Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Alessandra De Benedictis is active.

Publication


Featured researches published by Alessandra De Benedictis.


information reuse and integration | 2013

A moving target defense approach for protecting resource-constrained distributed devices

Valentina Casola; Alessandra De Benedictis; Massimiliano Albanese

Techniques aimed at continuously changing a systems attack surface, usually referred to as Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks. Such mechanisms increase the uncertainty, complexity, and cost for attackers, limit the exposure of vulnerabilities, and ultimately increase overall resiliency. In this paper, we propose an MTD approach for protecting resource-constrained distributed devices through fine-grained reconfiguration at different architectural layers. In order to show the feasibility of our approach in real-world scenarios, we study its application to Wireless Sensor Networks (WSNs), introducing two different reconfiguration mechanisms. Finally, we show how the proposed mechanisms are effective in reducing the probability of successful attacks.


communications and networking symposium | 2013

A moving target defense mechanism for MANETs based on identity virtualization

Massimiliano Albanese; Alessandra De Benedictis; Sushil Jajodia; Kun Sun

Mechanisms for continuously changing or shifting a systems attack surface are emerging as game-changers in cyber security. In this paper, we propose a novel defense mechanism for protecting the identity of nodes in Mobile Ad Hoc Networks and defeat the attackers reconnaissance efforts. The proposed mechanism turns a classical attack mechanism - Sybil - into an effective defense mechanism, with legitimate nodes periodically changing their virtual identity in order to increase the uncertainty for the attacker. To preserve communication among legitimate nodes, we modify the network layer by introducing (i) a translation service for mapping virtual identities to real identities; (ii) a protocol for propagating updates of a nodes virtual identity to all legitimate nodes; and (iii) a mechanism for legitimate nodes to securely join the network. We show that the proposed approach is robust to different types of attacks, and also show that the overhead introduced by the update protocol can be controlled by tuning the update frequency.


IEEE Transactions on Services Computing | 2017

Automatically Enforcing Security SLAs in the Cloud

Valentina Casola; Alessandra De Benedictis; Madalina Erascu; Jolanda Modic; Massimiliano Rak

Dealing with the provisioning of cloud services granted by Security SLAs is a very challenging research topic. At the state of the art, the main related issues involve: (i) representing security features so that they are understandable by both customers and providers and measurable (by means of verifiable security-related Service Level Objectives (SLOs)), (ii) automating the provisioning of security mechanisms able to grant desired security features (by means of a security-driven resource allocation process), and (iii) continuously monitoring the services in order to verify the fulfillment of specified Security SLOs (by means of cloud security monitoring solutions). We propose to face the Security SLA life cycle management with a framework able to enrich cloud applications with security features. In this paper we (i) present a novel Security SLA model and (ii) illustrate a security-driven planning process that can be adopted to determine the (optimum) deployment of security-related software components. Such process takes into account both specific implementation constraints of the security components to be deployed and customers security requirements, and enables the automatic provisioning and configuration of all needed resources. In order to demonstrate the applicability of the approach, we present and discuss a practical application of the model on a real case study.


symposium on reliable distributed systems | 2011

Analysis and Comparison of Security Protocols in Wireless Sensor Networks

Valentina Casola; Alessandra De Benedictis; Annarita Drago; Nicola Mazzocca

Wireless sensor networks are widely used in several application domains thanks to their data acquisition and processing capabilities and their de- centralized and self-organizing nature. A widely dis- tributed monitoring system is typically characterized by dierent security requirements that should be ad- dressed by means of specific security protocols and ar- chitectures. Indeed, security solutions should be prop- erly designed as they could have a strong impact on the overall performances. In this paper, we focus our atten- tion on security problems related to the data exchange between sensor nodes and evaluate the performances of two dierent cryptosystems used to guarantee con- fidentiality, integrity and authentication requirements.


workshops on enabling technologies: infrastracture for collaborative enterprises | 2015

REST-Based SLA Management for Cloud Applications

Alessandra De Benedictis; Massimiliano Rak; Mauro Turtur; Umberto Villano

In cloud computing, possible risks linked to availability, performance and security can be mitigated by the adoption of Service Level Agreements (SLAs) formally agreed upon by cloud service providers and their users. This paper presents the design of services for the management of cloud-oriented SLAs that hinge on the use of a REST-based API. Such services can be easily integrated into existing cloud applications, platforms and infrastructures, in order to support SLA-based cloud services delivery. After a discussion on the SLA life-cycle, an agreement protocol state diagram is introduced. It takes explicitly into account negotiation, remediation and renegotiation issues, is compliant with all the active standards, and is compatible with the WS-Agreement standard. The requirement analysis and the design of a solution able to support the proposed SLA protocol is presented, introducing the REST API used. This API aims at being the basis for a framework to build SLA-based applications.


2011 Conference on Network and Information Systems Security | 2011

SeNsIM-SEC: Security in Heterogeneous Sensor Networks

Valentina Casola; Alessandra De Benedictis; Antonino Mazzeo; Nicola Mazzocca

Wireless sensor networks are widely used in several application domains thanks to their data acquisition and processing capabilities and their decentralized and self-organizing nature. A widely distributed monitoring system is typically characterized by the need to integrate a large amount of data; if considering complex critical environments such as hospitals, these data often have different security requirements, to be addressed by means of specific security protocols and architectures. In such a distributed system, security must be addressed at different levels, namely the physical node level, the inter-node communication level, and the application level. In this paper, we focus our attention on security problems related to the data exchange between sensor nodes and propose an hybrid cryptosystem based on Elliptic Curves, aimed to ensure confidentiality, integrity ad authentication requirements to the inter-nodes communication. The integration issue has been addressed by proposing an extension of the SeNsIM integration platform, in order to enable the management of heterogeneous networks having different security requirements. At this aim, we have developed a flexible wrapper to connect the whole system to the secured network, and carried out a performance analysis of the overhead introduced by security mechanisms, showing the feasibility of the proposed cryptosystem and the platform scalability and extensibility features.


Procedia Computer Science | 2016

Security-by-design in Clouds: A Security-SLA Driven Methodology to Build Secure Cloud Applications

Valentina Casola; Alessandra De Benedictis; Massimiliano Rak; Erkuden Rios

Abstract This paper presents a security-by-design methodology for the development of cloud applications, which relies on Security SLAs as a means to express their security requirements. The process followed to build such Security SLAs entails the application of a risk analysis procedure aimed at identifying the main vulnerabilities affecting a cloud application and allows to determine the countermeasures to consider at design time in order to thwart the main existing threats. The paper illustrates a proof-of-concept application that founds on standard risk assessment tools and adopts state-of-art Security Control Frameworks and a novel Security SLA model for the security requirements representation.


availability, reliability and security | 2015

Security Monitoring in the Cloud: An SLA-Based Approach

Valentina Casola; Alessandra De Benedictis; Massimiliano Rak

In this paper we present a monitoring architecture that is automatically configured and activated based on a signed Security SLA. Such monitoring architecture integrates different security-related monitoring tools (either developed ad-hoc or already available as open-source or commercial products) to collect measurements related to specific metrics associated with the set of security Service Level Objectives (SLOs) that have been specified in the Security SLA. To demonstrate our approach, we discuss a case study related to detection and management of vulnerabilities and illustrate the integration of the popular open source monitoring system Open VAS into our monitoring architecture. We show how the system is configured and activated by means of available Cloud automation technologies and provide a concrete example of related SLOs and metrics.


Summer School on Accountability and Security in the Cloud | 2014

On the Adoption of Security SLAs in the Cloud

Valentina Casola; Alessandra De Benedictis; Massimiliano Rak

Can security be provided as-a-Service? Is it possible to cover a security service by a proper Service Level Agreement? This paper tries to reply to these questions by presenting some ongoing research activities from standardization bodies and academia, trying to cope with the open issues in the management of Security Service Level Agreement in its whole life cycle, made of negotiation, enforcement and monitoring phases.


IRI (best papers) | 2014

A Multi-Layer Moving Target Defense Approach for Protecting Resource-Constrained Distributed Devices

Valentina Casola; Alessandra De Benedictis; Massimiliano Albanese

Techniques aimed at continuously changing a system’s attack surface, usually referred to as Moving Target Defense (MTD), are emerging as powerful tools for thwarting cyber attacks. Such mechanisms increase the uncertainty, complexity, and cost for attackers, limit the exposure of vulnerabilities, and ultimately increase overall resiliency. In this chapter, we propose an MTD approach for protecting resource-constrained distributed devices through fine-grained reconfiguration at different architectural layers. We introduce a coverage-based security metric to quantify the level of security provided by each system configuration: such metric, along with other performance metrics, can be adopted to identify the configuration that best meets the current requirements. In order to show the feasibility of our approach in real-world scenarios, we study its application to Wireless Sensor Networks (WSNs), introducing two different reconfiguration mechanisms. Finally, we show how the proposed mechanisms are effective in reducing the probability of successful attacks.

Collaboration


Dive into the Alessandra De Benedictis's collaboration.

Top Co-Authors

Avatar

Valentina Casola

University of Naples Federico II

View shared research outputs
Top Co-Authors

Avatar

Massimiliano Rak

Seconda Università degli Studi di Napoli

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nicola Mazzocca

University of Naples Federico II

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Antonino Mazzeo

University of Naples Federico II

View shared research outputs
Top Co-Authors

Avatar

Mario Barbareschi

University of Naples Federico II

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Annarita Drago

University of Naples Federico II

View shared research outputs
Researchain Logo
Decentralizing Knowledge