8 results

A Comparative Analysis of Honeypots on Different Cloud Platforms

Journal Article
Kelly, C., Pitropakis, N., Mylonas, A., McKeown, S., & Buchanan, W. J. (2021)
A Comparative Analysis of Honeypots on Different Cloud Platforms. Sensors, 21(7), https://doi.org/10.3390/s21072433
In 2019, the majority of companies used at least one cloud computing service and it is expected that by the end of 2021, cloud data centres will process 94% of workloads. The ...

Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach

Conference Proceeding
Christou, O., Pitropakis, N., Papadopoulos, P., Mckeown, S., & Buchanan, W. J. (2020)
Phishing URL Detection Through Top-Level Domain Analysis: A Descriptive Approach. In Proceedings of the 6th International Conference on Information Systems Security and Privacy. , (289-298). https://doi.org/10.5220/0008902202890298
Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high ...

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment

Conference Proceeding
Chacon, J., Mckeown, S., & Macfarlane, R. (2020)
Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. https://doi.org/10.1109/CyberSecurity49315.2020.9138859
Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature-and anomaly-based intrusion detection approaches. Deception...

Using Amazon Alexa APIs as a Source of Digital Evidence

Conference Proceeding
Krueger, C., & Mckeown, S. (2020)
Using Amazon Alexa APIs as a Source of Digital Evidence. https://doi.org/10.1109/CyberSecurity49315.2020.9138849
With the release of Amazon Alexa and the first Amazon Echo device, the company revolutionised the smart home. It allowed their users to communicate with, and control, their sm...

Testing And Hardening IoT Devices Against the Mirai Botnet

Conference Proceeding
Kelly, C., Pitropakis, N., McKeown, S., & Lambrinoudakis, C. (2020)
Testing And Hardening IoT Devices Against the Mirai Botnet. https://doi.org/10.1109/CyberSecurity49315.2020.9138887
A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufa...

Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems

Journal Article
Mckeown, S., Russell, G., & Leimich, P. (2020)
Fast Forensic Triage Using Centralised Thumbnail Caches on Windows Operating Systems. Journal of Digital Forensics, Security and Law, 14(3),
A common investigative task is to identify known contraband images on a device, which typically involves calculating cryptographic hashes for all the files on a disk and check...

Fingerprinting JPEGs With Optimised Huffman Tables

Journal Article
McKeown, S., Russell, G., & Leimich, P. (2018)
Fingerprinting JPEGs With Optimised Huffman Tables. Journal of Digital Forensics, Security and Law, 13(2), https://doi.org/10.15394/jdfsl.2018.1451
A common task in digital forensics investigations is to identify known contraband images. This is typically achieved by calculating a cryptographic digest, using hashing algor...

Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts

Conference Proceeding
McKeown, S., Maxwell, D., Azzopardi, L., & Glisson, W. B. (2014)
Investigating people: a qualitative analysis of the search behaviours of open-source intelligence analysts. In IIiX '14: Proceedings of the 5th Information Interaction in Context Symposium, (175-184). https://doi.org/10.1145/2637002.2637023
The Internet and the World Wide Web have become integral parts of the lives of many modern individuals, enabling almost instantaneous communication, sharing and broadcasting o...