Detecting Attack and Incident Zone System
A special issue of Information (ISSN 2078-2489). This special issue belongs to the section "Information Systems".
Deadline for manuscript submissions: closed (1 July 2021) | Viewed by 29766
Special Issue Editor
Interests: applied cryptography; IoT security; network security; wireless communications; forensics; hardware security; cybersecurity
Special Issues, Collections and Topics in MDPI journals
Special Issue Information
Dear Colleagues,
A widely known fact is that the cyber threat landscape is constantly changing. Sophisticated malware continuously discovers new paths to bypass ever-increasing security mechanisms; software and hardware vulnerabilities are uncovered almost on a daily basis; and malicious actors are changing their prime targets, attacking new emerging technologies including smart grids, autonomous cars and IoT networks. On the other hand, the defenders, manually or automatically, proactively or reactively, collaboratively or independently, are trying to counteract these cyber security challenges.
In this cybersecurity arms race, offensive security seems to be always at least one step ahead of defensive security. Network invasions go unnoticed for a significant period of time, and even when they are discovered, organizations are not able to pinpoint and isolate the incident zones. Thus, affected areas of an incident remain ambiguous, and responders cannot take accurate countermeasures or conduct triage effectively. Hence, there is a need to drive new research and develop new techniques to facilitate defensive security to restore balance in the cybersecurity arm race.
This Special Issue will focus on attack detection and incident zone systems with the attempt to solicit the latest technologies, solutions, case studies, and prototypes on this topic.
Topics of interest include but are not limited to:
- Identification of Incident zones
- Novel methods of attack detection
- Data driven and artificial intelligence based attack discovery
- Honeypots
- Cyber threat incident handling frameworks
- Kill chain detection in enterprise environments
- Tools for blue teams and defenders
- Incident handling for fog and edge computing
- Attack detection and incident handling for cyber physical systems and IoT networks
- Educational platforms and cyber ranges for defensive security
- Incident handling in cloud environments
- Detecting attacks in industrial control systems
- Forensics in 5G networks
- Machine learning for Incident triage and incident zone systems
- Threat intelligence
- Visual analytics for forensics and security Applications
- NFV-based security functions and services
- Attacks and incident handling in Software Defined Networks
- Biometrics attack detection
- Blockchain, auditing and incident management
- Security issues in cloud computing and E-health
- GDPR and improving security posture of organizations
Dr. Christoforos Ntantogian
Guest Editor
Manuscript Submission Information
Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.
Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Information is an international peer-reviewed open access monthly journal published by MDPI.
Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.
Keywords
- Identification of Incident zones
- Novel methods of attack detection
- Data driven and artificial intelligence based attack discovery
- Honeypots
- Cyber threat incident handling frameworks
- Kill chain detection in enterprise environments
- Tools for blue teams and defenders
- Incident handling for fog and edge computing
- Attack detection and incident handling for cyber physical systems and IoT networks
- Educational platforms and cyber ranges for defensive security
- Incident handling in cloud environments
- Detecting attacks in industrial control systems
- Forensics in 5G networks
- Machine learning for Incident triage and incident zone systems
- Threat intelligence
- Visual analytics for forensics and security applications
- NFV-based security functions and services
- Intrusion detection and incident handling in Software Defined Networks
- Biometrics attack detection
- Blockchain, auditing and incident management
- Security issues in cloud computing and E-health
- GDPR and improving security posture of organizations
Benefits of Publishing in a Special Issue
- Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
- Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
- Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
- External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
- e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.
Further information on MDPI's Special Issue polices can be found here.