Browsing by Author "Cullen A.J."
Now showing 1 - 6 of 6
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication An overview of apoptosis for computer security(2008) ;Saudi M.M. ;Woodward M. ;Cullen A.J. ;Noor H.M. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)University of BradfordImmune system is essential to human body as it protects our bodies from pathogens in an orchestrated manner. From a computational viewpoint, the immune system has much to offer by way of inspiration. Recently, there has been growing interest in the use of natural immune system as inspiration for the creation novel approaches to computational problem. This field of research is referred as Immunological Computation or Artificial Immune System. The use of artificial system computer security is an appealing concept for two reasons. Firstly, the human immune system provides human body with a high level protection from invading pathogens in robust manner. Secondly, current techniques used in computer security are not able to cope with the dynamic and increasingly complex nature of computer systems and their security. This paper introduces the concept of apoptosis for computer security. This term is borrowed from cell biology and designates the programmed cell death. � 2008 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication An overview of stakcert framework in confronting worms attack(2009) ;Saudi M.M. ;Cullen A.J. ;Woodward M.E. ;Hamid H.A. ;Abhalim A.H. ;University of BradfordUniversiti Sains Islam Malaysia (USIM)A procedure is one of the most important elements that should be emphasized when handling any incident related with the cyber world. It is easily forgotten by many organizations, IT administrator and users, especially when dealing with the worms attack. Using the incident response methodology as the basis to build up the STAKCERT framework, the researchers have proposed this novel framework which helps to increase the efficiency in handling worm incident, thus facilitate the process of responding to the worm incident. The STAKCERT framework consists of 2 phases where in phase 1, a novel standard operating procedure in worm detection and analysis have been introduced. In phase 2 of the framework, the worm isolation procedure is inspired by apoptosis. Apoptosis is also known as cell programmed death borrowed from the biology term. � 2009 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Defending virus infection through extrinsic apoptosis(2008) ;Saudi M.M. ;Nor A.M. ;Cullen A.J. ;Woodward M. ;Noor H.M. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)This paper discusses on the enhancement of the current Intrusion Detection System (IDS) based on Artificial Immune System called apoptosis. Nowadays network systems are required to be more secured since the virus is now growing stronger and more dangerous. Unfortunately, not all of the Intrusion Detection System (IDS) is effective enough to defend against viruses entering the network. In this paper, the researchers' propose a new enhanced IDS system that will defend the computer system from being attacked by viruses. By using apoptosis system as the basis of the enhancement, these IDS will work similar to the human defence system and solve the problem of the virus infection in the computer system. In addition, the researchers' have also improved the accuracy of IDS for detecting the virus by using this method. � 2008 IEEE. - Some of the metrics are blocked by yourconsent settings
Publication Reverse engineering: EDOWA worm analysis and classification(2009) ;Saudi M.M. ;Tamil E.M. ;Cullen A.J. ;Woodward M.E. ;Idris M.Y.I. ;Faculty of Science and TechnologyUniversiti Sains Islam Malaysia (USIM)Worms have become a real threat for computer users for the past few years. Worm is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. It is coming out so fast these days that even the most accurate scanners cannot track all of the new ones. Indeed until now there is no specific way to classify the worm. To understand the threats posed by the worms, this research had been carried out. In this paper the researchers proposed a new way to classify the worms which later is used as the basis to build up a system which is called as the EDOWA system to detect worms attack. Details on how the new worm of classification which is called as EDOWA worm classification is produced are explained in this paper. Hopefully this new worm classification can be used as the basis model to produce a system either to detect or defend organization from worms attack. � 2009 Springer Netherlands. - Some of the metrics are blocked by yourconsent settings
Publication STAKCERT worm relational model for worm detection(2010) ;Saudi M.M. ;Cullen A.J. ;Woodward M.E. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)University of BradfordIn this paper, a new STAKCERT worm relational model is being developed based on the evaluation of the STAKCERT worm classification using the dynamic, static and statistical analysis. A case study was conducted to evaluate the effectiveness of this STAKCERT relational model. The case study result analysis showed that the 5 main features in the relational model play an important role in identifying the vulnerability exploited, the damage caused, the expected rate of worm propagation, the chronological flows and the detection avoidance techniques used by the worms. As such, perhaps this new relational model produced can be used as the basis for organizations and end users in detecting worm incidents. - Some of the metrics are blocked by yourconsent settings
Publication Statistical analysis in evaluating STAKCERT infection, activation and payload methods(2010) ;Saudi M.M. ;Cullen A.J. ;Woodward M.E. ;Faculty of Science and Technology ;Universiti Sains Islam Malaysia (USIM)University of BradfordThis paper presents the result of the statistical analysis on relationship between sub features in STAKCERT worm classification. The sub features of the STAKCERT worm classification in this paper were using the statistical analysis to prove the relationship between the sub features. Prior to that, the static and the dynamic analysis were conducted to identify and prove the association between the main features in STAKCERT worm classification for worm detection. There are limited ways on how the relationship between categorical data can be evaluated and Chi-Square tests and the symmetric measure are seen as the best method to be implemented. The case study presented in this paper explains in details how the Chi-Square tests are used to determine the relationship existed between the sub features and followed by the symmetric measure to quantify the strength of the relationship. This research paper is based on the integration between statistics and computer security field specifically with worm analysis. It can be used as the basis for further exploration in worm detection and isolation study.