Intrusion, Malware Detection and Prevention in 5G Networks and Internet of Things

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (30 November 2023) | Viewed by 5196

Special Issue Editors


E-Mail Website
Guest Editor
Centre for Informatics and Systems, Department of Informatics Engineering, University of Coimbra, Polo 2, 3030-290 Coimbra, Portugal
Interests: authentication mechanisms; computer networks; SDN; P4; monitoring; resource management; IoT
Special Issues, Collections and Topics in MDPI journals
Department of Informatics Engineering, University of Coimbra, 3004-531 Coimbra, Portugal
Interests: critical infrastructure protection; cyber-physical systems security; desktop management; O&M organization; low-level management support
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Fifth-generation networks are rapidly spreading across the world, enabling connection between millions of devices in consumer and industrial IoT applications. The 5G evolution has introduced new models for network architectures and improved physical data rates, supporting a high number of connected devices and enabling new ecosystems for the deployment of novel services and applications.

However, this ecosystem, encompassing a plethora of services and devices, also increases the interest of malicious actors; the hyperconnectivity characteristics provided by 5G networks may provide fertile ground for threats such as malware, which can be deployed in devices to perform Distributed Denial of Service (DDoS), data stealing, and ransomware, among many others. Thus, efficient intrusion detection mechanisms are needed to secure infrastructures as well as end-users.

This Special Issue, organised under the auspices of the Smart5Grid P2020 project, aims to represent the latest advances in malware, intrusion detection, and prevention, encompassing application scenarios such as (and not limited to):

  • Mechanisms for data collection and processing leveraging edge computing models for the security of IoT applications;
  • Algorithms and techniques for malware detection in IoT applications and mobile devices;
  • Algorithms and techniques for intrusion detection and protection in 5G services.

Dr. Bruno Sousa
Dr. Tiago Cruz
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • malware detection
  • intrusion detection and prevention
  • Internet of Things
  • 5G services
  • C2 servers
  • security of services

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

30 pages, 1830 KiB  
Article
Comprehensive Analysis of Advanced Techniques and Vital Tools for Detecting Malware Intrusion
by Vatsal Vasani, Amit Kumar Bairwa, Sandeep Joshi, Anton Pljonkin, Manjit Kaur and Mohammed Amoon
Electronics 2023, 12(20), 4299; https://doi.org/10.3390/electronics12204299 - 17 Oct 2023
Cited by 2 | Viewed by 3644
Abstract
In this paper, we explore how incident handling procedures are currently being implemented to efficiently mitigate malicious software. Additionally, it aims to provide a contextual understanding of diverse malcodes and their operational processes. This study also compares various ways of detecting adware against [...] Read more.
In this paper, we explore how incident handling procedures are currently being implemented to efficiently mitigate malicious software. Additionally, it aims to provide a contextual understanding of diverse malcodes and their operational processes. This study also compares various ways of detecting adware against a selection of anti-virus software. Moreover, this paper meticulously examines the evolution of hacking, covering the methods employed and the actors involved. A comparative analysis of three prominent malware detection tools, Google Rapid Response (GRR), Wireshark, and VirusTotal, is also conducted, aiding in informed decision-making for enhancing application security. This paper reaches its conclusion by conducting an exhaustive analysis of two case studies, offering valuable insights into a diverse range of potential leaks and virus attacks that may pose threats to various conglomerates. In essence, this article provides a comprehensive overview that spans incident handling procedures, the historical development of hacking, and the diverse spectrum of tools accessible for achieving effective malware detection. Full article
Show Figures

Figure 1

23 pages, 1448 KiB  
Article
Towards Transparent and Secure IoT: Improving the Security and Privacy through a User-Centric Rules-Based System
by João Lola, Carlos Serrão and João Casal
Electronics 2023, 12(12), 2589; https://doi.org/10.3390/electronics12122589 - 08 Jun 2023
Viewed by 909
Abstract
In recent years, we have seen a growing wave in the integration of IoT (Internet of Things) technologies into society. This has created new opportunities, but at the same time given rise to several critical issues, creating new challenges that need to be [...] Read more.
In recent years, we have seen a growing wave in the integration of IoT (Internet of Things) technologies into society. This has created new opportunities, but at the same time given rise to several critical issues, creating new challenges that need to be addressed. One of the main challenges is the security and privacy of information that is processed by IoT devices in our daily lives. Users are, most of the time, unaware of IoT devices’ personal information collection and transmission activities that affect their security and privacy. In this work, we propose a solution that aims to increase the privacy and security of data in IoT devices, through a system that controls the IoT device’s communication on the network. This system is based on two basic and simple principles. First, the IoT device manufacturer declares their device’s data collection intentions. Second, the user declares their own preferences of what is permitted to the IoT device. The design of the system includes tools capable of analyzing packets sent by IoT devices and applying network traffic control rules. The objective is to allow the declaration and verification of communication intentions of IoT devices and control the communication of such devices to detect potential security and privacy violations. We have created a test-bed to validate the developed solution, based on virtual machines, and we concluded that our system has little impact on how the overall system performed. Full article
Show Figures

Figure 1

Back to TopTop