Skip to main content

Research Repository

Advanced Search

Outputs (6)

Enhancing intrusion detection via an active target host. (2006)
Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Enhancing intrusion detection via an active target host. In IEEE ICTe Africa 2006

Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of networked resources. In other to reduce these attacks, Intrusion Detection Syste... Read More about Enhancing intrusion detection via an active target host..

A framework to detect novel computer viruses via system calls. (2006)
Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). A framework to detect novel computer viruses via system calls. In M. Merabti, R. Pereira, & O. Abuelma'atti (Eds.), 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting (308-313)

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. https://doi.org/10.1016/j.cose.2006.04.001

Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these systems have evolved with the technology and have become more sophisticated. D... Read More about NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.

Investigating false positive reduction in HTTP via procedure analysis. (2006)
Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). Investigating false positive reduction in HTTP via procedure analysis. . https://doi.org/10.1109/ICNS.2006.65

This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection systems (IDSs) are discussed. Then we present our research efforts in the form... Read More about Investigating false positive reduction in HTTP via procedure analysis..

NetHost-sensor: Monitoring a target host's application via system calls (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003

Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may em... Read More about NetHost-sensor: Monitoring a target host's application via system calls.

Analysis and detection of cruising computer viruses. (2004)
Conference Proceeding
Abimbola, A., Munoz, J., & Buchanan, W. J. (2004). Analysis and detection of cruising computer viruses.

Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target a specific host, known as cruising. A novel component, based on target pro... Read More about Analysis and detection of cruising computer viruses..