Browsing by Author "Cullen, AJ"
Now showing 1 - 5 of 5
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication An Overview of Apoptosis for Computer Security(IEEE, 2008) ;Saudi, MM ;Woodward, M ;Cullen, AJNoor, HMImmune system is essential to human body as it protects our bodies from pathogens in an orchestrated manner. From a computational viewpoint, the immune system has much to offer by way of inspiration. Recently, there has been growing interest in the use of natural immune system as inspiration for the creation novel approaches to computational problem. This field of research is referred as Immunological Computation or Artificial Immune System. The use of artificial system computer security is an appealing concept for two reasons. Firstly, the human immune system provides human body with a high level protection from invading pathogens in robust manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. This paper introduces the concept of apoptosis for computer security. This term is borrowed from cell biology and designates the programmed cell death. - Some of the metrics are blocked by yourconsent settings
Publication An Overview of STAKCERT Framework in Confronting Worms Attack(IEEE, 2009) ;Saudi, MM ;Cullen, AJ ;Woodward, ME ;Hamid, HAAbhalim, AHA procedure is one of the most important elements that should be emphasized when handling any incident related with the cyber world. It is easily forgotten by many organizations, IT administrator and users, especially when dealing with the worms attack. Using the incident response methodology as the basis to build up the STAKCERT framework, the researchers have proposed this novel framework which helps to increase the efficiency in handling worm incident, thus facilitate the process of responding to the worm incident The STAKCERT framework consists of 2 phases where in phase 1, a novel standard operating procedure in worm detection and analysis have been introduced. In phase 2 of the framework, the worm isolation procedure is inspired by apoptosis. Apoptosis is also known as cell programmed death borrowed from the biology term. - Some of the metrics are blocked by yourconsent settings
Publication Defending Virus Infection through Extrinsic Apoptosis(IEEE, 2008) ;Saudi, MM ;Nor, AM ;Cullen, AJ ;Woodward, MNoor, HMThis paper discusses on the enhancement of the current Intrusion Defection System (IDS) based on Artificial Immune System called apoptosis. Nowadays network systems are required to be more secured since the virus is now growing stronger and more dangerous. Unfortunately, not all of the Intrusion Detection System (IDS) is effective enough to defend against viruses entering the network. In this paper, the researchers' propose a new enhanced IDS system that will defend the computer system from being attacked by viruses. By using apoptosis system as the basis of the enhancement, these IDS will work similar to the human defence system and solve the problem of the virus infection in the computer system. In addition, the researchers' have also improved the accuracy of IDS for detecting the virus by using this method. - Some of the metrics are blocked by yourconsent settings
Publication STAKCERT Worm Relational Model for Worm Detection(Int Assoc Engineers-Iaeng, 2010) ;Saudi, MM ;Cullen, AJWoodward, MEIn this paper, a new STAKCERT worm relational model is being developed based on the evaluation of the STAKCERT worm classification using the dynamic, static and statistical analysis. A case study was conducted to evaluate the effectiveness of this STAKCERT relational model. The case study result analysis showed that the 5 main features in the relational model play an important role in identifying the vulnerability exploited, the damage caused, the expected rate of worm propagation, the chronological flows and the detection avoidance techniques used by the worms. As such, perhaps this new relational model produced can be used as the basis for organizations and end users in detecting worm incidents. - Some of the metrics are blocked by yourconsent settings
Publication Statistical Analysis in Evaluating STAKCERT Infection, Activation and Payload Methods(Int Assoc Engineers-Iaeng, 2010) ;Saudi, MM ;Cullen, AJWoodward, METhis paper presents the result of the statistical analysis on relationship between sub features in STAKCERT worm classification. The sub features of the STAKCERT worm classification in this paper were using the statistical analysis to prove the relationship between the sub features. Prior to that, the static and the dynamic analysis were conducted to identify and prove the association between the main features in STAKCERT worm classification for worm detection. There are limited ways on how the relationship between categorical data can be evaluated and Chi-Square tests and the symmetric measure are seen as the best method to be implemented. The case study presented in this paper explains in details how the Chi-Square tests are used to determine the relationship existed between the sub features and followed by the symmetric measure to quantify the strength of the relationship. This research paper is based on the integration between statistics and computer security field specifically with worm analysis. It can be used as the basis for further exploration in worm detection and isolation study.