A Trust-based Intrusion Detection System for Mobile RPL Based Networks
Conference Proceeding
Faiza, M., Tandjaoui, D., Romdhani, I., & Nabil, D. (2018)
A Trust-based Intrusion Detection System for Mobile RPL Based Networks. In Proceedings of 10th IEEE International Conference on Internet of Things (iThings-2017)https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData.2017.113
Successful deployment of Low power and Lossy Networks (LLNs) requires self-organising, self-configuring, security, and mobility support. However, these characteristics can be ...
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study
Journal Article
Tweneboah-Koduah, S., & Buchanan, W. J. (2018)
Security Risk Assessment of Critical Infrastructure Systems: A Comparative Study. Computer Journal, 61(9), 1389-1406. https://doi.org/10.1093/comjnl/bxy002
Recent cyberattacks on critical infrastructure systems coupled with the technology-induced complexity of the system of systems have necessitated a review of existing methods o...
Distance Measurement Methods for Improved Insider Threat Detection
Journal Article
Lo, O., Buchanan, W. J., Griffiths, P., & Macfarlane, R. (2018)
Distance Measurement Methods for Improved Insider Threat Detection. Security and Communication Networks, 2018, 1-18. https://doi.org/10.1155/2018/5906368
Insider threats are a considerable problem within cyber security and it is often difficult to detect these threats using signature detection. Increasing machine learning can p...
Employing machine learning techniques for detection and classification of phishing emails
Conference Proceeding
Moradpoor, N., Clavie, B., & Buchanan, B. (2018)
Employing machine learning techniques for detection and classification of phishing emails. In Proceedings of the IEEE Technically Sponsored Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252096
A phishing email is a legitimate-looking email which is designed to fool the recipient into believing that it is a genuine email, and either reveals sensitive information or d...
Mining malware command and control traces
Conference Proceeding
McLaren, P., Russell, G., & Buchanan, B. (2018)
Mining malware command and control traces. In Proceedings of the SAI Computing Conference 2017https://doi.org/10.1109/SAI.2017.8252185
Detecting botnets and advanced persistent threats is a major challenge for network administrators. An important component of such malware is the command and control channel, w...
Fast Filtering of Known PNG Files Using Early File Features
Conference Proceeding
McKeown, S., Russell, G., & Leimich, P. (2017)
Fast Filtering of Known PNG Files Using Early File Features. In Proceedings of the Conference on Digital Forensics, Security and Law
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies
Conference Proceeding
Asif, R. (2017)
Quantum Encrypted Signals on Multiuser Optical Fiber Networks: Simulation Analysis of Next Generation Services and Technologies. In NoF 2017 Conference Proceedingshttps://doi.org/10.1109/NOF.2017.8251243
Data encryption is gaining much attention these days from the research community and industry for transmitting secure information over access networks, i.e. 'fiber-to-the-home...
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Conference Proceeding
Kintis, P., Miramirkhani, N., Lever, C., Chen, Y., Romero-Gómez, R., Pitropakis, N., …Antonakakis, M. (2017)
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse. In CCS '17 Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Securityhttps://doi.org/10.1145/3133956.3134002
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific typ...
Performance Evaluation of a Fragmented Secret Share System
Conference Proceeding
Ukwandu, E., Buchanan, W. J., & Russell, G. (2017)
Performance Evaluation of a Fragmented Secret Share System. In Proceedings of the International Conference on Cyber Situational Awareness, Data Analytics and Assessment (Cyber SA 2017)https://doi.org/10.1109/cybersa.2017.8073396
There are many risks in moving data into public storage environments, along with an increasing threat around large-scale data leakage. Secret sharing scheme has been proposed ...
A methodology for the security evaluation within third-party Android Marketplaces
Journal Article
Buchanan, W. J., Chiale, S., & Macfarlane, R. (2017)
A methodology for the security evaluation within third-party Android Marketplaces. Digital Investigation, 23, 88-98. https://doi.org/10.1016/j.diin.2017.10.002
This paper aims to evaluate possible threats with unofficial Android marketplaces, and geo localize the malware distribution over three main regions: China, Europe; and Russia...