
Recent technological advances have enabled the significant growth of cyberspace, which is transforming the way citizens, corporations, and governments interact, collaborate, and conduct business. At the same time, our heavy dependence on various digital infrastructures, including the Internet, has made them strategic national assets—like land, water, and airspace—that must be safeguarded to ensure national prosperity and safety.
Cyberthreats continue to grow every
day from a range of attackers no longer restricted by geographical boundaries.
Although solutions ranging from secure software to defensive measures for
protecting information systems, users, and data have matured and improved
considerably during the past decade, cybercriminals have also become more
sophisticated, launching unprecedented attacks from virtually anywhere at any
time. As a result, cyberdefenders must continually strive to secure cyberspace
from attacks, which the National Academy of Engineering recently identified as
one of the 14 grand challenges of engineering.
Meeting the Cybersecurity Challenge
Cybersecurity has emerged as an area
of intense research activity that aims to protect cyberspace, enabling it to
continue to operate as expected even when subjected to major attacks.
The research community accepts the
reality that it is almost impossible to achieve perfect security. For
this reason, a recent article argues that we should invest much more on
tracking and punishing criminals than on developing solutions that protect
against threats. Nevertheless, both the public and private sectors
continue to design, develop, implement, and deploy low-cost, efficient,
scalable, and robust cybersecurity solutions.
Especially challenging areas include
real-time detection of cyberattacks followed by swift protection and recovery
actions as well as attribution and punishment of cybercriminals. We need to act
now and take concrete steps toward a holistic approach that encompasses not
only technical cybersecurity solutions but also well-defined cybersecurity
strategies and policies that foster close partnerships and collaborations among
all stakeholders.
It is our hope this special issue will
serve as a catalyst for the development of innovative solutions to ensure
cyber-space security in the 21st century.
In This Issue
The articles selected for inclusion in
this special issue are intended to be useful to designers, developers,
engineers, policymakers, and legislators who are either directly or indirectly
involved with developing solutions to address some of these challenges.
"Detecting Influential Spreaders
in Complex, Dynamic Networks," by Pavlos Basaras, Dimitrios Katsaros, and
Leandros Tassiulas, explores how complex network analysis can be applied to
quickly and accurately identify influential spreaders, those entities in
complex networks that can have the worst impact on their environment. The
authors demonstrate that identifying influential spreaders based on their power community index rather
than their node degree or k-shell
index is a low-cost approach to enabling early actions that prevent further
damage.
In "Wide Area Situational
Awareness for Critical Infrastructure Protection," Cristina Alcaraz and
Javier Lopez discuss the need for situational awareness specifically aimed at
control systems that manage and monitor critical infrastructures. The authors
argue that simply monitoring the normal operational states of these complex,
highly distributed, and dynamic critical infrastructures is not sufficient to
prevent, detect, and respond to threats or internal failures. To improve
monitoring and the protection of these infrastructures from anywhere at all
times, they propose a framework based on the concept of wide area situational awareness,
which they validate through a detailed analysis using various threat scenarios.
"Scan Detection under Sampling: A
New Perspective," by Ignasi Paredes-Oliva, Pere Barlet-Ros, and Josep
Sole-Pareta, describes the performance of two scan detection algorithms aimed
at detecting cyberattacks. The authors evaluated these algorithms by using
packet, flow, smart, and selective sampling techniques. Their performance
results demonstrate the superiority of selective sampling over the other
approaches. The authors propose online
selective sampling, a new high-performance technique that
operates on packets rather than flows—as is the case with selective
sampling—and minimizes resource consumption.
"Cyberentity Security in the
Internet of Things," by Huansheng Ning, Hong Liu, and Laurence T. Yang,
explores security issues that arise with the Internet of Things (IoT) paradigm
in which physical objects are mapped to cyberentities in cyberspace. The
authors introduce the Unit and Ubiquitous IoT (U2IoT) concept, which embodies
the cyber-physical-social characteristics of various cyber-entities. They
describe various potential U2IoT attacks and system vulnerabilities and propose
a solution based on a cyberentity's activity cycle. They also demonstrate the
efficiency and security of their solution using multiple cyber-entity interaction
scenarios.
In "Who am I? Analyzing Digital
Personas in Cybercrime Investigations," Awais Rashid, Alistair Baron, Paul
Rayson, Corinne May-Chahal, Phil Greenwood, and James Walkerdine describe the
Isis toolkit, which can be used to detect those who assume multiple
identities—digital personas—in their online criminal activities. Although Isis
is not expected to yield 100 percent accuracy given its linguistic dependency,
it can prove useful when combined with the knowledge of expert investigators.
"A Next-Generation Approach to
Combating Botnets," by Adeeb Alhomoud, Irfan Arwan, Jules Ferdinand Pagna
Disso, and Muhammad Younas, presents an architecture for a self-healing system
that can identify the presence of a botnet in an enterprise network and automatically
take corrective action, such as terminating certain services or disabling some
ports to stop further bot communications. Such systems can effectively limit
damage by botnets, which cybercriminals around the world use to control
millions of computers connected to the Internet.
We thank all the authors who submitted
papers for consideration for this special issue as well as the reviewers for
their support in reviewing the numerous submissions. We also express our
gratitude to editor-in-chief Ron Vetter for his advice, constant encouragement,
and support throughout the preparation of this issue and toComputer's editorial staff
for their invaluable help.
We hope you will enjoy reading the
articles included in this special issue on cybersecurity as much as we did.
No comments:
Post a Comment