Network Intrusion Detection based on LDA for payload feature selection
(2010)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., & Nanda, P. (2010, December). Network Intrusion Detection based on LDA for payload feature selection. Presented at 2010 IEEE Globecom Workshops
A Two-Tier System for Web Attack Detection Using Linear Discriminant Method (2010)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W.-C. (2010, December). A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. Presented at 12th International Conference, ICICS 2010, Barcelona, SpainThe reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.
Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs) (2010)
Presentation / Conference Contribution
Moradpoor, N., Parr, G., Mcclean, S., Scotney, B., Sivalingam, K., & Madras, I. (2010, December). Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs). Paper presented at OPNETWORK 2010Ethernet Passive Optical Network (EPON) has been considered for access networks for quite some time to provide high-speed and high-capacity services. As a novel type of network, EPON presents many challenges so one main aim of this paper is to provid... Read More about Simulation and Performance Evaluation of Bandwidth Allocation Algorithms for Ethernet Passive Optical Networks (EPONs).
Privacy-preserving data acquisition protocol. (2010)
Presentation / Conference Contribution
Kwecka, Z., Buchanan, W. J., & Spiers, D. A. (2010, July). Privacy-preserving data acquisition protocolCurrent investigative data acquisition techniques often breach human and natural rights of the data subject and can jeopardize an investigation. Often the investigators need to reveal to the data controller precise details of their suspect’s identity... Read More about Privacy-preserving data acquisition protocol..
Patent: Improvements in or relating to digital forensics. (2010)
Patent
Buchanan, W. J., Graves, J., & Bose, N. (2010). Patent: Improvements in or relating to digital forensicsWO 2010029346 20100318
IMPROVEMENTS IN OR RELATING TO DIGITAL FORENSICS
The present disclosure relates to improvements in or relating to digital forensics, and in particular to new methods and apparatus for digital forensic analysis of digital... Read More about Patent: Improvements in or relating to digital forensics..
Security and forensic computing: intrusion detection systems. (2010)
Digital Artefact
Buchanan, W. J. (2010). Security and forensic computing: intrusion detection systems2 INTRUSION DETECTION SYSTEMS 50
2.1 Introduction 50
2.2 Types of intrusion 53
2.3 Attack patterns 54
2.4 Host/network-based intrusion detection 55
2.5 Placement of the IDS 57
2.6 SNORT 59
2.7 Example rules 61
2.8 Running Snort 67
2.9 User,... Read More about Security and forensic computing: intrusion detection systems..
RC2 Encryption and Decryption in Microsoft .NET. (2010)
Preprint / Working Paper
Buchanan, W. J. RC2 Encryption and Decryption in Microsoft .NETThis paper outlines the usage of RC2 in Microsoft .NET. It provides a basic overview of the RC2 method, along with a review of other popular encryption methods and some sample code which can be used to implement RC2.
AES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). AES Encryption and Decryption in Microsoft .NETThis paper outlines the usage of AES in Microsoft .NET. It provides a basic overview of the AES method, along with a review of other popular encryption methods and some sample code which can be used to implement AES.
3DES Encryption and Decryption in Microsoft .NET. (2010)
Report
Buchanan, W. J. (2010). 3DES Encryption and Decryption in Microsoft .NETThis paper outlines the usage of 3DES in Microsoft .NET. It provides a basic overview of the 3-DES method, along with a review of other popular encryption methods and some sample code which can be used to implement 3DES.
Novel security assessment for personal health data. (2010)
Presentation / Conference Contribution
Hazelhoff Roelfzema, N. (2010, November). Novel security assessment for personal health data. Paper presented at Perada workshop on Privacy, Security & Trust
An e-Health cloud. (2010)
Presentation / Conference Contribution
Buchanan, W. J., Thuemmler, C., Fan, L., Lo, O., & Khedim, A. S. (2010, August). An e-Health cloud. Presented at Cloud Computing for the Public SectorA significant weakness within cloud-based systems is often their security. This presentation shows how a health care cloud has been created which preserves the rights of the patient to control access to their captured data, and then how this is used... Read More about An e-Health cloud..
GLBM: A new QoS aware multicast scheme for wireless Mesh network (2010)
Journal Article
Zhao, L., Al-Dubai, A., & Min, G. (2010). GLBM: A new QoS aware multicast scheme for wireless Mesh network. Journal of Systems and Software, 83, 1318-1326. https://doi.org/10.1016/j.jss.2010.01.044Wireless mesh networks (WMNs) have been attracting significant attention due to their promising technology. The WMN technology is becoming a major avenue for the fourth generation of wireless mobility. Communication in large-scale wireless networks c... Read More about GLBM: A new QoS aware multicast scheme for wireless Mesh network.
Key note: Information Lifecycle and Data Governance (2010)
Presentation / Conference Contribution
Howie, J. (2010, August). Key note: Information Lifecycle and Data Governance. Paper presented at Goverance, Risk and Compliance
Novel information sharing syntax for data sharing between police and community partners, using role-based security. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., Lawson, A., Thuemmler, C., Fan, L., Scott, R., Lavery, A., & Mooney, C. (2010, July). Novel information sharing syntax for data sharing between police and community partners, using role-based security. Presented at 9th European Conference on Information Warfare and Security, University of Macedonia, Thessaloniki, GreeceThe exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing syntax for data sharing between police and community partners, using role-based security..
Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems (2010)
Presentation / Conference Contribution
Lo, O. C. W., Graves, J. R., & Buchanan, W. J. (2010, July). Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems. Presented at European Conference on Information Warfare and SecurityThere are a multitude of threats faced in computer networks such as viruses, worms, trojans, attempted user privilege gain, data theft and denial of service attacks. To combat such threats, multiple lines of defence are applied to a network including... Read More about Towards a framework for the generation of enhanced attack/background network traffic for evaluation of network-based intrusion detection systems.
Intrusion detection using GSAD model for HTTP traffic on web services (2010)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. P. (2010, June). Intrusion detection using GSAD model for HTTP traffic on web services. Presented at Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTTP) is used for new applications without much interference. In this paper, w... Read More about Intrusion detection using GSAD model for HTTP traffic on web services.
Experimental host-and network-based analyser and detector for Botnets (2010)
Thesis
Jacob, B. Experimental host-and network-based analyser and detector for Botnets. (Thesis). Edinburgh Napier University. http://researchrepository.napier.ac.uk/id/eprint/4026Botnets are networks of malware-infected machines that are controlled by an adversary are the cause of a large number of problems on the internet [1]. They are increasing faster than any other type of malware and have created a huge army of hosts ove... Read More about Experimental host-and network-based analyser and detector for Botnets.
Novel information sharing architecture between the Police and their community partners. (2010)
Presentation / Conference Contribution
Uthmani, O., Buchanan, W. J., & Lawson, A. (2010, February). Novel information sharing architecture between the Police and their community partners. Presented at Scottish Networking Event 2010The exchange of information between the police and community partners forms a central aspect of effective community service provision. In the context of policing, a robust and timely communications mechanism is required between police agencies and co... Read More about Novel information sharing architecture between the Police and their community partners..