Change search
Link to record
Permanent link

Direct link
Publications (10 of 36) Show all publications
Ahmadi Mehri, V., Arlos, P. & Casalicchio, E. (2023). Automated Patch Management: An Empirical Evaluation Study. In: Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023: . Paper presented at 3rd IEEE International Conference on Cyber Security and Resilience, CSR 2023, July 31 - August 2, 2023, Venice. (pp. 321-328). IEEE
Open this publication in new window or tab >>Automated Patch Management: An Empirical Evaluation Study
2023 (English)In: Proceedings of the 2023 IEEE International Conference on Cyber Security and Resilience, CSR 2023, IEEE, 2023, p. 321-328Conference paper, Published paper (Refereed)
Abstract [en]

Vulnerability patch management is one of IT organizations' most complex issues due to the increasing number of publicly known vulnerabilities and explicit patch deadlines for compliance. Patch management requires human involvement in testing, deploying, and verifying the patch and its potential side effects. Hence, there is a need to automate the patch management procedure to keep the patch deadline with a limited number of available experts. This study proposed and implemented an automated patch management procedure to address mentioned challenges. The method also includes logic to automatically handle errors that might occur in patch deployment and verification. Moreover, the authors added an automated review step before patch management to adjust the patch prioritization list if multiple cumulative patches or dependencies are detected. The result indicated that our method reduced the need for human intervention, increased the ratio of successfully patched vulnerabilities, and decreased the execution time of vulnerability risk management.

Place, publisher, year, edition, pages
IEEE, 2023
Keywords
Vulnerability, Risk Management, Cybersecurity, Patch Management
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
urn:nbn:se:bth-24467 (URN)10.1109/CSR57506.2023.10224970 (DOI)001062143200050 ()2-s2.0-85171787878 (Scopus ID)9798350311709 (ISBN)
Conference
3rd IEEE International Conference on Cyber Security and Resilience, CSR 2023, July 31 - August 2, 2023, Venice.
Available from: 2023-04-24 Created: 2023-04-24 Last updated: 2024-01-02Bibliographically approved
Sundstedt, V., Boeva, V., Zepernick, H.-J., Goswami, P., Cheddad, A., Tutschku, K., . . . Arlos, P. (2023). HINTS: Human-Centered Intelligent Realities. In: Håkan Grahn, Anton Borg and Martin Boldt (Ed.), 35th Annual Workshop of the Swedish Artificial Intelligence Society SAIS 2023: . Paper presented at 35th Annual Workshop of the Swedish Artificial Intelligence Society SAIS 2023, Karlskrona, June 12-13, 2023 (pp. 9-17). Linköping University Electronic Press
Open this publication in new window or tab >>HINTS: Human-Centered Intelligent Realities
Show others...
2023 (English)In: 35th Annual Workshop of the Swedish Artificial Intelligence Society SAIS 2023 / [ed] Håkan Grahn, Anton Borg and Martin Boldt, Linköping University Electronic Press, 2023, p. 9-17Conference paper, Published paper (Refereed)
Abstract [en]

During the last decade, we have witnessed a rapiddevelopment of extended reality (XR) technologies such asaugmented reality (AR) and virtual reality (VR). Further, therehave been tremendous advancements in artificial intelligence(AI) and machine learning (ML). These two trends will havea significant impact on future digital societies. The vision ofan immersive, ubiquitous, and intelligent virtual space opensup new opportunities for creating an enhanced digital world inwhich the users are at the center of the development process,so-calledintelligent realities(IRs).The “Human-Centered Intelligent Realities” (HINTS) profileproject will develop concepts, principles, methods, algorithms,and tools for human-centered IRs, thus leading the wayfor future immersive, user-aware, and intelligent interactivedigital environments. The HINTS project is centered aroundan ecosystem combining XR and communication paradigms toform novel intelligent digital systems.HINTS will provide users with new ways to understand,collaborate with, and control digital systems. These novelways will be based on visual and data-driven platforms whichenable tangible, immersive cognitive interactions within realand virtual realities. Thus, exploiting digital systems in a moreefficient, effective, engaging, and resource-aware condition.Moreover, the systems will be equipped with cognitive featuresbased on AI and ML, which allow users to engage with digitalrealities and data in novel forms. This paper describes theHINTS profile project and its initial results. ©2023, Copyright held by the authors   

Place, publisher, year, edition, pages
Linköping University Electronic Press, 2023
Series
Linköping Electronic Conference Proceedings, ISSN 1650-3686, E-ISSN 1650-3740 ; 199
National Category
Human Computer Interaction
Identifiers
urn:nbn:se:bth-25413 (URN)10.3384/ecp199001 (DOI)9789180752749 (ISBN)
Conference
35th Annual Workshop of the Swedish Artificial Intelligence Society SAIS 2023, Karlskrona, June 12-13, 2023
Funder
Knowledge Foundation, 20220068
Available from: 2023-09-22 Created: 2023-09-22 Last updated: 2023-12-28Bibliographically approved
Ahmadi Mehri, V., Arlos, P. & Casalicchio, E. (2022). Automated Context-Aware Vulnerability Risk Management for Patch Prioritization. Electronics, 11(21), Article ID 3580.
Open this publication in new window or tab >>Automated Context-Aware Vulnerability Risk Management for Patch Prioritization
2022 (English)In: Electronics, E-ISSN 2079-9292, Vol. 11, no 21, article id 3580Article in journal (Refereed) Published
Abstract [en]

The information-security landscape continuously evolves by discovering new vulnerabilities daily and sophisticated exploit tools. Vulnerability risk management (VRM) is the most crucial cyber defense to eliminate attack surfaces in IT environments. VRM is a cyclical practice of identifying, classifying, evaluating, and remediating vulnerabilities. The evaluation stage of VRM is neither automated nor cost-effective, as it demands great manual administrative efforts to prioritize the patch. Therefore, there is an urgent need to improve the VRM procedure by automating the entire VRM cycle in the context of a given organization. The authors propose automated context-aware VRM (ACVRM), to address the above challenges. This study defines the criteria to consider in the evaluation stage of ACVRM to prioritize the patching. Moreover, patch prioritization is customized in an organization’s context by allowing the organization to select the vulnerability management mode and weigh the selected criteria. Specifically, this study considers four vulnerability evaluation cases: (i) evaluation criteria are weighted homogeneously; (ii) attack complexity and availability are not considered important criteria; (iii) the security score is the only important criteria considered; and (iv) criteria are weighted based on the organization’s risk appetite. The result verifies the proposed solution’s efficiency compared with the Rudder vulnerability management tool (CVE-plugin). While Rudder produces a ranking independent from the scenario, ACVRM can sort vulnerabilities according to the organization’s criteria and context. Moreover, while Rudder randomly sorts vulnerabilities with the same patch score, ACVRM sorts them according to their age, giving a higher security score to older publicly known vulnerabilities. © 2022 by the authors.

Place, publisher, year, edition, pages
MDPI, 2022
Keywords
patch prioritization, risk management, security management, vulnerability management
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-23982 (URN)10.3390/electronics11213580 (DOI)000883429300001 ()2-s2.0-85141721682 (Scopus ID)
Note

open access

Available from: 2022-11-24 Created: 2022-11-24 Last updated: 2023-04-26Bibliographically approved
Ahmadi Mehri, V., Arlos, P. & Casalicchio, E. (2021). Normalization Framework for Vulnerability Risk Management in Cloud. In: Proceedings - 2021 International Conference on Future Internet of Things and Cloud, FiCloud 2021: . Paper presented at 8th International Conference on Future Internet of Things and Cloud, FiCloud 2021, Virtual, Online, 23 August through 25 August 2021 (pp. 99-106). IEEE
Open this publication in new window or tab >>Normalization Framework for Vulnerability Risk Management in Cloud
2021 (English)In: Proceedings - 2021 International Conference on Future Internet of Things and Cloud, FiCloud 2021, IEEE, 2021, p. 99-106Conference paper, Published paper (Refereed)
Abstract [en]

Vulnerability Risk Management (VRM) is a critical element in cloud security that directly impacts cloud providers’ security assurance levels. Today, VRM is a challenging process because of the dramatic increase of known vulnerabilities (+26% in the last five years), and because it is even more dependent on the organization’s context. Moreover, the vulnerability’s severity score depends on the Vulnerability Database (VD) selected as a reference in VRM. All these factors introduce a new challenge for security specialists in evaluating and patching the vulnerabilities. This study provides a framework to improve the classification and evaluation phases in vulnerability risk management while using multiple vulnerability databases as a reference. Our solution normalizes the severity score of each vulnerability based on the selected security assurance level. The results of our study highlighted the role of the vulnerability databases in patch prioritization, showing the advantage of using multiple VDs.

Place, publisher, year, edition, pages
IEEE, 2021
Keywords
Risk Assessment, Vulnerability, Cloud security
National Category
Computer Systems
Research subject
Computer Science
Identifiers
urn:nbn:se:bth-22100 (URN)10.1109/FiCloud49777.2021.00022 (DOI)2-s2.0-85115338714 (Scopus ID)
Conference
8th International Conference on Future Internet of Things and Cloud, FiCloud 2021, Virtual, Online, 23 August through 25 August 2021
Available from: 2021-09-02 Created: 2021-09-02 Last updated: 2023-06-07Bibliographically approved
Ahmadi Mehri, V., Arlos, P. & Casalicchio, E. (2020). Normalization of Severity Rating for Automated Context-aware Vulnerability Risk Management. In: Proceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020: . Paper presented at 1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020, Virtual, Washington, United States, 17 August 2020 through 21 August 2020 (pp. 200-205). Institute of Electrical and Electronics Engineers (IEEE), Article ID 9196350.
Open this publication in new window or tab >>Normalization of Severity Rating for Automated Context-aware Vulnerability Risk Management
2020 (English)In: Proceedings - 2020 IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020, Institute of Electrical and Electronics Engineers (IEEE), 2020, p. 200-205, article id 9196350Conference paper, Published paper (Refereed)
Abstract [en]

In the last three years, the unprecedented increase in discovered vulnerabilities ranked with critical and high severity raise new challenges in Vulnerability Risk Management (VRM). Indeed, identifying, analyzing and remediating this high rate of vulnerabilities is labour intensive, especially for enterprises dealing with complex computing infrastructures such as Infrastructure-as-a-Service providers. Hence there is a demand for new criteria to prioritize vulnerabilities remediation and new automated/autonomic approaches to VRM.

In this paper, we address the above challenge proposing an Automated Context-aware Vulnerability Risk Management (AC- VRM) methodology that aims: to reduce the labour intensive tasks of security experts; to prioritize vulnerability remediation on the basis of the organization context rather than risk severity only. The proposed solution considers multiple vulnerabilities databases to have a great coverage on known vulnerabilities and to determine the vulnerability rank. After the description of the new VRM methodology, we focus on the problem of obtaining a single vulnerability score by normalization and fusion of ranks obtained from multiple vulnerabilities databases. Our solution is a parametric normalization that accounts for organization needs/specifications.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2020
Keywords
Self-protection, vulnerability, automation, Risk assessment
National Category
Computer Systems
Identifiers
urn:nbn:se:bth-20302 (URN)10.1109/ACSOS-C51401.2020.00056 (DOI)000719366200037 ()2-s2.0-85092716270 (Scopus ID)9781728184142 (ISBN)
Conference
1st IEEE International Conference on Autonomic Computing and Self-Organizing Systems Companion, ACSOS-C 2020, Virtual, Washington, United States, 17 August 2020 through 21 August 2020
Note

open access

Partially funded by the SmartDefense project n. RG11916B88C838E8.

Available from: 2020-08-18 Created: 2020-08-18 Last updated: 2023-06-07Bibliographically approved
Paladi, N., Svenningsson, J., Medina, J. & Arlos, P. (2019). Protecting OpenFlow Flow Tables with Intel SGX. In: PROCEEDINGS OF THE 2019 ACM SIGCOMM CONFERENCE POSTERS AND DEMOS (SIGCOMM '19): . Paper presented at Association for Computing Machinery's Special Interest Group on Data Communications, SIGCOMM, Beijing (pp. 146-147). Beijing: ACM Publications
Open this publication in new window or tab >>Protecting OpenFlow Flow Tables with Intel SGX
2019 (English)In: PROCEEDINGS OF THE 2019 ACM SIGCOMM CONFERENCE POSTERS AND DEMOS (SIGCOMM '19), Beijing: ACM Publications, 2019, p. 146-147Conference paper, Published paper (Refereed)
Place, publisher, year, edition, pages
Beijing: ACM Publications, 2019
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-18654 (URN)10.1145/3342280.3342339 (DOI)000523265400053 ()978-1-4503-6886-5 (ISBN)
Conference
Association for Computing Machinery's Special Interest Group on Data Communications, SIGCOMM, Beijing
Funder
Swedish Foundation for Strategic Research , RIT17-0035EU, Horizon 2020, 826093
Note

open access

Available from: 2019-09-13 Created: 2019-09-13 Last updated: 2021-10-07Bibliographically approved
Medina, J., Paladi, N. & Arlos, P. (2019). Protecting OpenFlow using Intel SGX. In: Horner L.,Tutschku K.,Granelli F.,Sekiya Y.,Tacca M.,Bhamare D.,Parzyjegla H. (Ed.), IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2019 - Proceedings: . Paper presented at 2019 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2019; Dallas; United States; 12 November 2019 through 14 November 2019. Institute of Electrical and Electronics Engineers Inc., Article ID 9039980.
Open this publication in new window or tab >>Protecting OpenFlow using Intel SGX
2019 (English)In: IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2019 - Proceedings / [ed] Horner L.,Tutschku K.,Granelli F.,Sekiya Y.,Tacca M.,Bhamare D.,Parzyjegla H., Institute of Electrical and Electronics Engineers Inc. , 2019, article id 9039980Conference paper, Published paper (Refereed)
Abstract [en]

OpenFlow flow tables in Open vSwitch contain valuable information about installed flows, priorities, packet actions and routing policies. Their importance is emphasized when collocated tenants compete for the limited entries available to install flow rules. OpenFlow flow tables are a security asset that requires confidentiality and integrity guarantees. However, commodity software switch implementations - such as Open vSwitch - do not implement protection mechanisms capable to prevent attackers from obtaining information about the installed flows or modifying flow tables. We adopt a novel approach to enabling OpenFlow flow table protection through decomposition. We identify core assets requiring security guarantees, isolate OpenFlow flow tables through decomposition and implement a prototype using Open vSwitch and Software Guard Extensions enclaves. An evaluation of the prototype on a distributed testbed both demonstrates that the approach is practical and indicates directions for further improvements. © 2019 IEEE.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers Inc., 2019
Keywords
confidentiality, integrity, Software Defined Networks, Software Guard Extentions, Software defined networking, Software prototyping, Transfer functions, Commodity software, Core asset, Flow tables, Open vswitch, Protection mechanisms, Routing policies, Network function virtualization
National Category
Computer Sciences
Identifiers
urn:nbn:se:bth-19427 (URN)10.1109/NFV-SDN47374.2019.9039980 (DOI)000685214600014 ()2-s2.0-85082985337 (Scopus ID)9781728145457 (ISBN)
Conference
2019 IEEE Conference on Network Function Virtualization and Software Defined Networks, NFV-SDN 2019; Dallas; United States; 12 November 2019 through 14 November 2019
Funder
Swedish Foundation for Strategic Research , RIT17-0035EU, Horizon 2020, 826093
Available from: 2020-05-04 Created: 2020-05-04 Last updated: 2021-12-22Bibliographically approved
Phan, H., Chu, T. M., Zepernick, H.-J. & Arlos, P. (2015). Packet Loss Priority of Cognitive Radio Networks with Partial Buffer Sharing. In: 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC): . Paper presented at IEEE International Conference on Communications (ICC), JUN 08-12, 2015, London, ENGLAND (pp. 7646-7652). IEEE Computer Society
Open this publication in new window or tab >>Packet Loss Priority of Cognitive Radio Networks with Partial Buffer Sharing
2015 (English)In: 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), IEEE Computer Society, 2015, p. 7646-7652Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we consider the application of partial buffer sharing to an M/G/1/K queueing system for cognitive radio networks (CRNs). It is assumed that the CRN is subject to Nakagami-m. fading. Secondary users are allowed to utilize the licensed radio spectrum of the primary users through underlay spectrum access. A finite buffer at the secondary transmitter is partitioned into two regions, the first region serves both classes of packets while the second region serves only packets of the highest priority class. Therefore, the examined CRN can be modeled as an M/G/1/K queueing system using partial buffer sharing. An embedded Markov chain is applied to analyze the queueing behavior of the system. Utilizing the balance equations and the normalized equation, the equilibrium state distribution of the system at an arbitrary time instant can be found. This outcome is utilized to investigate the impact of queue length, arrival rates, and fading parameters on queueing performance measures such as blocking probability, throughput, mean packet transmission time, channel utilization, mean number of packets in the system, and mean packet waiting time for each class of packets.

Place, publisher, year, edition, pages
IEEE Computer Society, 2015
Series
IEEE International Conference on Communications, ISSN 1550-3607
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-11854 (URN)000371708107145 ()978-1-4673-6432-4 (ISBN)
Conference
IEEE International Conference on Communications (ICC), JUN 08-12, 2015, London, ENGLAND
Available from: 2016-05-02 Created: 2016-05-02 Last updated: 2021-07-02Bibliographically approved
Ickin, S., Fiedler, M., Wac, K., Arlos, P., Temiz, C. & Mkocha, K. (2015). VLQoE: Video QoE instrumentation on the smartphone. Multimedia tools and applications, 74(2), 381-411
Open this publication in new window or tab >>VLQoE: Video QoE instrumentation on the smartphone
Show others...
2015 (English)In: Multimedia tools and applications, ISSN 1380-7501, E-ISSN 1573-7721, Vol. 74, no 2, p. 381-411Article in journal (Refereed) Published
Abstract [en]

The usage of network-demanding applications is growing rapidly such as video streaming on mobile terminals. However, network and/or service providers might not guarantee the perceived quality for video streaming that demands high packet transmission rate. In order to satisfy the user expectations and to minimize user churn, it is important for network operators to infer the end-user perceived quality in video streaming. Today, the most reliable method to obtain end-user perceived quality is through subjective tests, and the preferred location is the user interface as it is the closest point of application to the end-user. The end-user perceived quality on video streaming is highly influenced by occasional freezes; technically the extraordinary time gaps between two consecutive pictures that are displayed to the user, i.e., high inter-picture time. In this paper, we present a QoE instrumentation for video streaming, VLQoE. We added functionality to the VLC player to record a set of metrics from the user interface, application-level, network-level, and from the available sensors of the device. To the best of our knowledge, VLQoE is the first tool of its kind that can be used in user experiments for video streaming. By using the tool, we present a two state model based on the inter-picture time, for the HTTP- and RTSP-based video streaming via 3.5G. Next, we studied the influence of inter-picture time on the user perceived quality through out a user study. We investigated the minimum user perceived inter-picture time, and the user response time.

Place, publisher, year, edition, pages
Springer, 2015
Keywords
QoE (Quality of Experience), QoS (Quality of Service), Smartphone, Video, User interface, Human Computer Interaction (HCI)
National Category
Human Aspects of ICT Computer Sciences Media and Communications
Identifiers
urn:nbn:se:bth-6316 (URN)10.1007/s11042-014-1919-0 (DOI)000348445300005 ()oai:bth.se:forskinfo095163BDD4E8ABE6C1257CAF007391CD (Local ID)oai:bth.se:forskinfo095163BDD4E8ABE6C1257CAF007391CD (Archive number)oai:bth.se:forskinfo095163BDD4E8ABE6C1257CAF007391CD (OAI)
Note

http://link.springer.com/article/10.1007%2Fs11042-014-1919-0

Available from: 2015-05-26 Created: 2014-04-03 Last updated: 2021-05-04Bibliographically approved
Phan, H., Chu, T. M., Zepernick, H.-J. & Arlos, P. (2013). Delay and Throughput Analysis for Opportunistic Decode-and-Forward Relay Networks. In: : . Paper presented at International Conference on IEEE Computing, Management and Telecommunications (IEEE ComManTel). Ho Chi Minh City: IEEE
Open this publication in new window or tab >>Delay and Throughput Analysis for Opportunistic Decode-and-Forward Relay Networks
2013 (English)Conference paper, Published paper (Refereed)
Abstract [en]

In this paper, we develop a queueing analysis for opportunistic decode-and-forward (DF) relay networks. It is assumed that the networks undergo Nakagami-m fading and that the external arrival process follows a Poisson distribution. By selecting the best relay according to the opportunistic relaying scheme, the source first transmits its signal to the best relay which then attempts to decode the reception and forwards the output to the destination. It is assumed that each relay operates in full-duplex mode, i.e., it can receive and transmit signals simultaneously. The communication process throughout the network can be modeled as a queueing network which is structured from sub-systems of M/G/1 and G/G/1 queueing stations. We invoke the approximate analysis, so-called method of decomposition, to analyze the performance behavior of the considered relay network. The whole queueing network is broken into separate queues which are then investigated individually. Based on this approach, the end-to-end packet transmission time and throughput of the considered relay network are quantified in comparison with the networks with partial relay selection (PRS).

Place, publisher, year, edition, pages
Ho Chi Minh City: IEEE, 2013
National Category
Telecommunications
Identifiers
urn:nbn:se:bth-6956 (URN)000318220400051 ()oai:bth.se:forskinfo1C2EF0572687A59DC1257B940030F51E (Local ID)978-1-4673-2088-7 (ISBN)oai:bth.se:forskinfo1C2EF0572687A59DC1257B940030F51E (Archive number)oai:bth.se:forskinfo1C2EF0572687A59DC1257B940030F51E (OAI)
Conference
International Conference on IEEE Computing, Management and Telecommunications (IEEE ComManTel)
Available from: 2013-06-27 Created: 2013-06-24 Last updated: 2021-07-02Bibliographically approved
Organisations
Identifiers
ORCID iD: ORCID iD iconorcid.org/0000-0003-4494-9851

Search in DiVA

Show all publications