Skip to main content

Research Repository

Advanced Search

All Outputs (15)

Improved ICS Honeypot Techniques (2023)
Conference Proceeding
McColm, D., & Macfarlane, R. (in press). Improved ICS Honeypot Techniques.

As work continues to advance the security posture of ICS systems across the UKNDA estate, opportunities arise to consider the deployment of deception technologies. With high-profile attacks on ICS occurring more frequently, and increasing numbers of... Read More about Improved ICS Honeypot Techniques.

Comparison Of Common Mathematical Techniques Used In The Calculation Of File Entropy (2022)
Conference Proceeding
Davies, S. R., & Macfarlane, R. (2022). Comparison Of Common Mathematical Techniques Used In The Calculation Of File Entropy. In 2022 International Conference on Electrical, Computer, Communications and Mechatronics Engineering (ICECCME). https://doi.org/10.1109/iceccme55909.2022.9988132

The research described in this paper focuses on the use of mathematical techniques to identify high entropy encrypted files generated during the execution of ransomware. A common approach used by many ransomware detection techniques is to monitor fil... Read More about Comparison Of Common Mathematical Techniques Used In The Calculation Of File Entropy.

Civil Engineering Graduate Apprenticeships: A feasibility study into development of an MSc programme based on review of current undergraduate provision (2022)
Conference Proceeding
Leitch, K., Bernal-Sanchez, J., & Macfarlane, R. (2022). Civil Engineering Graduate Apprenticeships: A feasibility study into development of an MSc programme based on review of current undergraduate provision. In Proceedings of the 8th International Symposium for Engineering Education

This paper details the findings of a study undertaken at Edinburgh Napier University to assess the feasibility of developing an existing Graduate Apprentice programme in Civil Engineering to a MSc level. Using a mixed methods approach, data from a se... Read More about Civil Engineering Graduate Apprenticeships: A feasibility study into development of an MSc programme based on review of current undergraduate provision.

Review of Current Ransomware Detection Techniques (2022)
Conference Proceeding
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022). Review of Current Ransomware Detection Techniques. In 2021 International Conference on Engineering and Emerging Technologies (ICEET) (696-701). https://doi.org/10.1109/iceet53442.2021.9659643

A review of proposed ransomware detection tools and techniques. The tools are described, compared and contrasted and possible short comings in their approaches are discussed.

Exploring the Need For an Updated Mixed File Research Data Set (2022)
Conference Proceeding
Davies, S. R., Macfarlane, R., & Buchanan, W. J. (2022). Exploring the Need For an Updated Mixed File Research Data Set. In 2021 International Conference on Engineering and Emerging Technologies (ICEET) (426-430). https://doi.org/10.1109/iceet53442.2021.9659618

Mixed file data sets are used in a variety of research areas, including Digital Forensics, Malware analysis and Ransomware detection. Researchers recently seem to either have to create their own custom data sets or well-known data sets are used, but... Read More about Exploring the Need For an Updated Mixed File Research Data Set.

Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment (2020)
Conference Proceeding
Chacon, J., Mckeown, S., & Macfarlane, R. (2020). Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment. . https://doi.org/10.1109/CyberSecurity49315.2020.9138859

Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature-and anomaly-based intrusion detection approaches. Deception techniques such as decoy objects, often called honey items, may be deploye... Read More about Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques - An Experiment.

Identifying Vulnerabilities Using Internet-wide Scanning Data (2019)
Conference Proceeding
O'Hare, J., Macfarlane, R., & Lo, O. (2019). Identifying Vulnerabilities Using Internet-wide Scanning Data. In 2019 IEEE 12th International Conference on Global Security, Safety and Sustainability (ICGS3) (1-10). https://doi.org/10.1109/ICGS3.2019.8688018

Internet-wide scanning projects such as Shodan and Censys, scan the Internet and collect active reconnaissance results for online devices. Access to this information is provided through associated websites. The Internet-wide scanning data can be used... Read More about Identifying Vulnerabilities Using Internet-wide Scanning Data.

Privacy Parameter Variation using RAPPOR on a Malware Dataset (2018)
Conference Proceeding
Aaby, P., Mata De Acuña, J. J., Macfarlane, R., & Buchanan, W. J. (2018). Privacy Parameter Variation using RAPPOR on a Malware Dataset. In Proceedings of 17th IEEE International Conference On Trust, Security And Privacy In Computing And Communications (IEEE TrustCom-18) (8). https://doi.org/10.1109/TrustCom/BigDataSE.2018.00133

Stricter data protection regulations and the poor application of privacy protection techniques have resulted in a requirement for data-driven companies to adopt new methods of analysing sensitive user data. The RAPPOR (Randomized Aggregatable Privacy... Read More about Privacy Parameter Variation using RAPPOR on a Malware Dataset.

Review of e-Health Frameworks. (2015)
Conference Proceeding
Prajapati, B., Buchanan, W. J., Smales, A., Macfarlane, R., & Spyra, G. (2015). Review of e-Health Frameworks. In Health Informatics Conference 2015

In order to improve the quality of health care and widen the accessibility, health care providers are consistently looking to inject information and communication technology to the traditional health care system (Mair, et al., 2012). This process can... Read More about Review of e-Health Frameworks..

Evaluating Digital Forensic Tools (DFTs). (2014)
Conference Proceeding
Flandrin, F., Buchanan, W. J., Macfarlane, R., Ramsay, B., & Smales, A. (2014). Evaluating Digital Forensic Tools (DFTs). In 7th International Conference : Cybercrime Forensics Education & Training

This paper outlines the key methods used in the evaluation of digital forensics tools.

Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. (2013)
Conference Proceeding
Buchanan, W. J., Macfarlane, R., & Clayton, J. (2013). Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter. In G. Weir, & M. Daley (Eds.), Cyberforensics Perspectives : Proceedings of the 3rd International Conference on Cybercrime, Security and Digital Forensics (Cyberforensics 2013)

There is a problem in the world of digital forensics. The demands on digital forensic investigators and resources will continue to increase as the use of computers and other electronic devices increases, and as the storage capacity of these devices i... Read More about Experimental evaluation of disk sector hash comparison for forensic triage using a Bloom filter..

Security issues of a publicly accessible cloud computing infrastructure. (2012)
Conference Proceeding
Russell, G., & Macfarlane, R. (2012). Security issues of a publicly accessible cloud computing infrastructure. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom-2012) (1210-1216). https://doi.org/10.1109/TrustCom.2012.259

Edinburgh Napier University runs a custom cloud computing infrastructure for both student and public use. Such access carries dangers, both reputational and legal, as accidental or deliberate acts by users can be dangerous to other systems. This pape... Read More about Security issues of a publicly accessible cloud computing infrastructure..

A forensic image description language for generating test images. (2012)
Conference Proceeding
Russell, G., Macfarlane, R., & Ludwiniak, R. (2012). A forensic image description language for generating test images. In Proceedings of the 6th International Conference on Cybercrime Forensics Education & Training

Digital Forensics is a fast developing job market, as well as being topical and interesting, and as such is an area in which University students are keen to develop and study. At Edinburgh Napier University this topic has been taught with flexible an... Read More about A forensic image description language for generating test images..

A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). (2011)
Conference Proceeding
Buchanan, W. J., Flandrin, F., Macfarlane, R., & Graves, J. (2011). A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS). In Cyberforensics 2011

This paper defines a methodology for the evaluation of a Rate-based Intrusion Prevention System (IPS) for a Distributed Denial of Service (DDoS) threat. This evaluation system uses realistic background traffic along with attacking traffic, with four... Read More about A methodology to evaluate rate-based intrusion prevention system against distributed denial-of-service (DDoS)..

Student perception of on-line lectures with a blended learning environment. (2010)
Conference Proceeding
Buchanan, W. J., Macfarlane, R., & Ludwiniak, R. (2010). Student perception of on-line lectures with a blended learning environment.

Educational institutions are increasingly moving towards enhancing learning through the use of integrated information technology. Blended, or augmented, learning, aims to support the traditional learning environment – where the instructor blends onli... Read More about Student perception of on-line lectures with a blended learning environment..