Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Sobre

Sobre

Pedro Pinto obteve o grau em Engenharia Electrotécnica e de Computadores e o grau de Mestrado em Redes e Serviços de Comunicação, ambos pela Universidade do Porto, Portugal. É doutorado na área de telecomunicações pelo programa doutoral conjunto pelas universidades do Minho, Aveiro e Porto, Portugal. Possui mais de 15 anos de experiência como docente em áreas de telecomunicações e redes de computadores. Atualmente, é Professor Adjunto no Instituto Politécnico de Viana do Castelo (IPVC) e investigador no INESC TEC. Os seus interesses de investigação incluem as areas das redes sem fio, routing, QoS e segurança.

Tópicos
de interesse
Detalhes

Detalhes

  • Nome

    Pedro Filipe Pinto
  • Cargo

    Investigador Colaborador Externo
  • Desde

    04 setembro 2009
001
Publicações

2024

On the Use of VGs for Feature Selection in Supervised Machine Learning - A Use Case to Detect Distributed DoS Attacks

Autores
Lopes, J; Partida, A; Pinto, P; Pinto, A;

Publicação
OPTIMIZATION, LEARNING ALGORITHMS AND APPLICATIONS, PT I, OL2A 2023

Abstract
Information systems depend on security mechanisms to detect and respond to cyber-attacks. One of the most frequent attacks is the Distributed Denial of Service (DDoS): it impairs the performance of systems and, in the worst case, leads to prolonged periods of downtime that prevent business processes from running normally. To detect this attack, several supervised Machine Learning (ML) algorithms have been developed and companies use them to protect their servers. A key stage in these algorithms is feature pre-processing, in which, input data features are assessed and selected to obtain the best results in the subsequent stages that are required to implement supervised ML algorithms. In this article, an innovative approach for feature selection is proposed: the use of Visibility Graphs (VGs) to select features for supervised machine learning algorithms used to detect distributed DoS attacks. The results show that VG can be quickly implemented and can compete with other methods to select ML features, as they require low computational resources and they offer satisfactory results, at least in our example based on the early detection of distributed DoS. The size of the processed data appears as the main implementation constraint for this novel feature selection method.

2024

The Status and Management of Web-Related Security at Higher Education Institutions in Poland

Autores
Barreto, J; Rutecka, P; Cicha, K; Pinto, P;

Publicação
International Conference on Information Systems Security and Privacy

Abstract
In an era marked by escalating cyber threats, the need for robust cybersecurity measures is paramount, especially for Higher Education Institutions (HEIs). As custodians of sensitive information, HEIs must ensure secure channels for data transmission to protect their stakeholders. These institutions should increase their cyber resilience, recognizing the heightened risk they face from cybercriminal activities. A breach in an HEI’s cybersecurity can have severe consequences, ranging from data confidentiality breaches to operational disruptions and damage to institutional reputation. This paper conducts a comprehensive evaluation of the cybersecurity mechanisms in HEIs within Poland. The focus is on assessing the adoption of important web security protocols—Hyper Text Transfer Protocol Secure (HTTPS) and Domain Name System Security Extensions (DNSSEC)—and the implementation of security headers on HEI websites. This study aims to provide a snapshot of the current cyber defense maturity in HEIs and to offer actionable insights for enhancing web security practices. The findings indicate a high adoption rate of HTTPS among HEIs, yet reveal significant gaps in web security practices. Also, there is a low adherence to security headers and an absence regarding DNSSEC implementation across the surveyed institutions. These results highlight crucial areas for improvement and underscore the need for HEIs in Poland to strengthen their web security measures, safeguarding their data and enhancing the overall cybersecurity resilience. © 2024 by SCITEPRESS – Science and Technology Publications, Lda.

2023

On the Performance of Secure Sharing of Classified Threat Intelligence between Multiple Entities

Autores
Fernandes, R; Bugla, S; Pinto, P; Pinto, A;

Publicação
SENSORS

Abstract
The sharing of cyberthreat information within a community or group of entities is possible due to solutions such as the Malware Information Sharing Platform (MISP). However, the MISP was considered limited if its information was deemed as classified or shared only for a given period of time. A solution using searchable encryption techniques that better control the sharing of information was previously proposed by the same authors. This paper describes a prototype implementation for two key functionalities of the previous solution, considering multiple entities sharing information with each other: the symmetric key generation of a sharing group and the functionality to update a shared index. Moreover, these functionalities are evaluated regarding their performance, and enhancements are proposed to improve the performance of the implementation regarding its execution time. As the main result, the duration of the update process was shortened from around 2922 s to around 302 s, when considering a shared index with 100,000 elements. From the security analysis performed, the implementation can be considered secure, thus confirming the secrecy of the exchanged nonces. The limitations of the current implementation are depicted, and future work is pointed out.

2023

Boosting additive circular economy ecosystems using blockchain: An exploratory case study

Autores
Ferreira, IA; Godina, R; Pinto, A; Pinto, P; Carvalho, H;

Publicação
COMPUTERS & INDUSTRIAL ENGINEERING

Abstract
The role of new technologies such as additive manufacturing and blockchain technology in designing and implementing circular economy ecosystems is not a trivial issue. This study aimed to understand if blockchain technology can be an enabler tool for developing additive symbiotic networks. A real case study was developed regarding a circular economy ecosystem in which a fused granular fabrication 3D printer is used to valorize polycarbonate waste. The industrial symbiosis network comprised four stakeholders: a manufacturing company that produces polycarbonate waste, a municipality service responsible for the city waste management, a start-up holding the 3D printer, and a non-profit store. It was identified a set of six requirements to adopt the blockchain technology in an additive symbiotic network, bearing in mind the need to have a database to keep track of the properties of the input material for the 3D printer during the exchanges, in addition to the inexistence of mechanisms of trust or cooperation between well-established industries and the additive manufacturing industry. The findings suggested a permissioned blockchain to support the implementation of the additive symbiotic network, namely, to enable the physical transactions (quantity and quality of waste material PC sheets) and monitoring and reporting (additive manufacturing technology knowledge and final product's quantity and price).Future research venues include developing blockchain-based systems that enhance the development of ad-ditive symbiotic networks.

2023

Prototyping the IDS Security Components in the Context of Industry 4.0 - A Textile and Clothing Industry Case Study

Autores
Torres, N; Chaves, A; Toscano, C; Pinto, P;

Publicação
Communications in Computer and Information Science

Abstract
With the introduction of Industry 4.0 technological concepts, suppliers and manufacturers envision new or improved products and services, cost reductions, and productivity gains. In this context, data exchanges between companies in the same or different activity sectors are necessary, while assuring data security and sovereignty. Thus, it is crucial to select and implement adequate standards which enable the interconnection requirements between companies and also feature security by design. The International Data Spaces (IDS) is a current standard that provides data sharing through data spaces mainly composed of homogeneous rules, certified data providers/consumers, and reliability between partners. Implementing IDS in sectors such as textile and clothing is expected to open new opportunities and challenges. This paper proposes a prototype for the IDS Security Components in the Textile and Clothing Industry context. This prototype assures data sovereignty and enables the interactions required by all participants in this supply chain industry using secure communications. The adoption of IDS as a base model in this activity sector fosters productive collaboration, lowers entry barriers for business partnerships, and enables an innovation environment. © 2023, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.