Decrypting Live SSH Traffic in Virtual Environments
Mclaren, P., Russell, G., Buchanan, W. J., & Tan, Z. (2019)
Decrypting Live SSH Traffic in Virtual Environments. Digital Investigation, 29, 109-117. https://doi.org/10.1016/j.diin.2019.03.010
Decrypting and inspecting encrypted malicious communications may assist crime detection and prevention. Access to client or server memory enables the discovery of artefacts re...
Security for Cyber-Physical Systems in Healthcare
Saleem, K., Tan, Z., & Buchanan, W. (2017)
Security for Cyber-Physical Systems in Healthcare. In Health 4.0: How Virtualization and Big Data are Revolutionizing Healthcare (233-251). Springer. https://doi.org/10.1007/978-3-319-47617-9_12
The great leap forward of cyber-physical systems has made provision for future personalized medicine. However, these systems are prone to cyber attacks. To provide patients wi...
Hybrid Tree-rule Firewall for High Speed Data Transmission
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2016)
Hybrid Tree-rule Firewall for High Speed Data Transmission. IEEE transactions on cloud computing, 1-1. https://doi.org/10.1109/tcc.2016.2554548
Traditional firewalls employ listed rules in both configuration and process phases to regulate network traffic. However, configuring a firewall with listed rules may create ru...
Intrusion detection method based on nonlinear correlation measure
Ambusaidi, M. A., Tan, Z., He, X., Nanda, P., Lu, L. F., & Jamdagni, A. (2014)
Intrusion detection method based on nonlinear correlation measure. International Journal of Internet Protocol Technology, 8(2/3), 77. https://doi.org/10.1504/ijipt.2014.066377
Cyber crimes and malicious network activities have posed serious threats to the entire internet and its users. This issue is becoming more critical, as network-based services,...
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., & Hu, J. (2015)
Detection of Denial-of-Service Attacks Based on Computer Vision Techniques. IEEE Transactions on Computers, 64(9), 2519-2533. https://doi.org/10.1109/tc.2014.2375218
Detection of Denial-of-Service (DoS) attacks has attracted researchers since 1990s. A variety of detection systems has been proposed to achieve this task. Unlike the existing ...
Enhancing Big Data Security with Collaborative Intrusion Detection
Tan, Z., Nagar, U. T., He, X., Nanda, P., Liu, R. P., Wang, S., & Hu, J. (2014)
Enhancing Big Data Security with Collaborative Intrusion Detection. IEEE cloud computing, 1(3), 27-33. https://doi.org/10.1109/mcc.2014.53
Big data, often stored in cloud networks, is changing our business models and applications. Rich information residing in big data is driving business decision making to be a d...
A Stateful Mechanism for the Tree-Rule Firewall
Chomsiri, T., He, X., Nanda, P., & Tan, Z. (2014)
A Stateful Mechanism for the Tree-Rule Firewall. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (122-129). https://doi.org/10.1109/trustcom.2014.20
In this paper, we propose a novel connection tracking mechanism for Tree-rule firewall which essentially organizes firewall rules in a designated Tree structure. A new firewal...
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment
Jan, M. A., Nanda, P., He, X., Tan, Z., & Liu, R. P. (2014)
A Robust Authentication Scheme for Observing Resources in the Internet of Things Environment. In 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications, (205-211). https://doi.org/10.1109/trustcom.2014.31
The Internet of Things is a vision that broadens the scope of the internet by incorporating physical objects to identify themselves to the participating entities. This innovat...
A Novel Feature Selection Approach for Intrusion Detection Data Classification
Ambusaidi, M. A., He, X., Tan, Z., Nanda, P., Lu, L. F., & Nagar, U. T. (2014)
A Novel Feature Selection Approach for Intrusion Detection Data Classification. https://doi.org/10.1109/trustcom.2014.15
Intrusion Detection Systems (IDSs) play a significant role in monitoring and analyzing daily activities occurring in computer systems to detect occurrences of security threats...
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Ping Liu, R. (2014)
A System for Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. IEEE Transactions on Parallel and Distributed Systems, 25(2), 447-456. https://doi.org/10.1109/tpds.2013.146
Interconnected systems, such as Web servers, database servers, cloud computing servers and so on, are now under threads from network attackers. As one of most common and aggre...