Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving

  • Hatzivasilis, George, Sotiris Ioannidis, Grigoris Kalogiannis, Manolis Chatzimpyrros, George Spanoudakis, Guillermo Jiménez Prieto, Araceli Rojas Morgan, Miguel Juaniz Lopez, Cataldo Basile, and Jose Francisco Ruiz.
  • Continuous Security Assurance of Modern Supply-Chain Ecosystems with Application in Autonomous Driving: The FISHY approach for the secure autonomous driving domain. In 2023 IEEE International Conference on Cyber Security and Resilience (CSR) (pp. 464-469)
Cyber security always forms a significant aspect of ICT infrastructure, with threats on supply-chain networks gaining greater attention nowadays. The secure autonomous driving domain presents a unique set of challenges for supply- chain security. Autonomous vehicles rely on a complex ecosystem of hardware and software components, many of which are sourced from third-party suppliers. Ensuring the security and reliability of this supply-chain is essential to maintain the safety and viability of autonomous driving as a technology.

A Model for Automated Cybersecurity Threat Remediation and Sharing

  • Settanni, F., Regano, L., Basile, C., & Lioy, A. (2023, June). A Model for Automated Cybersecurity Threat Remediation and Sharing. In 2023 IEEE 9th International Conference on Network Softwarization (NetSoft) (pp. 492-497). IEEE.
This paper presents an approach to the automatic remediation of threats reported by Cyber Threat Intelligence. Remediation strategies, named Recipes, are expressed in a close-to-natural language for easy validation. Thanks to the developed models, they are interpreted, contextualized, and then translated into CACAO Security playbooks, a standard format ready for automatic enforcement, without human intervention. The presented approach also allows sharing of remediation procedures on threat-sharing platforms (e.g. MISP) which improves the overall security posture.

A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M

  • Gonzalez, L. F., Vidal, I., Valera, F., Martin, R., & Artalejo, D. (2023). A Link-Layer Virtual Networking Solution for Cloud-Native Network Function Virtualisation Ecosystems: L2S-M. Future Internet, 15(8), 274.
Microservices have become promising candidates for the deployment of network and vertical functions in the fifth generation of mobile networks. However, microservice platforms like Kubernetes use a flat networking approach towards the connectivity of virtualised workloads, which prevents the deployment of network functions on isolated network segments (for example, the components of an IP Telephony system or a content distribution network).

An NIDS for Known and Zero-Day Anomalies

  • Hussain, A., Aguiló-Gost, F., Simó-Mezquita, E., Marín-Tordera, E., & Massip, X. (2023, April). An NIDS for Known and Zero-Day Anomalies. In 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN) (pp. 1-7). IEEE.
Rapid development in the network infrastructure has resulted in sophisticated attacks which are hard to detect using typical network intrusion detection systems (NIDS). There is a strong need for efficient NIDS to detect these known attacks along with ever-emerging zero-day exploits. Existing NIDS are more focused on detecting known attacks using supervised machine learning approaches, achieving better performance for known attacks but poor detection of unknown attacks. Many NIDS have utilized the unsupervised approach, which results in better detection of unknown anomalies.

Security in DevSecOps: Applying Tools and Machine Learning to Verification and Monitoring Steps

  • Cankar, M., Petrovic, N., Pita Costa, J., Cernivec, A., Antic, J., Martincic, T., & Stepec, D. (2023, April). Security in DevSecOps: Applying Tools and Machine Learning to Verification and Monitoring Steps.
  • In Companion of the 2023 ACM/SPEC International Conference on Performance Engineering (pp. 201-205).
Security represents one of the crucial concerns when it comes to De- vOps methodology-empowered software development and service delivery process. Considering the adoption of Infrastructure as Code (IaC), even minor flaws could potentially cause fatal consequences, especially in sensitive domains such as healthcare and maritime applications. However, most of the existing solutions tackle either Static Application Security Testing (SAST) or run-time behavior analysis distinctly.

Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs

  • Antić, J., Costa, J. P., Černivec, A., Cankar, M., Martinčič, T., Potočnik, A., ... & Boigues, I. T. (2023, April). Runtime security monitoring by an interplay between rule matching and deep learning-based anomaly detection on logs.
  • In 2023 19th International Conference on the Design of Reliable Communication Networks (DRCN) (pp. 1-5). IEEE.
In the era of digital transformation the increasing vulnerability of infrastructure and applications is often tied to the lack of technical capability and the improved intelligence of the attackers. In this paper, we discuss the complementarity between static security monitoring of rule matching and an application of self-supervised machine-learning to cybersecurity. Moreover, we analyse the context and challenges of supply chain resilience and smart logistics.

Providing Secure NFV Multi Site Connectivity Services

  • Manjón Cáliz, Jose Manuel; Nogales, Borja
New FISHY poster to be presented in EuCNC & 6G Summit, Gothenburg, 06-09 June 2023

A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection

  • Moreno-Sancho, A. A., Pastor, A., Martinez-Casanueva, I. D., González-Sánchez, D., & Triana, L. B. (2023, March). A data infrastructure for heterogeneous telemetry adaptation. Application to Netflow-based cryptojacking detection.
  • In 2023 26th Conference on Innovation in Clouds, Internet and Networks and Workshops (ICIN) (pp. 105-112). IEEE.
The increasing development of cryptocurrencies has brought cryptojacking as a new security threat in which attackers steal computing resources for cryptomining. The digitization of the supply chain is a potential major target for cryptojacking due to the large number of different infrastructures involved. These different infrastructures provide information sources that can be useful to detect cryptojacking, but with a wide variety of data formats and encodings. 

Incident Handling for Healthcare Organizations and Supply-Chains

  • Lakka, E., Hatzivasilis, G., Karagiannis, S., Alexopoulos, A., Athanatos, M., Ioannidis, S., ... & Spanoudakis, G. (2022, June). Incident Handling for Healthcare Organizations and Supply-Chains.
  • In 2022 IEEE Symposium on Computers and Communications (ISCC) (pp. 1-7). IEEE.
Healthcare ecosystems form a critical type of infrastructures that provide valuable services in today societies. However, the underlying sensitive information is also of interest of malicious entities around the globe, with the attack volume being continuously increasing.

A model of capabilities of Network Security Functions

  • Basile, C., Canavese, D., Regano, L., Pedone, I., & Lioy, A. (2022, June). A model of capabilities of Network Security Functions.
  • In 2022 IEEE 8th International Conference on Network Softwarization (NetSoft) (pp. 474-479). IEEE.
This paper presents a formal model of the features, named security capabilities, offered by the controls used for enforcing security policies in computer networks. It has been designed to support policy refinement and policy translation and address useful, practical tasks in a vendor-independent manner. The model adopts state-of-the-art design patterns and has been designed to be extensible. The model describes the actions that the controls can perform (e.g.