Research explorer tool

9 results

Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems

Conference Proceeding
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2009)
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. In J. Demergis (Ed.), Proceedings of 9th European Conference on Information Warfare and Security, 190-200
There are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat...

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs.

Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011)
Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,
This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first ca...

Scenario Analysis using Out-of-line Firewall Evaluation Framework.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007)
Scenario Analysis using Out-of-line Firewall Evaluation Framework
Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These a...

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations.

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J. & Munoz, J. (2006)
Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. In Hutchinson, W. (Ed.). ISBN 1905305206 & 9781905305209
Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, th...

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS).

Conference Proceeding
Buchanan, W. J., Flandrin, F., Macfarlane, R. & Graves, J. (2010)
A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011
This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system...

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification

Conference Proceeding
Saliou, L., Buchanan, W. J., Graves, J. & Munoz, J. (2005)
Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. In Hutchinson, W. (Ed.
This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, an...

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging.

Conference Proceeding
Graves, J., Buchanan, W. J., Saliou, L. & Old, L. J. (2006)
Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. ISBN 1905305206
Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers ...

Cloud-based digital forensics evaluation test (D-FET) platform.

Presentation / Conference
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., …Ludwiniak, R. (2011, June)
Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011, University of Strathclyde, Glasgow
This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence o...

Agent-based forensic investigations with an integrated framework.

Conference Proceeding
Buchanan, W. J., Graves, J., Saliou, L., Sebea, A. L. & Migas, N. (2004)
Agent-based forensic investigations with an integrated framework
Forensics investigations can be flawed for many reasons, such as that they can lack any real evidence of an incident. Also, it can be the case that the legal rights of an indi...