Cookies
O website necessita de alguns cookies e outros recursos semelhantes para funcionar. Caso o permita, o INESC TEC irá utilizar cookies para recolher dados sobre as suas visitas, contribuindo, assim, para estatísticas agregadas que permitem melhorar o nosso serviço. Ver mais
Aceitar Rejeitar
  • Menu
Publicações

Publicações por CTM

2022

Assessing the Relevance of Cybersecurity Training and Policies to Prevent and Mitigate the Impact of Phishing Attacks

Autores
Pinto, L; Brito, C; Marinho, V; Pinto, P;

Publicação
Journal of Internet Services and Information Security

Abstract
Social engineering attacks such as phishing are performed against companies and institutions and thus, cybersecurity awareness and training of technical and non-technical human resources play a fundamental role in preventing and mitigating a set of cyberattacks. This paper presents a comparative study based on simulated phishing attacks on two organizations with contrasting security practices and procedures. The first organization is a secondary school, with no IT staff, no defined information security policy, no guidance from top management on cybersecurity issues, and no training actions. The other is a company with a permanent IT staff, a defined security policy, and where its employees receive regular cybersecurity awareness training exercises. Two simulated phishing attack scenarios were deployed to compare these organisations regarding the behaviour of their employees and the readiness of their IT staff and to verify if the employees’ academic degree is a decisive criterion to protect them against this type of attack. The main results show that the rapid reporting and action of the IT staff in the organization where it existed, was an effective measure to mitigate the impact of the simulated phishing attack. In addition, the results show that about 18% of school employees leaked their data, compared to about 10% of the company. Furthermore, this study allows us to deduce that the academic level of employees does not seem to be a decisive criterion to protect them against phishing attacks. © 2022, Innovative Information Science and Technology Research Group. All rights reserved.

2022

Exploiting Physical Layer Vulnerabilities in LoRaWAN-based IoT Networks

Autores
Torres, N; Pinto, P; Lopes, SI;

Publicação
2022 IEEE 8TH WORLD FORUM ON INTERNET OF THINGS, WF-IOT

Abstract
Low Power Wide Area Networks (LPWAN) are used worldwide in several Internet of Things (IoT) applications that rely on large-scale deployments. Despite most of these networks include their own security mechanisms with built-in encryption, they are still vulnerable to a range of attacks that can be performed using low-cost Software Defined Radio (SDR) hardware and low-complexity techniques. This work provides an experimental setup implemented to exploit physical layer vulnerabilities with SDR techniques. Several attack vectors typically related to LPWAN within the IoT ecosystem are implemented and tested such as Global Positioning (GPS) Spoofing, Replay Attacks, Denial-of-Service (DoS) and Jamming, in environments that rely specifically on LoRaWAN networks. The results show that, in LoRAWAN networks, a set of vulnerabilities can be exploited leading to the incorrect functioning of the executed applications, and possible damage to the systems in which they operate. It was possible to verify that, depending on the type of activation method used between the devices and the LoRaWAN server, the communications and the devices can be compromised.

2022

NEWTR: a multipath routing for next hop destination in internet of things with artificial recurrent neural network (RNN)

Autores
Sumathi, AC; Javadpour, A; Pinto, P; Sangaiah, AK; Zhang, WZ; Khaniabadi, SM;

Publicação
INTERNATIONAL JOURNAL OF MACHINE LEARNING AND CYBERNETICS

Abstract
Internet of Things (IoT) and Wireless Sensor Networks (WSN) are a set of low-cost wireless sensors that can collect, process and send environment's data. WSN nodes are battery powered, therefore energy management is a key factor for long live network. One way to prolong lifetime of network is to utilize routing protocols to manage energy consumption. To have an energy efficient protocol in environment interactions, we can apply ZigBee protocols. Among these Artificial Intelligence Interactions routing methods, Tree Routing (TR) that acts in the tree network topology is considered a simple routing protocol with low overhead for ZigBee. In a tree topology, every nodes can be recognized as a parent or child of another node and in this regard, there is no circling. The most important problem of TR is increasing the number of steps to get data to the destination. To solve this problem several algorithms were proposed that its focus is on fewer steps. In this research we present an artificial Intelligence Tree Routing based on RNN and ZigBee protocol in IoT environment. Simulation results show that NEWTR improve the network lifetime by 5.549% and decreases the energy consumption (EC) of the network by 5.817% as compared with AODV routing protocol.

2022

An intelligent energy-efficient approach for managing IoE tasks in cloud platforms

Autores
Javadpour, A; Nafei, AH; Ja’fari, F; Pinto, P; Zhang, W; Sangaiah, AK;

Publicação
Journal of Ambient Intelligence and Humanized Computing

Abstract
Today, cloud platforms for Internet of Everything (IoE) are facilitating organizational and industrial growth, and have different requirements based on their different purposes. Usual task scheduling algorithms for distributed environments such as group of clusters, networks, and clouds, focus only on the shortest execution time, regardless of the power consumption. Network energy can be optimized if tasks are properly scheduled to be implemented in virtual machines, thus achieving green computing. In this research, Dynamic Voltage Frequency Dcaling (DVFS) is used in two different ways, to select a suitable candidate for scheduling the tasks with the help of an Artificial Intelligence (AI) approach. First, the GIoTDVFS_SFB method based on sorting processor elements in Cloud has been considered to handle Task Scheduling problem in the Clouds system. Alternatively, the GIoTDVFS_mGA microgenetic method has been used to select suitable candidates. The proposed mGA and SFB methods are compared with SLAbased suggested for Cloud environments, and it is shown that the Makespan and Gain in benchmarks 512 and 1024 are optimized in the proposed method. In addition, the Energy Consumption (EC) of Real PM (RPMs) against the numeral of Tasks has been considered with that of PAFogIoTDVFS and EnergyAwareDVFS methods in this area. © 2022, The Author(s), under exclusive licence to Springer-Verlag GmbH Germany, part of Springer Nature.

2022

Mapping and embedding infrastructure resource management in software defined networks

Autores
Javadpour, A; Ja'fari, F; Pinto, P; Zhang, WZ;

Publicação
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS

Abstract
Software-Defined Networking (SDN) is one of the promising and effective approaches to establishing network virtualization by providing a central controller to monitor network bandwidth and transmission devices. This paper studies resource allocation in SDN by mapping virtual networks on the infrastructure network. Considering mapping as a way to distribute tasks through the network, proper mapping methodologies will directly influence the efficiency of infrastructure resource management. Our proposed method is called Effective Initial Mapping in SDN (EIMSDN), and it suggests writing a module in the controller to initialize mapping by arriving at a new request if a sufficient number of resources are available. This would prevent rewriting the rules on the switches when remapping is necessary for an n-time window. We have also considered optimizing resource allocation in network virtualization with dynamic infrastructure resources management. We have done it by writing a module in OpenFlow controller to initialize mapping when there are sufficient resources. EIMSDN is compared with SDN-nR, SSPSM, and SDN-VN in criteria such as acceptance rates, cost, average switches resource utilization, and average link resource utilization.

2022

A hybrid heuristics artificial intelligence feature selection for intrusion detection classifiers in cloud of things

Autores
Sangaiah, AK; Javadpour, A; Ja'fari, F; Pinto, P; Zhang, WZ; Balasubramanian, S;

Publicação
CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS

Abstract
Cloud computing environments provide users with Internet-based services and one of their main challenges is security issues. Hence, using Intrusion Detection Systems (IDSs) as a defensive strategy in such environments is essential. Multiple parameters are used to evaluate the IDSs, the most important aspect of which is the feature selection method used for classifying the malicious and legitimate activities. We have organized this research to determine an effective feature selection method to increase the accuracy of the classifiers in detecting intrusion. A Hybrid Ant-Bee Colony Optimization (HABCO) method is proposed to convert the feature selection problem into an optimization problem. We examined the accuracy of HABCO with BHSVM, IDSML, DLIDS, HCRNNIDS, SVMTHIDS, ANNIDS, and GAPSAIDS. It is shown that HABCO has a higher accuracy compared with the mentioned methods.

  • 47
  • 322