Entity

Time filter

Source Type

Pontedera, Italy

Ficco M.,The Second University of Naples | Daidone A.,Resiltech Srl | Coppolino L.,Parthenope University of Naples | Romano L.,Parthenope University of Naples | Bondavalli A.,University of Florence
ACM International Conference Proceeding Series | Year: 2011

Supervisory Control and Data Acquisition (SCADA) systems control and monitor industrial and critical infrastructure functions, including gas, water, electricity, and railway. Despite a huge effort from research communities and industries have been made in addressing the dependability of SCADA systems, the diagnosis of SCADA malfunctions is still a challenging issue today. This paper proposes a Simple Event Correlator engine for diagnosis of malfunctions in SCADA systems based on a rule-based event correlation approach. In particular, it is used to detect and filter "relevant" symptoms useful for fault diagnosis in a SCADA infrastructure. Copyright © 2011 ACM. Source


Bovenzi A.,University of Naples Federico II | Brancati F.,Resiltech Srl | Russo S.,University of Naples Federico II | Bondavalli A.,University of Florence
IEEE Transactions on Dependable and Secure Computing | Year: 2015

Revealing anomalies at the operating system (OS) level to support online diagnosis activities of complex software systems is a promising approach when traditional detection mechanisms (e.g., based on event logs, probes and heartbeats) are inadequate or cannot be applied. In this paper we propose aconfigurable detection framework to reveal anomalies in the OS behavior, related to system misbehaviors. The detector is based on online statistical analysestechniques, and it is designed for systems that operate under variable andnon-stationary conditions. The framework is evaluated to detect the activation of software faults in a complex distributed system for Air Traffic Management (ATM). Results of experiments with two different OSs, namely Linux Red Hat EL5 and Windows Server 2008, show that the detector is effective for mission-critical systems. The framework can be configured to select the monitored indicators so as to tune the level of intrusivity. A sensitivity analysis of the detector parameters iscarried out to show their impact on the performance and to give to practitioners guidelines for its field tuning. © 2015 IEEE. Source


Coppolino L.,Parthenope University of Naples | Romano L.,Parthenope University of Naples | Bondavalli A.,University of Florence | Daidone A.,Resiltech Srl
International Journal of Critical Computer-Based Systems | Year: 2012

Wireless sensor network (WSN) technology is being increasingly used for data collection in critical infrastructures (CIs). This paper presents an intrusion detection system (IDS), which is able to protect a CI from attacks directed to its WSN-based parts. By providing accurate and timely detection of malicious activities, the proposed IDS solution ultimately results in a dramatic improvement in terms of protection, since opportunities are given for performing proper remediation/reconfiguration actions, which counter the attack and/or allow the system to tolerate it. The proposed solution has the important advantage of exploiting the high accuracy of hidden Markov models as an effective means of detecting malicious activities. We present the basic ideas, discuss the main implementation issues, and perform a preliminary experimental campaign, with respect to sinkhole attacks, one of the most serious attacks to WSNs. Copyright © 2012 Inderscience Enterprises Ltd. Source


Gallina B.,Malardalen University | Szatmari Z.,Resiltech Srl
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) | Year: 2015

Safety standards impose requirements on the process used to develop safety-critical systems. For certification purposes, manufacturers have to properly interpret and meet these requirements, which exhibit commonalities and variabilities. However, since different terms are used to state them, the comparative work aimed at manually identifying and managing these commonalities and variabilities is hard, time-consuming, and costly. In this paper, we propose to solve this problem by creating ontology-based models of safety standards and automate the comparative work. Then, we show how the result of this comparative study can be exploited to semi-automate the generation of safety-oriented process line models. To illustrate our solution, we apply it to portions of ISO 26262 and EN 50126. Finally, we draw our conclusions and future work. © Springer International Publishing Switzerland 2015. Source


Ceccarelli A.,University of Florence | Bondavalli A.,University of Florence | Brancati F.,Resiltech Srl | Mattina E.L.,Engineering Ing. Informatica S.p.A.
Proceedings of the IEEE Symposium on Reliable Distributed Systems | Year: 2012

Session management in distributed Internet services is traditionally based on username and password, and explicit logouts and timeouts that expire due to idle activity of the user. Emerging biometric solutions allow substituting username and password with biometric data, but still a single verification is deemed sufficient, and the identity of a user is considered immutable during the entire session. Additionally, the length of the timeout may impact on the usability of the service and consequent client satisfaction. This paper explores promising alternatives offered by biometrics for the management of sessions. A secure protocol is defined for perpetual authentication through continuous user verification. The protocol determines adaptive timeouts selected on the basis of the quality, frequency and type of biometric data acquired transparently from the user. Protocol behavior is shown through simulations. © 2012 IEEE. Source

Discover hidden collaborations