative tasks and processes is a reality nowadays, translating into added value such as agility in process management, or simplified access to stored data. The digitisation of processes of decision-making in collegiate bodies, such as Academic Councils, is not yet a common reality. Voting acts are still carried out in person, or at most in online meetings, without having a real confirmation of the vote of each element. This is particularly complex to achieve in remote meeting scenarios, where connection breaks or interruptions of audio or video streams may exist. A new digital platform was already previously proposed. It considered decision-making, by voting in Academic Councils, to be supported by a system that guarantees the integrity of the decisions taken, even when meeting online. Our previous work mainly considered the overall design. In this work, we bettered the design and specification of our previous proposal and describe the implemented prototype, and validate and discuss the obtained results.

2023

On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities

Autores
Fernandes, R; Bugla, S; Pinto, P; Pinto, A;

Publicação
SENSORS

Abstract
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP). However, the MISP was considered limited if its information was deemed as classified or shared only for a given period of time. A solution using searchable encryption techniques that better control the sharing of information was previously proposed by the same authors. This paper describes a prototype implementation for two key functionalities of the previous solution, considering multiple entities sharing information with each other: the symmetric key generation of a sharing group and the functionality to update a shared index. Moreover, these functionalities are evaluated regarding their performance, and enhancements are proposed to improve the performance of the implementation regarding its execution time. As the main result, the duration of the update process was shortened from around 2922 s to around 302 s, when considering a shared index with 100,000 elements. From the security analysis performed, the implementation can be considered secure, thus confirming the secrecy of the exchanged nonces. The limitations of the current implementation are depicted, and future work is pointed out.

Teses
supervisionadas

2019

Forder application

Autor
David Emanuel Torres Mendes

Instituição
IPP-ESTG

2019

Sistema de gestão de eventos de segurança de informação em alta disponibilidade

Autor
Hélio Celso Pinto de Sousa

Instituição
IPP-ESTG

2019

Sistema de Consentimento Informado e Reputação persistido em Blockchain

Autor
Hélder Miguel Ribeiro de Sousa

Instituição
IPP-ESTG

2019

Secure Remote Storage of Logs With Search Capabilities

Autor
Rui Manuel Vieira Araújo

Instituição
IPP-ESTG

2014

Admission Control based on End-to-end Delay Estimation to Enhance the Support of Real-Time Traffic in Wireless Sensor Networks

Autor
Pedro Filipe Cruz Pinto

Instituição
UP-FEUP