Loading...
5 results
Search Results
Now showing 1 - 5 of 5
- Integração ubíqua - Proposta de modelo de integraçãoPublication . Henriques, João; Tomé, Paulo Rogério PerfeitoO paradigma de sistemas heterogéneos vem requerendo a implementação de novas abordagens que possibilitem o seu funcionamento como um todo. Atualmente, para se alcançar um nível de integração satisfatório, é necessário que cada um dos sistemas disponha no seu seio, de forma nativa, o conjunto de instruções que permitam invocar as funcionalidades que são disponibilizadas pelos demais sistemas. Os sistemas dispõem de capacidades de interligação distintas, baseando-se em protocolos de comunicação, que de todo não possuem as características que garantam o máximo partido das capacidades de integração. Esta dissertação pretende contribuir, com o seu trabalho, para a de nição de uma nova arquitetura passível de aplicação a qualquer sistema existente, visando reduzir a di culdade de desenho e implementação de soluções de integração. Esta nova abordagem tem como intuito agilizar e remover a complexidade relacionada com a de nição e com a implementação de soluções distribuídas, possibilitando aos diversos sistemas que implementem este modelo, um elevado grau de integração atrav és da utilização de um protocolo comum com benefícios em termos de redução de complexidade, tempo e custo de implementação. A arquitetura suportar-se-á sobre princípios de software livre, suportando-se nas tecnologias existentes, recorrendo a standards, como o XML, para a estruturação de uma linguagem de programação, que garanta o intercâmbio de instruções entre os diversos sistemas, para além da sua utilização já habitual na comunicação de dados. A de nição e o desenho desta arquitetura serão realizados recorrendo às metodologias de modelação UML. Um sistema que se encontre suportado nesta arquitetura, publicará aos restantes sistemas as funcionalidades que alberga, aceitando sobre uma interface o conjunto de instruções que utilizam as funcionalidades disponibilizadas pelo sistema. Esta arquitetura possibilitará a estruturação de diferentes tipologias relacionadas com a computação distribuída.
- An evolved security architecture for distributed industrial automation and control systemsPublication . Rosa, L.; Proença, J.; Henriques, João; Graveto, V.; Cruz, T.; Simões, P.; Caldeira, Filipe; Monteiro, E.Over the recent years, control and sensor systems used for IACS (Industrial Automation and Control Systems) have become more complex, due to the increasing number of interconnected distributed devices, sensors and actuators. Such components are often widely dispersed in the field – this is the case for microgeneration (wire-to-water generation, solar or wind), smart metering, oil and gas distribution or smart water management, among others. This IoT (Internet of Things)-centric IACS paradigm expands the infrastructure boundaries well beyond the single or aggregated-plant, mono-operator vision (mostly associated with geographically constrained systems topologies), being dispersed over a large geographic area, with increasingly small areas of coverage as we progress towards its periphery. This situation calls for a different approach to cyber threat detection, which is one of the most relevant contributions of the ATENA (Advanced Tools to assEss and mitigate the criticality of ICT components and their dependencies over critical infrAstructures) H2020 project (ATENA 2016). This paper presents and describes the ATENA cyber-security architecture, designed for the emerging generation of distributed IoT IACS, leveraging technologies such as Software Defined Networking/Network Function Virtualization and Big data event processing) within the scope of a cyber-detection architecture designed to deal with the inherent challenges of dispersed IACS, involved different operator domains.
- On the Use of Ontology Data for Protecting Critical InfrastructuresPublication . Henriques, João; Caldeira, Filipe; Cruz, Tiago; Simões, PauloModern societies increasingly depend on products and services provided by Critical Infrastructures (CI). The Security Information and Event Management (SIEM) systems in charge of protecting these CIs usually collect and process data from specialised sources. However, they usually integrate only a small fraction of the whole data sources existing in the CI. Valuable generic data sources are missing in this process, such as human resources databases, staff check clocks, and outsourced service providers. To address this gap, the authors propose a framework that takes a Semantic Web approach for automated collection and processing of corporate data from multiple heterogeneous sources.
- Knowledge retention through observation of instant messaging systemsPublication . Costa, João; P. Duarte, Rui; Cunha, Carlos; Henriques, JoãoKnowledge is the most valuable asset in today’s organizations. Since it offers an unbeatable competitive advantage, valuable knowledge demands strict management principles to avoid being lost. Instant messengers provide an opportunity to gather knowledge passed through individuals in the organization. By modeling that knowledge using machine learning techniques, it becomes possible to retain and make it ubiquitous throughout the organization. This paper presents a solution for gathering, modeling, and retrieving knowledge associated with the technical support in organizations, using machine learning algorithms. The solution comprises the architecture, data preparation techniques and machine learning algorithms. The experimental evaluation exhibits the algorithms with better performance for this class of problems.
- On the use of ontology data for protecting critical infrastructuresPublication . Henriques, João; Caldeira, Filipe; Cruz, T.; Simões, P.Modern societies increasingly depend on products and services provided by Critical Infrastructures (CI) in areas such as energy, telecommunications and transportation, which are considered vital for their wellbeing. These CIs usually rely on Industrial Automation and Control Systems (IACS), which are becoming larger and more complex due to the increasing amount of available heterogeneous data generated by a raising number of interconnected control and monitoring devices and involved processes. The Security Information and Event Management (SIEM) systems in charge of protecting these CI usually collect and process data from specialized sources, such as intrusion detection systems, log sources, honeypots, network traffic analysers and process control software. However, they usually integrate only a small fraction of the whole data sources existing in the CI. Valuable generic data sources such as human resources databases, staff check clocks, outsourced service providers and accounting data usually fall outside the specialized perimeter of SIEM, despite their potential usefulness for achieving a truly holistic perspective on the CI cybersecurity awareness. One of the main reasons for this state of affairs is the difficulty of integrating such data into the SIEM systems, since it is usually dispersed across multiple databases, using different schema and not originally intended for security-related applications. The process of collecting and adapting data from each of those sources would typically require a long and expensive process of conversion from each database. Moreover, since these databases may change over time (e.g. introduction of new Human Resources information systems), the system is difficult not only to setup but also to properly maintain over time. In order to address this gap, in this paper we propose a framework for making this process easier by using a semantic web approach for automated collection and processing of corporate data from multiple heterogeneous sources. This way, it becomes possible to make these data available, at reasonable costs, in a format which is suitable for security management purposes – especially those related with audit compliance and forensic analysis