Skip to main content

Research Repository

Advanced Search

Outputs (15)

Enhancing intrusion detection via an active target host. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, December). Enhancing intrusion detection via an active target host. Presented at IEEE ICTe 2006

Over the past decade, there have been increases in network attacks. These attacks are typically at-tempts to compromise the integrity, confidentiality or availability of networked resources. In other to reduce these attacks, Intrusion Detection Syste... Read More about Enhancing intrusion detection via an active target host..

A framework to detect novel computer viruses via system calls. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, December). A framework to detect novel computer viruses via system calls. Presented at 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

Agent-based systems for Ad-hoc routing. (2006)
Presentation / Conference Contribution
Buchanan, W. J., Migas, N., & McArtney, K. (2006, April). Agent-based systems for Ad-hoc routing. Presented at BCS Symposium on Intelligence in Security and Forensic Computing

Provides a foundation in agent-based systems for Ad-hoc routing.

Mobile Multicast Route Optimisation (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006, June). Mobile Multicast Route Optimisation. Presented at 2006 IEEE International Conference on Communications

The multiparty nature of multicast applications presents new challenges for Mobile IP users. Unfortunately, when a multicast receiver is mobile, it will experience additional delay in receiving multicast packets due to handover delay, join latency, a... Read More about Mobile Multicast Route Optimisation.

A Performance Study of Path Based Multicast Communication Algorithms (2006)
Presentation / Conference Contribution
Al-Dubai, A., & Romdhani, I. (2006, September). A Performance Study of Path Based Multicast Communication Algorithms. Presented at International Symposium on Parallel Computing in Electrical Engineering (PARELEC'06)

Multicast communication?s history has been driven by many schemes; however, a few have shown their efficiency on interconnection networks. Among these schemes, path based multicast has been proven to be more efficient in handling multicast, than thos... Read More about A Performance Study of Path Based Multicast Communication Algorithms.

NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006). NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data. Computers and Security, 25(6), 445-451. https://doi.org/10.1016/j.cose.2006.04.001

Intrusion Detection Systems (IDSs) are systems that protect against violation of data integrity, confidentiality and availability of resources. In the past 20 years, these systems have evolved with the technology and have become more sophisticated. D... Read More about NetHost-Sensor: Investigating the capture of end-to-end encrypted intrusive data.

On High Performance Multicast Algorithms for Interconnection Networks (2006)
Presentation / Conference Contribution
Al-Dubai, A., Ould-Khaoua, M., & Romdhani, I. (2006, September). On High Performance Multicast Algorithms for Interconnection Networks. Presented at HPCC 2006: High Performance Computing and Communications, Munich, Germany

Although multicast communication, in interconnection networks has been a major avenue for a lot of research works found in literature, there are several key issues that should still be improved in order to meet the increasing demand for service quali... Read More about On High Performance Multicast Algorithms for Interconnection Networks.

Hierarchical Home Agent Architecture for Mobile IP Communications (2006)
Presentation / Conference Contribution
Romdhani, I., Munoz, J., Bettahar, H., & Bouabdallah, A. (2006, June). Hierarchical Home Agent Architecture for Mobile IP Communications. Presented at 11th IEEE Symposium on Computers and Communications (ISCC'06)

While the Mobile IP protocol does not exclude the use of multiple Home Agents (HAs), it does not impose any particular model either. Recent solutions propose that a mobile node uses multiple HAs located in different physical links in his home network... Read More about Hierarchical Home Agent Architecture for Mobile IP Communications.

On balancing network traffic in path-based multicast communication (2006)
Journal Article
Al-Dubai, A., Ould-Khaoua, M., & Mackenzie, L. (2006). On balancing network traffic in path-based multicast communication. Future Generation Computer Systems, 22(7), 805-811. https://doi.org/10.1016/j.future.2006.02.009

This paper presents a new multicast path-based algorithm, referred to here as the Qualified Groups (QG for short), which can achieve a high
degree of parallelism and low communication latency over a wide range of traffic loads in the mesh. The QG al... Read More about On balancing network traffic in path-based multicast communication.

Investigating false positive reduction in HTTP via procedure analysis. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, July). Investigating false positive reduction in HTTP via procedure analysis. Presented at IEEE International Conference on Networking and Services (ICNS 2006)

This paper focuses on high false-positive rate of attacks. First, the merits and demerits of research work in curbing false positive rate of attacks in intrusion detection systems (IDSs) are discussed. Then we present our research efforts in the form... Read More about Investigating false positive reduction in HTTP via procedure analysis..

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006, June). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. Presented at 5th European Conference on Information Warfare and Security (ECIW)

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006, June). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. Presented at 5th European Conference on Information Warfare and Security

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

Transparent Handover for Mobile Multicast Sources (2006)
Presentation / Conference Contribution
Romdhani, I., Bettahar, H., & Bouabdallah, A. (2006, April). Transparent Handover for Mobile Multicast Sources. Presented at International Conference on Networking, International Conference on Systems and International Conference on Mobile Communications and Learning Technologies (ICNICONSMCL'06)

The Internet research community has proposed many routing protocols to support efficient multicast application. However, these protocols were developed for multicast parties whose members are topologically stationary, and they thus do not support bot... Read More about Transparent Handover for Mobile Multicast Sources.

An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing (2006)
Presentation / Conference Contribution
Migas, N., & Buchanan, W. (2006, March). An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing. Presented at 13th Annual IEEE International Symposium and Workshop on Engineering of Computer-Based Systems (ECBS'06)

Multi-hop ad-hoc routing is a challenging issue, because of the dynamic network topology, and limited capabilities of resource-constrained mobile devices. This paper proposes a metric-driven clustering organisation of participating nodes which provid... Read More about An auto-configurable, and, adaptable, metric-driven cluster-head organisation for hybrid multi-hop routing.

NetHost-sensor: Monitoring a target host's application via system calls (2006)
Journal Article
Abimbola, A., Munoz, J., & Buchanan, W. (2006). NetHost-sensor: Monitoring a target host's application via system calls. Information Security Technical Report, 11(4), 166-175. https://doi.org/10.1016/j.istr.2006.10.003

Intrusion detection has emerged as an important approach to network, host and application security. Network security includes analysing network packet payload and other inert network packet profiles for intrusive trends; whereas, host security may em... Read More about NetHost-sensor: Monitoring a target host's application via system calls.