Conveners
Network Security
- Paul GASNER (Agency ARNIEC/RoEduNet, Alexandru Ioan Cuza University of Iasi)
Sophisticated cyber-attacks known as Advanced Persistent Threats (APTs) are typified by sustained and focused activities, usually carried out by well-funded adversaries like nation-states or organised crime groups. These threats use cutting-edge tactics to enter target networks and stay there in an effort to steal important data or interfere with daily operations. APTs are particularly...
The dynamic growth of the digital ecosystem presents evolving cybersecurity considerations, highlighting the constant change and emergence of new security concerns. While cloud providers offer robust security for the infrastructure, the user configurations of the cloud services can lead to misconfigurations, vulnerabilities, and compliance issues due to human error. The aim of the paper is to...
Abstract— The swift expansion of Internet of Things (IoT) devices has resulted in considerable progress in connectivity and automation, yet it has simultaneously brought about notable security weaknesses. This paper presents a novel approach to securing IoT platforms through a comprehensive architecture that integrates a double reverse proxy setup, leveraging Oracle Cloud Virtual Private...
As the competition between threat actors and defenders in the security landscape continues, honeypot deployments become more common as a source of threat intelligence. Yet, documentation for these systems is usually scarce, and their development halts or slows down in time. A better understanding of such systems can lead to deployments of higher deceitfulness, yielding higher quality threat...