6 results

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs.

Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011)
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,
This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first ca...

Cloud-based digital forensics evaluation test (D-FET) platform.

Presentation / Conference
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June)
Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011, University of Strathclyde, Glasgow
This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence o...

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security. , (190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...

Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J. & Munoz, J. (2006)
Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In Hutchinson, W. (Ed.). ISBN 1905305206 & 9781905305209
Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, th...

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J. & Munoz, J. (2005)
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In Hutchinson, W. (Ed.
This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, an...