Category: Data Exfiltration

  • Engineering Data-Driven Secure Software Services

    Big Data Systems (BDS) (i.e., data-intensive applications) have become one of the key priority areas for all sorts of organizations. We have been conducting R&D on different aspects of Data intensive applications in general and on security oriented solutions in particular. A significant part of our research is aimed at inventing new and innovative techniques…

  • Design Space for Cyber Security Analytical Systems

    Cyber Security infrastructures are increasingly relying on big data technologies for capturing, storing, and analyzing huge amount of security events data. Designing and evolving systems that can effectively and efficiently combine big data technologies and cybersecurity are hugely challenging undertakings. Whilst the knowledge for designing cyber security analytics systems has increasing for sometime, there was…

  • Adaptive Architectures for Cyber Security Analytics Systems

    It is becoming quite hard to imagine software systems that wouldn’t need adaptation as part of their runtime requirements. With the increasing demand for adaptivity by design, the knowledge and skills in this area are lagging far behind. Cyber Analytics systems are a new breed of systems that combine big data technologies and cyber security…

  • A Systematic Horizon Scan of Security Orchestration Approaches and Tools

    An increasing number of organisations focusing on security orchestration approaches and solutions to automate the processes of their Security Operation Centre (SOC). There are hundreds of approaches and tools to support security orchestration, hence, practitioners find it hard to access a consolidated material on the available solutions and researchers are unable to figure out the…

  • Our New Work on Self-Adaptive Security for large-scale Open Environments

    We are continuously progressing on the plan for strengthening our capabilities in Cyber Security. To achieve this goal, we have been not only building internal capabilities but also forming and leveraging strategic collaborations. Out of one of our recent collaborations, with Giannis and Rami, in the areas of Cyber Security has resulted a high quality…

  • Data Exfiltration: External Attack Vectors and Countermeasures

    With regards to our work on Cyber Security, we have recently successfully completed a collaborative piece fo work with researchers from Security Lancaster, University of Lancaster, UK. Our collaborative work was focused on identifying and understanding Data Exfiltration: External Vectors and Countermeasures and has been accepted in Journal of Network and Computer Applications with the following…

  • An Approach to Designing and Evaluating Web of Things (WoT) Systems

    Internet of Things (IoT) have emerged a popular technology that underpinning several innovative products and services. Internet of Everything (IoE) or Web of Things (WoT) are real or virtual networks of things (or services) that can be meaningfully quarried or combined in order to build and provide different types of services. Recently, we have a…

  • A Knowledge Base for Microgrid Security Risk Analysis

    Through a team of students from the Masters of Software Engineering ME (Software), we started the design and implementation of the first phase of our solution aimed at providing a knowledge-based support for Microgrid security risk analysis. The project was motivated by an increasing realisation that a large number of energy systems are made of…

  • Modeling Security-Sensitive Architecture of Systems-of-Systems

    An increasing number of software systems are considered Software Intensive Systems of Systems (SiSoS), which consist of dozens of constituent systems. Systems are interconnected using private or public networks, which can be prime target for security attacks. Hence, securing SiSoS is a huge challenge and an emerging areas of research and development. SoS can have…

  • Smart Cities: Cyber Security and Privacy

    Whilst the “Smart City” phenomenon is increasingly becoming a popular term among almost all circles of everyday life, the real progress on conceiving, devising, deploying and evolving services for “Smart City” remains slow. Governments, councils, and private sectors appear to be finding different ways of capitalising on the popularity and potential of “Smart City” phenomenon…