Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CTM

2023

A Taxonomy for Tsunami Security Scanner Plugins

Autores
Lima, G; Gonçalves, VH; Pinto, P;

Publicação
2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR

Abstract
Vulnerability scanning tools are essential in detecting systems weaknesses caused by vulnerabilities in their components or wrong configurations. Corporations may use these tools to assess a system in advance and fix its vulnerabilities, thus preventing or mitigating the impact of real attacks. A set of these tools are organized by plugins, each intended to check a specific vulnerability, such as the case of the Tsunami Security Scanner tool released in 2020 by Google. Multiple plugins for this tool were proposed in a community-based approach and thus, it is important for the users and research community to have these plugins in a framework consistently categorized across multiple sources and types. This paper proposes a comprehensive taxonomy for all the 61 plugins available, hierarchically sorted into 2 main categories, 4 categories, 4 subcategories, and 7 types. An analysis and a discussion on statistics by categories and types over time are also provided. The analysis shows that, so far, there are 4 main contributors, being Google, Community, Facebook, and Govtech. The Google source is still the top contributor counting 39 out of 61 plugins and the highest number of plugins available are in the RCE subcategory. The plugins available are mainly focused on critical and high vulnerabilities.

2023

Assessing Cybersecurity Hygiene and Cyber Threats Awareness in the Campus - A Case Study of Higher Education Institutions in Portugal and Poland

Autores
Oliveira, L; Chmielewski, A; Rutecka, P; Cicha, K; Rizun, M; Torres, N; Pinto, P;

Publicação
2023 IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND RESILIENCE, CSR

Abstract
Cybersecurity skills are of utmost importance to prevent or mitigate the impact of cyberattacks. In higher education, there are graduations related to Information Technology (IT), where students are expected to develop technical skills, including cybersecurity. Thus, it is relevant to assess students' cybersecurity awareness regarding cybersecurity hygiene and cyber threats when they start their academic studies and to verify whether there are context-dependent differences. This paper presents the results of an assessment regarding the cybersecurity awareness level of 110 first-year students from computer science graduations from two different countries, Poland and Portugal. The assessment was designed as a survey divided into the following two main groups of questions: (1) awareness regarding cybersecurity hygiene and (2) awareness regarding major cyber threats considered in the European Union Agency for Cybersecurity (ENISA) 2021 cyber threat report. The survey results show that Polish and Portuguese students present different self-perceptions and knowledge regarding cybersecurity hygiene and knowledge of cybersecurity. In these areas, Polish students are generally more confident than Portuguese students. Also, Polish students presented better scores around 70%, against the ones obtained by the Portuguese students, scoring around 58%.

2023

Towards data security assessments using an IDS security model for cyber-physical smart cities

Autores
Sangaiah, AK; Javadpour, A; Pinto, P;

Publicação
INFORMATION SCIENCES

Abstract
Technology has enabled many devices to exchange huge amounts of data and communicate with each other as Edge Intelligence in Smart Cities (EISC), as a result of rapid technological advancements. When dealing with personal data, it is paramount to ensure that it is not disclosed and that there is no disclosure of any confidential information. In recent decades, academics and industry have spent considerable time and energy discussing security and privacy. Other systems, known as intrusion detection systems, are required to breach firewalls, antivirus software, and other security equipment to provide complete system security in smart operation systems. There are three aspects to an intrusion detection system: the intrusion detection method, the architecture, and the intrusion response method. In this study, we combined linear correlation feature selection methods and cross-information. The database used in this article is KDD99. This paper examines applying two feature selection methods in predicting attacks in intrusion detection systems based on INTERACT and A multilayer perceptron (MLP). Since the number of records associated with each attack type differs, one of our suggestions is to continue using data balancing techniques. As a result, the number of records associated with each type of network status becomes closer together. The results in the categories can also be improved using information synthesis methods, such as majority voting.

2023

3rd Symposium of applied science for young researchers: short papers

Autores
Fernandes, Florbela P. (Ed.); Morais, Pedro (Ed.); Pinto, Pedro (Ed.);

Publicação
SASYR 2023

Abstract
These are the short papers proceedings of the 3rd Symposium of Applied Science for Young Researchers – SASYR. This scientific event welcomed works by junior researchers on any research topic covered by the following three research centers: ADiT-lab (from IPVC, Instituto Politécnico de Viana do Castelo), 2Ai (from IPCA, Instituto Politécnico do Cávado e do Ave) and CeDRI (from IPB, Instituto Politécnico de Bragança). The main objective of SASYR is to provide a friendly and relaxed environment for young researchers to present their work, discuss recent results, and develop new ideas. In this way, this event offered an opportunity for the ADiT-lab, 2Ai, and CeDRI research communities to gather synergies and promote collaborations, thus improving the quality of their research. The SASYR 2023 took place at Instituto Politécnico do Cávado e do Ave, Barcelos, Portugal, on the 11th of July, 2023.

2023

On the Analysis of Computational Delays in Reinforcement Learning-Based Rate Adaptation Algorithms

Autores
Trancoso, R; Pinto, J; Queirós, R; Fontes, H; Campos, R;

Publicação
Simulation Tools and Techniques - 15th EAI International Conference, SIMUtools 2023, Seville, Spain, December 14-15, 2023, Proceedings

Abstract
Several research works have applied Reinforcement Learning (RL) algorithms to solve the Rate Adaptation (RA) problem in Wi-Fi networks. The dynamic nature of the radio link requires the algorithms to be responsive to changes in link quality. Delays in the execution of the algorithm due to implementional details may be detrimental to its performance, which in turn may decrease network performance. These delays can be avoided to a certain extent. However, this aspect has been overlooked in the state of the art when using simulated environments, since the computational delays are not considered. In this paper, we present an analysis of computational delays and their impact on the performance of RL-based RA algorithms, and propose a methodology to incorporate the experimental computational delays of the algorithms from running in a specific target hardware, in a simulation environment. Our simulation results considering the real computational delays showed that these delays do, in fact, degrade the algorithm’s execution and training capabilities which, in the end, has a negative impact on network performance. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024.

2023

Rate Adaptation Aware Positioning for Flying Gateways Using Reinforcement Learning

Autores
Pantaleão, G; Queirós, R; Fontes, H; Campos, R;

Publicação
Simulation Tools and Techniques - 15th EAI International Conference, SIMUtools 2023, Seville, Spain, December 14-15, 2023, Proceedings

Abstract
With the growing connectivity demands, Unmanned Aerial Vehicles (UAVs) have emerged as a prominent component in the deployment of Next Generation On-demand Wireless Networks. However, current UAV positioning solutions typically neglect the impact of Rate Adaptation (RA) algorithms or simplify its effect by considering ideal and non-implementable RA algorithms. This work proposes the Rate Adaptation aware RL-based Flying Gateway Positioning (RARL) algorithm, a positioning method for Flying Gateways that applies Deep Q-Learning, accounting for the dynamic data rate imposed by the underlying RA algorithm. The RARL algorithm aims to maximize the throughput of the flying wireless links serving one or more Flying Access Points, which in turn serve ground terminals. The performance evaluation of the RARL algorithm demonstrates that it is capable of taking into account the effect of the underlying RA algorithm and achieve the maximum throughput in all analysed static and mobile scenarios. © ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2024.

  • 41
  • 317