Advertisement

I Don’t Trust ICT: Research Challenges in Cyber Security

  • Félix Gómez Mármol
  • Manuel Gil Pérez
  • Gregorio Martínez Pérez
Conference paper
Part of the IFIP Advances in Information and Communication Technology book series (IFIPAICT, volume 473)

Abstract

Can we trust ICT (Information & Communication Technology) systems? Every single day a handful of previously unknown security vulnerabilities on these environments are published, dangerously feeding the lack of trust feeling that many end users already exhibit with respect to ICT. In order to disrupt and even invert such a perilous tendency (hindering the wide adoption of ICT and all its associated benefits), a number of research challenges in the field of cyber security need to be addressed. This paper presents some of these key challenges, offering initial thoughts on how to tackle each of them.

Keywords

Trustworthy ICT Cyber security Research challenges 

Notes

Acknowledgment

This work has been partially supported by the European Commission under grant agreements FP7-ICT-2013.1.4/609062 - SMARTIE (Secure and Smarter Cities Data Management) and H2020-ICT-2014-2/671672 - SELFNET (Framework for Self-Organized Network Management in Virtualized and Software Defined Networks).

References

  1. 1.
    Gil Pérez, M., Gómez Mármol, F., Martínez Pérez, G., Gómez Skarmeta, A.F.: RepCIDN: a reputation-based collaborative intrusion detection network to lessen the impact of malicious alarms. J. Netw. Syst. Manage. 21(1), 128–167 (2013)CrossRefGoogle Scholar
  2. 2.
    Robinson, M., Jones, K., Janicke, H.: Cyber warfare: issues and challenges. Comput. Secur. 49, 70–94 (2015)CrossRefGoogle Scholar
  3. 3.
    Poolsappasit, N., Dewri, R., Ray, I.: Dynamic security risk management using bayesian attack graphs. IEEE Trans. Dependable Secure Comput. 9(1), 61–74 (2012)CrossRefGoogle Scholar
  4. 4.
    Abraham, S., Nair, S.: A predictive framework for cyber security analytics using attack graphs. Int. J. Comput. Netw. Commun. 7(1), 1–17 (2015)CrossRefGoogle Scholar
  5. 5.
    Zuech, R., Khoshgoftaar, T.M., Wald, R.: Intrusion detection and big heterogeneous data: a survey. J. Big Data 2(1), 1–41 (2015)CrossRefGoogle Scholar
  6. 6.
    Goodwin, C., Nicholas, J.P.: A framework for cybersecurity information sharing and risk reduction. Technical report, Microsoft Corporation, January 2015Google Scholar
  7. 7.
    Skopik, F., Settanni, G., Fiedler, R.: A problem shared is a problem halved: a survey on the dimensions of collective cyber defense through security information sharing. Comput. Secur. 60, 154–176 (2016). http://dx.doi.org/10.1016/j.cose.2016.04.003 CrossRefGoogle Scholar

Copyright information

© IFIP International Federation for Information Processing 2016

Authors and Affiliations

  • Félix Gómez Mármol
    • 1
  • Manuel Gil Pérez
    • 2
  • Gregorio Martínez Pérez
    • 2
  1. 1.NEC Europe Ltd.HeidelbergGermany
  2. 2.Departamento de Ingeniería de la Información y las ComunicacionesUniversity of MurciaMurciaSpain

Personalised recommendations