Category: Cyber Security

  • Engineering Data-Driven Secure Software Services

    Big Data Systems (BDS) (i.e., data-intensive applications) have become one of the key priority areas for all sorts of organizations. We have been conducting R&D on different aspects of Data intensive applications in general and on security oriented solutions in particular. A significant part of our research is aimed at inventing new and innovative techniques…

  • Design Space for Cyber Security Analytical Systems

    Cyber Security infrastructures are increasingly relying on big data technologies for capturing, storing, and analyzing huge amount of security events data. Designing and evolving systems that can effectively and efficiently combine big data technologies and cybersecurity are hugely challenging undertakings. Whilst the knowledge for designing cyber security analytics systems has increasing for sometime, there was…

  • Adaptive Architectures for Cyber Security Analytics Systems

    It is becoming quite hard to imagine software systems that wouldn’t need adaptation as part of their runtime requirements. With the increasing demand for adaptivity by design, the knowledge and skills in this area are lagging far behind. Cyber Analytics systems are a new breed of systems that combine big data technologies and cyber security…

  • A Systematic Horizon Scan of Security Orchestration Approaches and Tools

    An increasing number of organisations focusing on security orchestration approaches and solutions to automate the processes of their Security Operation Centre (SOC). There are hundreds of approaches and tools to support security orchestration, hence, practitioners find it hard to access a consolidated material on the available solutions and researchers are unable to figure out the…

  • Building and Leveraging Design Spaces for Architecting Contemporary Software Systems

    It was a great pleasure to visit the Secure Systems Group at the Aalto University of Finland. I was hosted by Professor N. Asokan, the leader of the group and a leading authority on different aspects of the security systems, and Dr Lachlan Gunn, a postdoctoral researcher who has a long association with me from…

  • Our New Work on Self-Adaptive Security for large-scale Open Environments

    We are continuously progressing on the plan for strengthening our capabilities in Cyber Security. To achieve this goal, we have been not only building internal capabilities but also forming and leveraging strategic collaborations. Out of one of our recent collaborations, with Giannis and Rami, in the areas of Cyber Security has resulted a high quality…

  • Data Exfiltration: External Attack Vectors and Countermeasures

    With regards to our work on Cyber Security, we have recently successfully completed a collaborative piece fo work with researchers from Security Lancaster, University of Lancaster, UK. Our collaborative work was focused on identifying and understanding Data Exfiltration: External Vectors and Countermeasures and has been accepted in Journal of Network and Computer Applications with the following…

  • Evaluating Docker for Secure and Scalable Private Cloud with Container Technologies

    The ongoing collaboration with the Maritime Division of Defence and Science Technology Group (DST) has resulted in another very useful piece of work that we are very glad to share through this blog. We have been conducting a series of Research and Development (R&D) projects with the same group in the Maritime Division of DST…

  • An Approach to Designing and Evaluating Web of Things (WoT) Systems

    Internet of Things (IoT) have emerged a popular technology that underpinning several innovative products and services. Internet of Everything (IoE) or Web of Things (WoT) are real or virtual networks of things (or services) that can be meaningfully quarried or combined in order to build and provide different types of services. Recently, we have a…

  • Learning from a Detailed Security Analysis of Containerised Technologies

    Container technologies, particularly Docker Engine, have been gaining significant popularity and adoption for building development and operational virtualised infrastructures. An increasing number of cloud technologies have started integrating container technologies into their platforms. While the performance and scalability advantages of containers are well known, there have been a number of concerns about the security of…