Marek Amanowicz's research while affiliated with NASK National Research Institute and other places

What is this page?


This page lists the scientific contributions of an author, who either does not have a ResearchGate profile, or has not yet added these contributions to their profile.

It was automatically created by ResearchGate to create a record of this author's body of work. We create such pages to advance our goal of creating and maintaining the most comprehensive scientific repository possible. In doing so, we process publicly available (personal) data relating to the author as a member of the scientific community.

If you're a ResearchGate member, you can follow this page to keep up with this author's work.

If you are this author, and you don't want us to display this page anymore, please let us know.

Publications (63)


Cross-Layer Enforcement of Data Security in SDN
  • Chapter

April 2024

·

3 Reads

Marek Amanowicz

·

·

As discussed in Chapter 2, an important current direction in development in ICT systems is the design of new methods for more dynamic and fine-grained control of access to information. Such a new approach must not only support enforcement of need-to-know and responsibility-to-share requirements, but also enable defence-in-depth through cross-layer enforcement of security policies.

Share

Software Defined Networks

April 2024

·

10 Reads

The network infrastructure used in modern ICT systems consists of devices, individually configured to process network packets. The disadvantage of such an approach is a complicated and inflexible management process that introduces great difficulty in creating and implementing new network solutions. The administrator must configure each device separately to achieve the desired network operation.



Risk-Aware Routing in SDN

April 2024

·

8 Reads

The role and importance of risk assessment when making access control decisions have been discussed in Sect. 2.2.6. In particular, we have pointed out that operational scenarios usually require finding the appropriate balance between ensuring confidentiality and availability of specific resource or service to users. The cost of potential unauthorized disclosure must be balanced with the cost of inability to perform operations or performing them based on incomplete data. Moreover, in practice, we seldom can base our decision on perfect information about trustworthiness of actors (such as users) and assets (such as network and user ICT equipment) used in operations. Our situational awareness is often affected by a large amount of uncertainty about the current state of the system. Therefore, in practice, every access control decision includes some risk acceptance, which the organization needs to adequately assess. In this chapter, we consider how the risk related to transfer of data over an SDN can be effectively managed.


DCS Deployment in SDN-Based Systems

April 2024

·

7 Reads

Implementing DCS in a SDN-based system introduces several challenges and requires several enablers, which are discussed in this chapter. Our discussion does not answer all the questions related to the design and implementation of a practical DCS solution. Some additional challenges that are not discussed in detail are, for example, related to integrating DCS with existing cyber defence infrastructure and procedures. For example, acquiring current and reliable information on the security status of SDN components, especially in a multi-domain, federated environment, requires the implementation of effective mechanisms for the cooperation of network control systems and security operation centres (SOCs) that different organisations may manage.




Adaptation of the Kademila Routing for Tactical Networks
  • Article
  • Full-text available

June 2023

·

13 Reads

Journal of Telecommunications and Information Technology

In this paper a modification of the widely used Kademlia peer-to-peer system to tactical networks is proposed. We first take a look at the available systems today to cover the range of possibilities peer-to-peer systems offer. We iden-tify candidates for use in military networks. Then we com-pare two candidate systems in an environment with highly dynamic participants. The considered environment is focused on the special conditions in tactical networks. Then we give rationale for choosing Kademlia as a suitable system for tac-tical environments. Since Kademlia is not adapted to military networks, a modification to this system is proposed to adapt it to the special conditions encountered in this environment. We show that optimizations in the routing may lead to faster lookups by measuring the modified algorithm in a simula-tion of the target environment. We show also that the pro-posed modification can be used to extend the battery lifetime of mobile peer-to-peer nodes. Our results show that peer-to-peer systems can be used in military networks to increase their robustness. The modifications proposed to Kademlia adapt the system to the special challenges of military tactical networks. Keywords—Kademlia, network enabled capabilities, peer-to-peer, wireless tactical military networks.

Download

Figure 1. Cyberspace of an essential services operator.
Figure 2. Redundant objects model. Edge attributes are event propagation times: t and ρ are used for source service deterioration, and τ is used for service recovery.
Figure 3. The principle of calculating the criticality of redundant objects.
Figure 7. Selected part of the operator cyberspace.
Figure 8. Visualizing the business criticality of objects.

+4

Building Security Awareness of Interdependent Services, Business Processes, and Systems in Cyberspace

November 2022

·

56 Reads

·

4 Citations

Electronics

Protection against a growing number of increasingly sophisticated and complex cyberattacks requires the real-time acquisition of up-to-date information on identified threats and their potential impact on an enterprise’s operation. However, the complexity and variety of IT/OT infrastructure interdependencies and the business processes and services it supports significantly complicate this task. Hence, we propose a novel solution here that provides security awareness of critical infrastructure entities. Appropriate measures and methods for comprehensively managing cyberspace security and resilience in an enterprise are provided, and these take into account the aspects of confidentiality, availability, and integrity of the essential services offered across the underlying business processes and IT infrastructure. The abstraction of these entities as business objects is proposed to uniformly address them and their interdependencies. In this paper, the concept of modeling the cyberspace of interdependent services, business processes, and systems and the procedures for assessing and predicting their attributes and dynamic states are depicted. The enterprise can build a model of its operation with the proposed formalism, which takes it to the first level of security awareness. Through dedicated simulation procedures, the enterprise can anticipate the evolution of actual or hypothetical threats and related risks, which is the second level of awareness. Finally, simulation-driven analyses can serve in guiding operations toward improvement with respect to resilience and threat protection, bringing the enterprise to the third level of awareness. The solution is also applied in the case study of an essential service provider.


A Shared Cybersecurity Awareness Platform

September 2021

·

53 Reads

·

3 Citations

Journal of Telecommunications and Information Technology

Ensuring a good level of cybersecurity of global IT systems requires that specific procedures and cooperation frameworks be adopted for reporting threats and for coordinating the activities undertaken by individual entities. Technical infrastructure enabling safe and reliable online collaboration between all teams responsible for security is an important element of the system as well. With the above taken into consideration, the paper presents a comprehensive distributed solution for continuous monitoring and detection of threats that may affect services that provision is essential to security and broadly understood the state’s economic interests. The said solution allows to collect, process and share distributed knowledge on hazard events. The partnership-based model of cooperation between the system’s users allows the teams to undertake specific activities at the central level, facilitates global cyber threat awareness, and enhances the process of predicting and assessing cyber risks in order to ensure a near-realtime response. The paper presents an overview of the system’s architecture, its main components, features, and threat intelligence tools supporting the safe sharing of information concerning specific events. It also offers a brief overview of the system’s deployment and its testing in an operational environment of NASK’s Computer Security Incident Response Team (CSIRT) and Security Operation Center (SOC) of essential services operators


Citations (32)


... CTI-sharing landscapes can differ markedly across countries due to their unique geopolitical dynamics, local regulations, and industry-specific contexts (Fransen & Kerkdijk, 2017). However, research focusing on national CTI-sharing ecosystems remains sparse, with only a few case studies (e.g., Fransen & Kerkdijk, 2017;Amanowicz, 2020) addressing this area. ...

Reference:

CTI Sharing Practices and MISP Adoption in Finland’s Critical Infrastructure Protection
Towards Building National Cybersecurity Awareness

International Journal of Electronics and Telecommunications

... New concepts to solve the problem of risky behaviour and low-security awareness should combine periodic education regularly with some notification system. Some studies also suggest that future learning models should use more interactive educational methods and should be based on simulation procedures [12,13]. ...

Building Security Awareness of Interdependent Services, Business Processes, and Systems in Cyberspace

Electronics

... accessed on 29 September 2022) proposes solutions to improve an entity's security awareness by enhancing security alert correlation and prioritization, linking the relevance of an organization's assets to its business. In [8], a prototype of an integrated system for continuously monitoring, detecting, and warning cyberthreats is introduced. It supports the safe sharing of information on security events and risks related to services provided by critical infrastructure entities, enabling global cyberawareness at the state level. ...

A Shared Cybersecurity Awareness Platform

Journal of Telecommunications and Information Technology

... A novel softwareenabled intrusion detection system (IDS) design that accounts for SDN was proposed by Ibrahim, Omar Jamal, and colleagues [12] to make use of SDN's capabilities. The authors combined the capabilities of ML algorithms with those of the IDS to protect the network from threats and obtain high classification accuracy [13]. ...

Detection and Classification of Malicious Flows in Software-Defined Networks Using Data Mining Techniques

Sensors

... Ensuring the consistency of data obtained from the surveys allows to create a network of interdependencies services. The attributes of the network components reflect the criticality (impact on other services) of the individual services and the relationship between them [14]. The process of managing the network of interdependent services allows to conduct several operations, including network upgrades and reconfigurations, depending on the needs of the system analyst. ...

Decision Support System for Identification and Security Management of Essential and Digital Services
  • Citing Conference Paper
  • May 2019

... This study continues our preliminary works on assessing the rationality of using transformation techniques such as ICA and PCA to reduce the features space and processing time [10] and exploring methods of generating both normal and malicious flows that can be used to evaluate various SDN-based intrusion detection systems [11]. ...

A study on flow features selection for malicious activities detection in software defined networks
  • Citing Conference Paper
  • May 2018

... To be effective, the implementation of an ISMS needs a considerable resources investment (Ahmed & Nibouche, 2018) and a detailed plan defining how to respond against security incidents (Proença & Borbinha, 2018). In fact, a key element of each ISMS is the security risk assessment and management strategy (Hariyanti et al., 2018;Szwaczyk et al., 2018;Ruan, 2017;Alshawabkeh et al., 2019), but security risks do not only affect to ICT components of organizations, but also their business processes, and even the organization and strategy level (Ross et al., 2019). Therefore, effective risk management helps top managers to make optimal decisions (Tiganoaia et al., 2019;Wolf & Serpanos, 2020), as security incidents can have harsh consequences to different levels of the organization (Debnath et al., 2020). ...

Applicability of risk analysis methods to risk-aware routing in software-defined networks
  • Citing Conference Paper
  • May 2018

... Some studies related to Network Encoding are shown in Table 2. Research by [3] on fog computing uses the programming language Python intending to minimize latency, save bandwidth, increase QoS, and overcome limitations inaccurate content distribution, using 4 different topologies (Square, Tree, Random, and Mist). Pelacakan target di jaringan sensor nirkabel bawah air Figure 5. Example of network coding [42] Later, research by [2] [27]. ...

On Applicability of Network Coding Technique for 6LoWPAN-based Sensor Networks

Sensors

... In the work, a cross-layer method to enforce the CPR policies along with the proof-of-concept implementation in SDN environment is discussed. To validate the approach discussed in [96], an OpenFlow-based testbed is developed in [98]. The proposed testbed is cost-effective and evaluate the temporal features of security method. ...

SDN testbed for validation of cross-layer data-centric security policies
  • Citing Conference Paper
  • May 2017

... Again, in 2015, the large-scale attack in Ukrainian affected three distribution companies, causing suffering for 225,000 customers [10]. In due course, these attacks raised significant concern about the vulnerabilities of CPS and their devastating effects on the energy sector [11]. Due to the severity of cyber-attacks on the smart grid, different types of attacks with their countermeasures have been analyzed in various research works [12][13][14]. ...

Cyber Security Provision for Industrial Control Systems
  • Citing Conference Paper
  • June 2017

Advances in Intelligent Systems and Computing