DCETE 2014 Abstracts


Short Papers
Paper Nr: 2
Title:

Adaptive Security in Smart Grid

Authors:

Raja Ben Abdessalem and Mohamed Hamdi

Abstract: Smart grid improves the efficiency and the availability of the power system. However, the huge complex network and the integration of information and communication technologies increase security and privacy threats that manifest themselves in real-time. Adaptive security can address these threats by adapting security controls to the dynamic changing requirements. This thesis proposes a risk-based adaptive security framework for smart grid that will manage data in real-time, estimate risks using game theory approach and apply the appropriate adaptive security decision-making.

Paper Nr: 3
Title:

Challenges in Identification in Future Computer Networks

Authors:

Libor PolĨák

Abstract: Modern computer networks bring new challenges, such as network address translation and short-lived IPv6 addresses. As a result the number of identifiers related to a single user increases. Consequently, old methods for identification of the traffic of a specific user are becoming weak. This research aims to tackle the challenges by linking partial identities of a subject together. This way, all traffic of specific groups of users can be identified and it can be treated in a personalised manner, e.g. important calls of a manager can be prioritised. We consider a distributed system that can link identities discovered from various sources. As an example, we investigated both local and remote identification. This research already resulted in several accepted papers concerning dynamic detection of IPv6 addresses and clock-skew-based identification. Current efforts are in the area of the proposal of the method to link different identities, in improvements of the remote identification techniques, and in designing an SDN-based control system expanding the proposed identity management system to network control, such as quality of service.

Paper Nr: 5
Title:

Vulnerability Assessment in Quantitative Risk Management Methodologies - State-of-the-Art and Challenges

Authors:

Raed Labassi and Mohamed Hamdi

Abstract: Quantitative risk analysis is primarily concerned with estimating the attributes associated to digital threats and assessing the potential brought by potential countermeasures in thwarting the corresponding attacks. Vulnerability analysis turns out to be a crucial step in this process. This paper proposes a new vulnerability assessment technique that supports the implementation of adaptive security engineering processes. This means that the system should dynamically enable security countermeasures and adapt the security parameters according to the threat impact. The major advantage of the proposed technique is that it allows the enforcement of a runtime protection of the sensitive assets.