Special Issue "Security of Systems and Software Resiliency"

Quicklinks

A special issue of Future Internet (ISSN 1999-5903).

Deadline for manuscript submissions: closed (1 February 2013)

Special Issue Editors

Guest Editor
Dr. Jean-Francois Lalande (Website)

LIFO, Bâtiment IIIA, Rue Léonard de Vinci, B.P. 6759, F-45067 Orleans, Cedex 2, France
Fax: +33 2 48 48 40 50
Guest Editor
Dr. Francoise Sailhan (Website)

Laboratoire Cedric, CNAM, 292 Rue St Martin, 75141 Paris, cedex 03, France
Interests: security of systems; software safety

Special Issue Information

Dear Colleagues,

This special issue aims at bringing together contributions of researchers and practitioners working in the areas of system security and dependability in relation with the Internet of the things. Many systems are highly connected and distributed over the internet. These systems require innovative policies, trust enforcement and reliable infrastructures to provide safe software services. This special issue focuses on all aspect of security and reliability of such connected systems. These aspects remain in relation with a wide range of other topics such as programming languages, operating systems, middlewares, intrusion detection, evaluation and measure, architecture setup, transactions, visualization. These topics and their particular relations with the security of connected systems are the main interests of this special issue.

This special issue also publishes selected contributions from the 3SL workshop (http://www.univ-orleans.fr/lifo/evenements/3SL/index.php). The 3SL worshop is collocated with IEEE iThings'12 which focuses on the Internet of Things. The authors of the best papers presented at the 3SL workshop will be invited to submit extended versions of their paper to this special issue.

Dr. Jean-Francois Lalande
Dr. Francoise Sailhan
Guest Editor

Submission

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. Papers will be published continuously (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are refereed through a peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed Open Access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 500 CHF (Swiss Francs). English correction and/or formatting fees of 250 CHF (Swiss Francs) will be charged in certain cases for those articles accepted for publication that require extensive additional formatting and/or English corrections.

Keywords

  • security
  • reliability
  • dependability

Published Papers (3 papers)

View options order results:
result details:
Displaying articles 1-3
Export citation of selected articles as:

Research

Open AccessArticle Network Traffic Features for Anomaly Detection in Specific Industrial Control System Network
Future Internet 2013, 5(4), 460-473; doi:10.3390/fi5040460
Received: 27 June 2013 / Revised: 5 August 2013 / Accepted: 10 September 2013 / Published: 25 September 2013
Cited by 4 | PDF Full-text (267 KB) | HTML Full-text | XML Full-text
Abstract
The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open [...] Read more.
The deterministic and restricted nature of industrial control system networks sets them apart from more open networks, such as local area networks in office environments. This improves the usability of network security, monitoring approaches that would be less feasible in more open environments. One of such approaches is machine learning based anomaly detection. Without proper customization for the special requirements of the industrial control system network environment, many existing anomaly or misuse detection systems will perform sub-optimally. A machine learning based approach could reduce the amount of manual customization required for different industrial control system networks. In this paper we analyze a possible set of features to be used in a machine learning based anomaly detection system in the real world industrial control system network environment under investigation. The network under investigation is represented by architectural drawing and results derived from network trace analysis. The network trace is captured from a live running industrial process control network and includes both control data and the data flowing between the control network and the office network. We limit the investigation to the IP traffic in the traces. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Open AccessArticle Design and Implementation of a Hybrid Ontological-Relational Data Repository for SIEM Systems
Future Internet 2013, 5(3), 355-375; doi:10.3390/fi5030355
Received: 26 April 2013 / Revised: 10 June 2013 / Accepted: 17 June 2013 / Published: 9 July 2013
Cited by 1 | PDF Full-text (1006 KB) | HTML Full-text | XML Full-text
Abstract
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage [...] Read more.
The technology of Security Information and Event Management (SIEM) becomes one of the most important research applications in the area of computer network security. The overall functionality of SIEM systems depends largely on the quality of solutions implemented at the data storage level, which is purposed for the representation of heterogeneous security events, their storage in the data repository, and the extraction of relevant data for analytical modules of SIEM systems. The paper discusses the key issues of design and implementation of a hybrid SIEM data repository, which combines relational and ontological data representations. Based on the analysis of existing SIEM systems and standards, the ontological approach is chosen as a core component of the repository, and an example of the ontological data model for vulnerabilities representation is outlined. The hybrid architecture of the repository is proposed for implementation in SIEM systems. Since the most of works on the repositories of SIEM systems is based on the relational data model, the paper focuses mainly on the ontological part of the hybrid approach. To test the repository we used the data model intended for attack modeling and security evaluation, which includes both ontological and relational dimensions. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)
Figures

Open AccessArticle A Methodology for Retrieving Information from Malware Encrypted Output Files: Brazilian Case Studies
Future Internet 2013, 5(2), 140-167; doi:10.3390/fi5020140
Received: 18 February 2013 / Revised: 6 April 2013 / Accepted: 15 April 2013 / Published: 25 April 2013
Cited by 1 | PDF Full-text (2882 KB) | HTML Full-text | XML Full-text
Abstract
This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic [...] Read more.
This article presents and explains a methodology based on cryptanalytic and reverse engineering techniques that can be employed to quickly recover information from encrypted files generated by malware. The objective of the methodology is to minimize the effort with static and dynamic analysis, by using cryptanalysis and related knowledge as much as possible. In order to illustrate how it works, we present three case studies, taken from a big Brazilian company that was victimized by directed attacks focused on stealing information from a special purpose hardware they use in their environment. Full article
(This article belongs to the Special Issue Security of Systems and Software Resiliency)

Journal Contact

MDPI AG
Future Internet Editorial Office
St. Alban-Anlage 66, 4052 Basel, Switzerland
futureinternet@mdpi.com
Tel. +41 61 683 77 34
Fax: +41 61 302 89 18
Editorial Board
Contact Details Submit to Future Internet
Back to Top