Skip to main content

Research Repository

Advanced Search

All Outputs (33)

Embedding programming skills to support the student journey in networking, security and digital forensics. (2014)
Presentation / Conference Contribution
Lawson, A., & Macfarlane, R. (2014, April). Embedding programming skills to support the student journey in networking, security and digital forensics. Paper presented at HEA STEM Annual Learning and Teaching Conference 2014: Enhancing the STEM Student Journey

The development of programming skills by Networking graduates, and Security and Digital Forensics graduates is highly sought after by employers, both in industry, and in academia for staffing research and knowledge exchange projects. Placements offer... Read More about Embedding programming skills to support the student journey in networking, security and digital forensics..

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013, June). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. Presented at Cyberforensics 2013, Cardiff, UK

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Approaches to the classification of high entropy file fragments. (2013)
Journal Article
Penrose, P., Macfarlane, R., & Buchanan, W. J. (2013). Approaches to the classification of high entropy file fragments. Digital Investigation, 10(4), 372-384. https://doi.org/10.1016/j.diin.2013.08.004

In this paper we propose novel approaches to the problem of classifying high entropy file fragments. We achieve 97% correct classification for encrypted fragments and 78% for compressed. Although classification of file fragments is central to the sci... Read More about Approaches to the classification of high entropy file fragments..

A forensic image description language for generating test images. (2012)
Presentation / Conference Contribution
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012, September). A forensic image description language for generating test images

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Presentation / Conference Contribution
Russell, G., & Macfarlane, R. (2012, June). Security issues of a publicly accessible cloud computing infrastructure

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

Cloud Forensics. (2012)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., Graves, J., Fan, L., Ekonomou, E., & Bose, N. (2012, March). Cloud Forensics. Paper presented at International Seminar on Policing Digital Crime

This presentation outlines the usage of digital forensics in the Cloud.

Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. (2011)
Journal Article
Buchanan, W. J., Graves, J., Bose, N., Macfarlane, R., Davison, B., & Ludwiniak, R. (2011). Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs. HEA ICS Conference,

This paper focuses on the integration of virtualised environments within the teaching of computer security and digital forensics, and includes three case studies. The first case study involves assessing student perception on the usage of VMware Works... Read More about Performance and student perception evaluation of cloud-based virtualised security and digital forensics labs..

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Presentation / Conference Contribution
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011, June). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). Presented at Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..

Formal security policy implementations in network firewalls. (2011)
Journal Article
Macfarlane, R., Buchanan, W. J., Ekonomou, E., Uthmani, O., Fan, L., & Lo, O. (2012). Formal security policy implementations in network firewalls. Computers and Security, 31(2), 253-270. https://doi.org/10.1016/j.cose.2011.10.003

Network security should be based around security policies. From high-level natural language, non-technical, policies created by management, down to device and vendor specific policies, or configurations, written by network system administrators. Ther... Read More about Formal security policy implementations in network firewalls..

Cloud-based digital forensics evaluation test (D-FET) platform. (2011)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., Flandrin, F., Graves, J., Fan, L., Ekonomou, E., Bose, N., & Ludwiniak, R. (2011, June). Cloud-based digital forensics evaluation test (D-FET) platform. Paper presented at Cyberforensics 2011

This paper outlines the specification of the Cloud-based DFET platform which is used to evaluate the performance of digital forensics tools, which aim to detect the presence of trails of evidence, such as for the presence of illicit images and determ... Read More about Cloud-based digital forensics evaluation test (D-FET) platform..

D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. (2011)
Presentation / Conference Contribution
Buchanan, W. J., & Macfarlane, R. (2011, June). D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures. Paper presented at Scottish Higher Education Employability Conference: Strengthening Partnerships with Employers

The use of virtualised and cloud-based environments provide an excellent opportunity to enhance learning and to provide students with skills which match exactly to the requirements of industry, along with integrating with professional certification.... Read More about D-FET – A community cloud for enhancing skills using virtualised environments and cloud-based infrastructures..

Student perception of on-line lectures with a blended learning environment. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Macfarlane, R., & Ludwiniak, R. (2010, September). Student perception of on-line lectures with a blended learning environment. Presented at The 4th International Conference on Cybercrime Forensics Education & Training

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..

An integrated firewall policy validation tool (2009)
Thesis
Macfarlane, R. An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3971

Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enfor... Read More about An integrated firewall policy validation tool.