Skip to main content

Research Repository

Advanced Search

An integrated firewall policy validation tool (2009)
Thesis
Macfarlane, R. An integrated firewall policy validation tool. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/3971

Security policies are increasingly being implemented by organisations. Policies are mapped to device configurations to enforce the policies. This is typically performed manually by network administrators. The development and management of these enfor... Read More about An integrated firewall policy validation tool.

Intrusion Detection Using Geometrical Structure (2009)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009, December). Intrusion Detection Using Geometrical Structure. Presented at 2009 Fourth International Conference on Frontier of Computer Science and Technology, Shanghai, China

We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the correlations among the packet payload features arranged in a geometrical st... Read More about Intrusion Detection Using Geometrical Structure.

Enhanced event time-lining for digital forensic systems (2009)
Thesis
Symon, C. Enhanced event time-lining for digital forensic systems. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4028

In a digital forensics investigation, log files can be used as a form of evidence by reconstructing timelines of the computer system events recorded in log files. Log files can come from a variety of sources, each of which may make use of proprietary... Read More about Enhanced event time-lining for digital forensic systems.

Integrated many-to-many multicast addressing and access control method (2009)
Presentation / Conference Contribution
Romdhani, I., & Yassin Al-Dubai, A. (2009, July). Integrated many-to-many multicast addressing and access control method. Presented at 2009 IEEE Symposium on Computers and Communications, Sousse, Tunisia

IP multicast is an efficient method for distributing multimedia content to a large number of receivers while saving the network bandwidth and reducing processing overhead on the source side. However, current IP multicast deployment figure is still fa... Read More about Integrated many-to-many multicast addressing and access control method.

Culture & biometrics: regional differences in the perception of biometric authentication technologies (2009)
Journal Article
Riley, C. W., Buckner, K., Johnson, G., & Benyon, D. (2009). Culture & biometrics: regional differences in the perception of biometric authentication technologies. AI & society, 24(3), 295-306. https://doi.org/10.1007/s00146-009-0218-1

Previous research has identified user concerns about biometric authentication technology, but most of this research has been conducted in European contexts. There is a lack of research that has investigated attitudes towards biometric technology in o... Read More about Culture & biometrics: regional differences in the perception of biometric authentication technologies.

Real-Time Data Analytics in Support of Network Resource Management Protocols (2009)
Presentation / Conference Contribution
Moradpoor‫, N., Parr, G., Mcclean, S., Scotney, B., & Owusu, G. (2009, March). Real-Time Data Analytics in Support of Network Resource Management Protocols. Presented at 10th Annual PostGraduate Symposium on The Convergence of Telecommunications, Networking and Broadcasting, Liverpool, UK

Communications Networks Resource Management (RM) functions such as dynamic and static resource usage monitoring, real time resource reservation as well as advance resource reservation have been widely studied in the past few years. Research has been... Read More about Real-Time Data Analytics in Support of Network Resource Management Protocols.

Network Firewall Dynamic Performance Evaluation and Formalisation (2009)
Thesis
Saliou, L. Network Firewall Dynamic Performance Evaluation and Formalisation. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/2599

Computer network security is key to the daily operations of an organisation, its growth and its future. It is unrealistic for an organisation to devote all of its resources to computer network security, but equally an organisation must be able to det... Read More about Network Firewall Dynamic Performance Evaluation and Formalisation.

Validation of 1-N OT algorithms in privacy-preserving investigations. (2008)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Saliou, L. (2008, June). Validation of 1-N OT algorithms in privacy-preserving investigations. Presented at 7th European Conference on Information Warfare and Security

Most organisations relay on digital information systems (ISs) in day-to-day operations, and often sensitive data about employees and customers are stored in such systems. This, effectively, makes ISs enhanced surveillance measures, which can reach fu... Read More about Validation of 1-N OT algorithms in privacy-preserving investigations..

Evaluation of digital identity using Windows CardSpace (2008)
Thesis
Fernandez Sepulveda, A. Evaluation of digital identity using Windows CardSpace. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4032

The Internet was initially created for academic purposes, and due to its success, it has been extended to commercial environments such as e-commerce, banking, and email. As a result, Internet crime has also increased. This can take many forms, such a... Read More about Evaluation of digital identity using Windows CardSpace.

Scenario Analysis using Out-of-line Firewall Evaluation Framework. (2007)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2007, July). Scenario Analysis using Out-of-line Firewall Evaluation Framework. Presented at 6th European Conference on Information Warfare, and Security, Shrivenham, UK

Distributed Denial-of-Service (DDoS) attacks against corporate networks and assets are increasing, and their potential risk for future attacks is also a major concern. These attacks typically aim at disabling computer network infrastructure, and, sin... Read More about Scenario Analysis using Out-of-line Firewall Evaluation Framework..

A framework to detect novel computer viruses via system calls. (2006)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, December). A framework to detect novel computer viruses via system calls. Presented at 7th Annual PG Symposium on The Convergence of Telecommunications, Networking and Broadcasting

This paper describes a framework for detecting self-propagating email viruses based on deterministic system calls derived from associated email client’s dynamic link libraries (DLLs). Our research approach is based on the principle that a key objecti... Read More about A framework to detect novel computer viruses via system calls..

Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. (2006)
Presentation / Conference Contribution
Graves, J., Buchanan, W. J., Saliou, L., & Old, L. J. (2006, June). Performance analysis of network based forensic systems for in-line and out-of-line detection and logging. Presented at 5th European Conference on Information Warfare and Security (ECIW)

Network based forensic investigations often rely on data provided by properly configured network- based devices. The logs from interconnected devices such as routers, servers and Intrusion Detection Systems (IDSs) can yield important information, whi... Read More about Performance analysis of network based forensic systems for in-line and out-of-line detection and logging..

Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. (2006)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2006, June). Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations. Presented at 5th European Conference on Information Warfare and Security

Security in computer networks is typically passive, static, and reactive. This is typically due to most networking devices being rule-based, and when updates are necessary, they are normally done manually. Ultimately, the social and hierarchical stru... Read More about Analysis of Firewall Performance Variation to Identify the Limits of Automated Network Reconfigurations..

Agent-based forensic investigations with an integrated framework. (2005)
Presentation / Conference Contribution
Buchanan, W. J., Graves, J., Saliou, L., Sebea, A. L., & Migas, N. (2005, July). Agent-based forensic investigations with an integrated framework. Presented at 4th European Conference of Information Warfare and Security

Forensics investigations can be flawed for many reasons, such as that they can lack any real evidence of an incident. Also, it can be the case that the legal rights of an individual has been breached, or that the steps taken in the investigation cann... Read More about Agent-based forensic investigations with an integrated framework..

Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification (2005)
Presentation / Conference Contribution
Saliou, L., Buchanan, W. J., Graves, J., & Munoz, J. (2005, July). Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification. Presented at 4th European Conference on Information Warfare and Security

This paper presents a novel framework for network security, and provides a complete solution to integrated security policies, which meets the objectives of an organisation, and also an automated verification process. The framework uses a security com... Read More about Novel Framework for Automated Security Abstraction, Modelling, Implementation and Verification.

Analysis and detection of cruising computer viruses. (2004)
Presentation / Conference Contribution
Abimbola, A., Munoz, J., & Buchanan, W. J. (2006, August). Analysis and detection of cruising computer viruses. Presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Viral propagation is an important phenomenon of computer viruses. This paper focuses on viral movement and proposes the feasibility of a computer virus which is able to target a specific host, known as cruising. A novel component, based on target pro... Read More about Analysis and detection of cruising computer viruses..

Covert channel analysis and detection using reverse proxy servers. (2004)
Presentation / Conference Contribution
Buchanan, W. J., & Llamas, D. (2004, June). Covert channel analysis and detection using reverse proxy servers. Paper presented at 3rd International Conference on Electronic Warfare and Security (EIWC)

Data hiding methods can be used by intruders to communicate over open data channels (Wolf 1989; McHugh 1995; deVivo, deVivo et al. 1999), and can be used to overcome firewalls, and most other forms of network intrusion detection systems. In fact, mos... Read More about Covert channel analysis and detection using reverse proxy servers..