Change search
Link to record
Permanent link

Direct link
Seid, Elias
Publications (10 of 14) Show all publications
Seid, E. (2025). Adaptive Framework for Security Attack Monitoring in Cyber-Physical Systems. (Doctoral dissertation). Stockholm: Department of Computer and Systems Sciences, Stockholm University
Open this publication in new window or tab >>Adaptive Framework for Security Attack Monitoring in Cyber-Physical Systems
2025 (English)Doctoral thesis, comprehensive summary (Other academic)
Abstract [en]

The dissertation presents an adaptive security framework for cyber-physicalsystems (CPSs) to address the growing challenges posed by evolving cyberattacks. CPSs rely on seamless integration between computational and physical components, making security breaches potentially catastrophic. Traditional methods often fail to keep pace with rapidly advancing threats. The proposed framework leverages real-time monitoring and adaptive model predictive control to dynamically adjust defences based on the threat type, frequency, and severity. By forecasting the impact of various strategies, the system identifies optimal responses to enhance resilience and mitigate risks. The approach strengthens CPS security by adapting to the continuously evolving threat landscape and safeguarding system integrity and functionality.

Place, publisher, year, edition, pages
Stockholm: Department of Computer and Systems Sciences, Stockholm University, 2025. p. 118
Series
Report Series / Department of Computer & Systems Sciences, ISSN 1101-8526 ; 25-007
Keywords
Cyber-Physical Systems, Adaptive Security, Cybersecurity, Cyber Threat Intelligence, Critical Infrastructure Protection, Resilience Engineering
National Category
Computer Sciences Software Engineering Security, Privacy and Cryptography
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-245872 (URN)978-91-8107-364-5 (ISBN)978-91-8107-365-2 (ISBN)
Public defence
2025-09-30, L30, NOD-huset, Borgarfjordsgatan 12 and online via Zoom, public link is available at the department website, Kista, 14:00 (English)
Opponent
Supervisors
Available from: 2025-09-05 Created: 2025-08-22 Last updated: 2025-08-29Bibliographically approved
Seid, E., Busheva, R., Blix, F. & Popov, O. (2025). Advancing Cybersecurity: Semi-Automated Penetration Testing for Enhanced Vulnerability Detection. Procedia Computer Science, 263, 350-358
Open this publication in new window or tab >>Advancing Cybersecurity: Semi-Automated Penetration Testing for Enhanced Vulnerability Detection
2025 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 263, p. 350-358Article in journal (Refereed) Published
Abstract [en]

In the face of increasing cyberattacks, organizations today depend heavily on information technology resources, making regular penetration testing crucial for identifying system vulnerabilities and potential exploits. While automated vulnerability management tools are widely used, they often present challenges such as result interpretation, irrelevant findings, and overwhelming volumes of data that complicate the extraction of critical information. Manual penetration testing, on the other hand, offers greater flexibility, enabling professionals to tailor their methods to the specific characteristics of a given environment. This study focuses on semi-automated penetration testing, blending automated efficiency with manual adaptability, to identify vulnerabilities in a web application, providing insights into optimizing vulnerability detection processes.

Keywords
cybersecurity, penetration testing, manual testing, automated testing, vulnerabilities, tools, severity
National Category
Computer Sciences
Research subject
Computer and Systems Sciences; Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-245870 (URN)10.1016/j.procs.2025.07.043 (DOI)
Available from: 2025-08-22 Created: 2025-08-22 Last updated: 2025-08-28Bibliographically approved
Adesina, A., Seid, E., Blix, F. & Popov, O. (2025). Compliance Standards and Frameworks and Its Implications on Cyber security: A NIS2 Study Within the Swedish Automotive Industries. In: Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 1: . Paper presented at ICISSP, Porto, Portugal, 2025 (pp. 367-376). Science and Technology Publications, Lda
Open this publication in new window or tab >>Compliance Standards and Frameworks and Its Implications on Cyber security: A NIS2 Study Within the Swedish Automotive Industries
2025 (English)In: Proceedings of the 11th International Conference on Information Systems Security and Privacy - Volume 1, Science and Technology Publications, Lda , 2025, p. 367-376Conference paper, Published paper (Refereed)
Abstract [en]

Cyber security standards and regulations are pivotal in guiding organizations toward mitigating cyber risks and enhancing their overall security posture. The European Union’s NIS2 Directive, which introduces stringent and comprehensive security requirements, exemplifies a Current regulatory framework designed to address evolving cyber threats. This study critically examines the regulatory, governance, cyber security, and compliance challenges introduced by NIS2 within the Swedish automotive industry. It further explores the strategic integration of NIS2 with existing regulatory frameworks to streamline compliance approaches and foster long term resilience. The findings reveal the increasing complexity and financial implications of compliance, while also identifying significant opportunities to bolster cyber security resilience. This paper underscores the necessity for organizations to adopt proactive and adaptive strategies in response to the dynamic European regulatory landscape. While the focus is on the Swedish automotive sector, the study provides valuable insights that may inform future research into the broader implications of NIS2 across diverse industries and regions within the European Union.

Place, publisher, year, edition, pages
Science and Technology Publications, Lda, 2025
Series
International Conference on Information Systems Security and Privacy, E-ISSN 2184-4356 ; 1
Keywords
Automotive Industry, Complexities, Compliance, Cyber security, Cyber security Frameworks, EU Regulations, NIS2 Directive, Organisational Preparedness, Standards
National Category
Computer Sciences Law
Identifiers
urn:nbn:se:su:diva-243126 (URN)10.5220/0013321200003899 (DOI)2-s2.0-105001818679 (Scopus ID)
Conference
ICISSP, Porto, Portugal, 2025
Available from: 2025-05-12 Created: 2025-05-12 Last updated: 2025-05-12Bibliographically approved
Seid, E., Blix, F. & Popov, O. (2025). Cyber Resilience Using ASFA: DORA-Compliant Threat-Led Penetration Testing. In: Gabriele Oliva, Stefano Panzieri, Bernhard Hämmerli, Federica Pascucci, Luca Faramondi (Ed.), Critical Information Infrastructures Security: 19th International Conference, CRITIS 2024, Rome, Italy, September 18–20, 2024, Revised Selected Papers. Paper presented at The 19th International Conference on Critical Information Infrastructures Security (CRITIS 2024), September 18–20, 2024, Rome, Italy. (pp. 269-288). Springer Nature
Open this publication in new window or tab >>Cyber Resilience Using ASFA: DORA-Compliant Threat-Led Penetration Testing
2025 (English)In: Critical Information Infrastructures Security: 19th International Conference, CRITIS 2024, Rome, Italy, September 18–20, 2024, Revised Selected Papers / [ed] Gabriele Oliva, Stefano Panzieri, Bernhard Hämmerli, Federica Pascucci, Luca Faramondi, Springer Nature , 2025, p. 269-288Conference paper, Published paper (Refereed)
Abstract [en]

The financial sector is experiencing an increase in cyber incidents, prompting numerous firms to outsource IT infrastructure management. A primary factor contributing to these breaches is that the impacted systems are socio-technical systems (STSs), which include not only technical components such as software and hardware but also physical elements (e.g., robotics, mobility) and social components (e.g., human actors, business processes, and organizational units). Evaluating STS security breaches requires a holistic approach, considering human, organizational, software, and infrastructural elements. The study involves combining strategic factors, including social and organizational dynamics, with technical components such as software and physical infrastructure.

In our previous work, we developed a security attack-monitoring system to tackle these challenges. This framework was developed to monitor, analyze, and model security incidents across the social, cyber, and physical dimensions of cyber-physical systems (CPS). This paper employs the framework to conduct threat-led penetration testing in accordance with the Digital Operational Resilience Act (DORA), thus improving the financial sector’s capacity to address information and communication crises. This study provides important insights into cyberattacks and their impact on the financial sector by examining security breaches reported to the Swedish Civil Contingencies Agency (MSB) by critical service providers. The experiment was performed in collaboration with a prominent Swedish financial institution.

Place, publisher, year, edition, pages
Springer Nature, 2025
Series
Lecture Notes in Computer Science (LNCS), ISSN 0302-9743, E-ISSN 1611-3349
Keywords
Incident Reporting, DORA, Cybersecurity, Cyber-Resilience, Risk Management, Penetration Testing
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-240585 (URN)10.1007/978-3-031-84260-3_16 (DOI)2-s2.0-105000827523 (Scopus ID)978-3-031-84260-3 (ISBN)978-3-031-84259-7 (ISBN)
Conference
The 19th International Conference on Critical Information Infrastructures Security (CRITIS 2024), September 18–20, 2024, Rome, Italy.
Available from: 2025-03-10 Created: 2025-03-10 Last updated: 2025-08-22Bibliographically approved
Seid, E., Deniz, I., Blix, F. & Popov, O. (2025). Cyber Supply Chain Resilience: Analyzing ISO, NIST, and NIS2 Frameworks for Mitigating Third-Party Risks. Procedia Computer Science, 263, 591-599
Open this publication in new window or tab >>Cyber Supply Chain Resilience: Analyzing ISO, NIST, and NIS2 Frameworks for Mitigating Third-Party Risks
2025 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 263, p. 591-599Article in journal (Refereed) Published
Abstract [en]

The growing frequency of cyber-attacks on supply chains has jeopardized organizational integrity and data security, underscoring the need to strengthen Cyber Supply Chain Risk Management (CSCRM) frameworks. This paper explores the application, effectiveness, and challenges of three key frameworks—ISO, NIST, and NIS2—in mitigating third-party risks within the cyber supply chain. Using an empirical research approach, data was collected from domain experts in the field of information security. The analysis focuses on how effectively these frameworks enhance organizational data security and the practices surrounding their adoption and implementation. This study contributes valuable insights to CSCRM practices, offering actionable findings for organizations seeking to bolster their cyber defenses. The results also provide policymakers with a deeper understanding of the challenges that need to be addressed for future improvements in CSCRM frameworks.

Keywords
Cyber Supply Chain Risk Management (CSCRM), Third-party cyber risks, Cybersecurity frameworks, ISO, NIST, NIS2
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-245871 (URN)10.1016/j.procs.2025.07.071 (DOI)2-s2.0-105013959898 (Scopus ID)
Available from: 2025-08-22 Created: 2025-08-22 Last updated: 2025-09-09Bibliographically approved
Seid, E., Popov, O. & Blix, F. (2025). Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological Approaches. In: Mike Mannion, Tomi Mannisto, Leszek Maciaszek (Ed.), Proceedings of the 20th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE: Volume 1. Paper presented at 20th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE2025, 4-6 April 2025, Proto, Portugal. (pp. 822-834). SciTePress
Open this publication in new window or tab >>Security Engineering in Cyber-Physical Systems: A Systematic Review of Methodological Approaches
2025 (English)In: Proceedings of the 20th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE: Volume 1 / [ed] Mike Mannion, Tomi Mannisto, Leszek Maciaszek, SciTePress , 2025, p. 822-834Conference paper, Published paper (Refereed)
Abstract [en]

Ensuring strong security in Cyber-Physical Systems (CPS) is increasingly essential as these systems become integral to contemporary industrial and societal infrastructures. The increasing prevalence of security risks requires the advancement of conventional security engineering approaches to tackle the distinct problems presented by CPS. This study offers a thorough assessment of the research methodologies, approaches, and strategies used in security engineering for cyber-physical systems over the last fifteen years. The review analyses the design and execution of security solutions, including empirical and conceptual investigations, along with the integration and enhancement of existing methodologies. This study seeks to offer a systematic overview of contemporary developments and pinpoint methodological concerns essential for future research in adaptive and security engineering -driven for CPS through an analysis of diverse literature. This study enhances the current discussion by providing a thorough analysis of the research environment, demonstrating the requirement for new and contextually relevant security engineering methodologies.

Place, publisher, year, edition, pages
SciTePress, 2025
Series
Proceedings of the International Conference on Evaluation of Novel Approaches to Software Engineering (ENASE), E-ISSN 2184-4895
Keywords
Cyber-Physical Systems Security, Cybersecurity Frameworks, Security Model, Quantitative Research, Qualitative Research, Cyber-Physical System, Security Engineering, Threat Modeling, Cyber Risk.
National Category
Software Engineering
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-243644 (URN)10.5220/0013478100003928 (DOI)978-989-758-742-9 (ISBN)
Conference
20th International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE2025, 4-6 April 2025, Proto, Portugal.
Available from: 2025-05-27 Created: 2025-05-27 Last updated: 2025-05-28Bibliographically approved
Seid, E., Popov, O. & Blix, F. (2024). An Automated Adaptive Security Framework for Cyber-Physical Systems. In: Gabriele Lenzini, Paolo Mori, Steven Furnell (Ed.), The International Conference on Information Systems Security and Privacy (ICISSP 2024): . Paper presented at The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), 26-28 February 2024, Rome, Italy. (pp. 242-253). SciTePress
Open this publication in new window or tab >>An Automated Adaptive Security Framework for Cyber-Physical Systems
2024 (English)In: The International Conference on Information Systems Security and Privacy (ICISSP 2024) / [ed] Gabriele Lenzini, Paolo Mori, Steven Furnell, SciTePress , 2024, p. 242-253Conference paper, Published paper (Refereed)
Abstract [en]

The paper promotes the notion that any security solution for cyber-physical systems (CPS) should be adaptive and based on the type of attacks and their frequency. Namely, the solution should monitor its environment continuously to defend itself from a cyber-attack by modifying its defensive mechanism. Moreover, the research provides analyses of situations where the environment changes dynamically over time, requiring the designated adaptation to contemplate and respond adequately to these changes. In particular, it explores applying adaptive model predictive control concepts derived from control theory to develop specific adaptive security solutions. These systems can make decisions by forecasting their future performance for various modes or options of adaptation. Using quantitative information, the software then selects the adaptations that minimise the cost associated with security failures. This is highly significant considering that CPS are engineered systems built from and depend upon the seamless integration of computational algorithms and physical components. Moreover, security breaches are rising, and CPS are challenged by catastrophic damage, resulting in billions of losses making many of today’s solutions obsolete. While security agents issue new sets of vulnerability indicators and patches to address security breaches, these changes are continuous processes ad infinitum. A case study on a medical emergency response system illustrates the essential and salient futures of the proposed adaptive security framework for CPS.

Place, publisher, year, edition, pages
SciTePress, 2024
Series
Proceedings of the International Conference on Information Systems Security and Privacy (ICISSP), E-ISSN 2184-4356
Keywords
Security Engineering, Control Theory, Adaptive Systems, Security Solution, Multiple Failure, Cyber-Physical Systems
National Category
Computer Sciences
Research subject
Computer and Systems Sciences
Identifiers
urn:nbn:se:su:diva-237088 (URN)10.5220/0012469100003648 (DOI)2-s2.0-85190838421 (Scopus ID)978-989-758-683-5 (ISBN)
Conference
The 10th International Conference on Information Systems Security and Privacy (ICISSP 2024), 26-28 February 2024, Rome, Italy.
Available from: 2024-12-10 Created: 2024-12-10 Last updated: 2025-08-22Bibliographically approved
Seid, E., Popov, O. & Blix, F. (2024). Evaluation of Asfalia, a Security Attack Event Monitoring Framework. Paper presented at International conference on industry sciences and computer science innovation. Procedia Computer Science, 237, 793-802
Open this publication in new window or tab >>Evaluation of Asfalia, a Security Attack Event Monitoring Framework
2024 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 237, p. 793-802Article in journal (Refereed) Published
Abstract [en]

Cyber security has been a growing concern for large organizations, especially financial and governmental institutions, as security breaches in the systems they depend on have repeatedly resulted in losses of billions of dollars per year, and this cost is on the rise. A primary reason for these breaches is that the systems in question are cyber-physical - a mix of people, processes, technology, and infrastructure. However, existing security solutions for cyber-physical systems are likely to become obsolete; even though security agents issue new sets of vulnerability indicators and patches to address security breaches, these vulnerability indicators change over time, which is a never-ending process. To tackle this problem, a multi-realm security attack event monitoring framework was proposed to monitor, model, and analyse security events in social(business process), cyber, and physical infrastructure components of cyber-physical systems. In this paper, we evaluate this security attack event monitoring framework. The evaluation was performed by using a large-scale case study on a medical emergency response system.

 

Place, publisher, year, edition, pages
Elsevier B.V., 2024
Keywords
attack pattern, cyber physical-systems, cyber security, Domain Assumption, industrial Internet of Things, runtime model
National Category
Computer Systems
Identifiers
urn:nbn:se:su:diva-236089 (URN)10.1016/j.procs.2024.05.167 (DOI)2-s2.0-85195398483 (Scopus ID)
Conference
International conference on industry sciences and computer science innovation
Available from: 2024-11-28 Created: 2024-11-28 Last updated: 2025-08-22Bibliographically approved
Seid, E., Satheesh, S., Popov, O. & Blix, F. (2024). FAIR: Cyber Security Risk Quantification In Logistics Sector. Procedia Computer Science, 237, 783-792
Open this publication in new window or tab >>FAIR: Cyber Security Risk Quantification In Logistics Sector
2024 (English)In: Procedia Computer Science, E-ISSN 1877-0509, Vol. 237, p. 783-792Article in journal (Refereed) Published
Abstract [en]

For many industries, the fourth industrial revolution has brought technological advancements in the form of advances in the integration of physical and digital technologies, particularly for cyber-physical systems, that go far beyond speed, scalability, storage, and cost-effectiveness. Smart manufacturing, smart factories, smart warehousing, and smart logistics are every aspect of the enabling Fourth Industrial Revolution. As a result of these improvements and advantages, new attack surfaces have been created that benefit malicious actors. For effective cyber security risk management in the face of converging cyber attacks, it is essential to quantify cyber risks across or within organisations that estimate cyber security risks in monetary value. This study explored and integrated the FAIR methodology(a well-recognized approach for quantitative cyber security risk assessment) to quantify cyber risk. A case study was conducted with one of the largest logistics companies in Scandinavia.

Keywords
Cyber Physical-Systems, Cybersecurity, FAIR Methodology, Logistics and Supply Chain, Quantifying Cyber Risk
National Category
Production Engineering, Human Work Science and Ergonomics
Identifiers
urn:nbn:se:su:diva-236095 (URN)10.1016/j.procs.2024.05.166 (DOI)2-s2.0-85195363970 (Scopus ID)
Available from: 2024-12-02 Created: 2024-12-02 Last updated: 2024-12-02Bibliographically approved
Seid, E., Nazifa, M., Gupta, S., Popov, O. & Blix, F. (2024). Security and SLA Monitoring for Cloud Services. In: Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE - Volume 1: . Paper presented at 19th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE, Angers, France, 2024 (pp. 537-546). Science and Technology Publications, Lda
Open this publication in new window or tab >>Security and SLA Monitoring for Cloud Services
Show others...
2024 (English)In: Proceedings of the 19th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE - Volume 1, Science and Technology Publications, Lda , 2024, p. 537-546Conference paper, Published paper (Refereed)
Abstract [en]

The present demand for cloud computing is driven by its scalability and adaptability, making it widely employed in enterprises. A Service Level Agreement (SLA) is a contractual arrangement between cloud providers and clients that ensures the stated level of services will be available. In order to evaluate the compliance of the services to the SLA, it is critical to monitor the availability of the cloud services. Cloud service companies offer several monitoring tools. However, such assessments are often influenced by bias, which prompts demands for impartial assessment of service level agreements (SLAs). The objective of this study is to address the issue of monitoring service availability characteristics, specifically uptime and downtime, in relation to SLA. To achieve this, a monitoring tool called SLA Analyser is proposed. The solution comprises a centralised application that generates and collects data in the primary registry database, along with a compliance report generator that computes cloud service availability using previously gathered data and compares it to the SLA availability parameter. An illustrative report is generated based on the gathered and processed data. This study specifically addresses the reliable assessment of SLA for both clients and service providers. Moreover, this study analyses the challenges associated with SLA monitoring and the repercussions of neglecting its assessment. This approach is particularly essential to organisations that use many cloud services from various vendors. The SLA Analyser was employed to monitor the availability of the cloud database services. In order to mitigate financial losses and uphold a positive reputation for consumer confidence, it is essential to validate the SLA.

Place, publisher, year, edition, pages
Science and Technology Publications, Lda, 2024
Series
International Conference on Evaluation of Novel Approaches to Software Engineering, ENASE - Proceedings, E-ISSN 2184-4895
Keywords
Availability, Cloud Database Services, Cybersecurity, IT-Incidents, Monitoring, SLAs
National Category
Computer Systems
Identifiers
urn:nbn:se:su:diva-236105 (URN)10.5220/0012690800003687 (DOI)2-s2.0-85193942166 (Scopus ID)978-989-758-696-5 (ISBN)
Conference
19th International Conference on Evaluation of Novel Approaches to Software Engineering ENASE, Angers, France, 2024
Available from: 2024-12-02 Created: 2024-12-02 Last updated: 2024-12-02Bibliographically approved
Organisations

Search in DiVA

Show all publications