Skip to main content

Research Repository

Advanced Search

Outputs (682)

Evaluation on multivariate correlation analysis based denial-of-service attack detection system (2012)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., Nanda, P., He, X., & Liu, R. P. (2012, August). Evaluation on multivariate correlation analysis based denial-of-service attack detection system. Presented at Proceedings of the First International Conference on Security of Internet of Things - SecurIT '12, Kollam, India

In this paper, a Denial-of-Service (DoS) attack detection system is explored, where a multivariate correlation analysis technique based on Euclidean distance is applied for network traffic characterization and the principal of anomaly-based detection... Read More about Evaluation on multivariate correlation analysis based denial-of-service attack detection system.

Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization (2011)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011, November). Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization. Presented at 13th International Conference (ICICS 2011), Beijing, China

The quality of feature has significant impact on the performance of detection techniques used for Denial-of-Service (DoS) attack. The features that fail to provide accurate characterization for network traffic records make the techniques suffer from... Read More about Multivariate Correlation Analysis Technique Based on Euclidean Distance Map for Network Traffic Characterization.

Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis (2011)
Book Chapter
Tan, Z., Jamdagni, A., He, X., Nanda, P., & Liu, R. P. (2011). Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis. In Neural Information Processing; Lecture Notes in Computer Science (756-765). Springer. https://doi.org/10.1007/978-3-642-24965-5_85

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about Denial-of-Service Attack Detection Based on Multivariate Correlation Analysis.

A Two-Tier System for Web Attack Detection Using Linear Discriminant Method (2010)
Presentation / Conference Contribution
Tan, Z., Jamdagni, A., He, X., Nanda, P., Liu, R. P., Jia, W., & Yeh, W. (2010, December). A Two-Tier System for Web Attack Detection Using Linear Discriminant Method. Presented at 12th International Conference, ICICS 2010, Barcelona, Spain

The reliability and availability of network services are being threatened by the growing number of Denial-of-Service (DoS) attacks. Effective mechanisms for DoS attack detection are demanded. Therefore, we propose a multivariate correlation analysis... Read More about A Two-Tier System for Web Attack Detection Using Linear Discriminant Method.

Intrusion detection using GSAD model for HTTP traffic on web services (2010)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. P. (2010, June). Intrusion detection using GSAD model for HTTP traffic on web services. Presented at Proceedings of the 6th International Wireless Communications and Mobile Computing Conference on ZZZ - IWCMC '10

Intrusion detection systems are widely used security tools to detect cyber-attacks and malicious activities in computer systems and networks. Hypertext Transport Protocol (HTTP) is used for new applications without much interference. In this paper, w... Read More about Intrusion detection using GSAD model for HTTP traffic on web services.

Intrusion Detection Using Geometrical Structure (2009)
Presentation / Conference Contribution
Jamdagni, A., Tan, Z., Nanda, P., He, X., & Liu, R. (2009, December). Intrusion Detection Using Geometrical Structure. Presented at 2009 Fourth International Conference on Frontier of Computer Science and Technology, Shanghai, China

We propose a statistical model, namely Geometrical Structure Anomaly Detection (GSAD) to detect intrusion using the packet payload in the network. GSAD takes into account the correlations among the packet payload features arranged in a geometrical st... Read More about Intrusion Detection Using Geometrical Structure.

Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT (2017)
Presentation / Conference Contribution
Ghaleb, B., Al-Dubai, A., Romdhani, I., Nasser, Y., & Boukerche, A. (2017, May). Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT. Presented at 2017 IEEE International Conference on Communications (ICC)

Low-power and Lossy Networks (LLNs) have been a key component in the Internet of Things (IoT) paradigm. Recently, a standardized algorithm, namely Trickle algorithm, is adopted for routing information maintenance in such networks. This algorithm is o... Read More about Drizzle: Adaptive and fair route maintenance algorithm for Low-power and Lossy Networks in IoT.

Trust-Based Defence Model Against MAC Unfairness Attacks for IoT (2017)
Presentation / Conference Contribution
Djedjig, N., Tandjaoui, D., Romdhani, I., & Medjek, F. (2017, July). Trust-Based Defence Model Against MAC Unfairness Attacks for IoT. Presented at The Thirteenth International Conference on Wireless and Mobile Communications

The vulnerability of IoT networks makes channel access security a serious problem. The IEEE 802.15.4 MAC (Media Access Control) layer faces the risk of attacks from malicious nodes which attempts to get a dominating position and hold unfair advantage... Read More about Trust-Based Defence Model Against MAC Unfairness Attacks for IoT.

Blockchain and Git repositories for sticky policies protected OOXML. (2017)
Presentation / Conference Contribution
Spyra, G., Buchanan, W. J., & Ekonomou, E. (2017, November). Blockchain and Git repositories for sticky policies protected OOXML. Presented at FTC 2017 - Future Technologies Conference 2017

The paper discuss possible cloud-based Information Rights Management (IRM) model extension with enhanced accountability for both a sticky policy and an attached data. This work compliments research on secure data sharing with Office Open XML (OOX... Read More about Blockchain and Git repositories for sticky policies protected OOXML..

Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment (2017)
Journal Article
Asif, R., & Buchanan, W. J. (2017). Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment. Security and Communication Networks, 2017, 1-10. https://doi.org/10.1155/2017/7616847

There is current significant interest in Fiber-to-the-Home (FTTH) networks, i.e. end-to-end optical connectivity. Currently, it may be limited due to the presence of last-mile copper wire connections. However, in near future it is envisaged that FTTH... Read More about Quantum-to-the-Home: Achieving Gbits/s Secure Key Rates via Commercial Off-the-Shelf Telecommunication Equipment.

Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks (2017)
Presentation / Conference Contribution
Mirza, N. S., King, P. J. B., Romdhani, I., Abdelshafy, M. A., & Alghamdi, A. A. (2017, October). Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks. Presented at 2017 IEEE 13th International Conference on Wireless and Mobile Computing, Networking and Communications (WiMob)

The route recovery algorithm is a crucial part of an ad hoc routing protocol. Designing an efficient and fast route recovery mechanism scheme without incurring extra overheads or delays to repair the broken link is a desirable goal for any routing pr... Read More about Reliable multipath multi-channel route migration over multi link-failure in wireless ad hoc networks.

An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack (2017)
Presentation / Conference Contribution
Uwagbole, S. O., Buchanan, W. J., & Fan, L. (2017, September). An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack. Presented at 2017 Seventh International Conference on Emerging Security Technologies (EST)

Emerging computing relies heavily on secure back-end storage for the massive size of big data originating from the Internet of Things (IoT) smart devices to the Cloud-hosted web applications. Structured Query Language (SQL) Injection Attack (SQLIA) r... Read More about An applied pattern-driven corpus to predictive analytics in mitigating SQL injection attack.

Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments (2017)
Journal Article
Alsarhan, A., Itradat, A., Al-Dubai, A. Y., Zomaya, A. Y., & Min, G. (2018). Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments. IEEE Transactions on Parallel and Distributed Systems, 29(1), 31-42. https://doi.org/10.1109/tpds.2017.2748578

In the current cloud business environment, the cloud provider (CP) can provide a means for offering the required quality of service (QoS) for multiple classes of clients. We consider the cloud market where various resources such as CPUs, memory, and... Read More about Adaptive Resource Allocation and Provisioning in Multi-Service Cloud Environments.

Insider threat detection using principal component analysis and self-organising map (2017)
Presentation / Conference Contribution
Moradpoor, N., Brown, M., & Russell, G. (2017, October). Insider threat detection using principal component analysis and self-organising map. Presented at Proceedings of the 10th International Conference on Security of Information and Networks - SIN '17, India

An insider threat can take on many aspects. Some employees abuse their positions of trust by disrupting normal operations, while others export valuable or confidential data which can damage the employer's marketing position and reputation. In additio... Read More about Insider threat detection using principal component analysis and self-organising map.

Relevant 5G Application Scenarios in the Health Domain (2017)
Presentation / Conference Contribution
Thuemmler, C. (2017, September). Relevant 5G Application Scenarios in the Health Domain. Paper presented at IEEE 5G and Beyond Testbed Workshop, Toronto, Canada

No abstract available.

Performance evaluation of RPL metrics in environments with strained transmission ranges. (2017)
Presentation / Conference Contribution
Thomson, C., Wadhaj, I., Romdhani, I., & Al-Dubai, A. (2016, November). Performance evaluation of RPL metrics in environments with strained transmission ranges. Presented at 2016 IEEE/ACS 13th International Conference of Computer Systems and Applications (AICCSA), Agadir, Morocco

An examination of existing studies in the area of Routing Protocol for Low-Power and Lossy Networks (RPL) implementation in wireless sensor networks (WSNs) reveals a consistent approach taken of optimal node distribution. This in order to best evalua... Read More about Performance evaluation of RPL metrics in environments with strained transmission ranges..

A novel privacy preserving method for the location tracking of mobile devices (2011)
Journal Article
Buchanan, W. J., & Kwecka, Z. (2011). A novel privacy preserving method for the location tracking of mobile devices. Wireless Networks,

Two of the major changes within computing, at the present time, are the move towards serviceoriented architectures and the increasing usage of mobile devices to access these services. Along with this, as these devices are often moving, extra context... Read More about A novel privacy preserving method for the location tracking of mobile devices.