Skip to main content

Showing 1–27 of 27 results for author: Bellekens, X

.
  1. arXiv:2107.04910  [pdf, other

    cs.CR

    Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends

    Authors: Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Xavier Bellekens

    Abstract: The integration of Information and Communication Technology (ICT) tools into mechanical devices found in aviation industry has raised security concerns. The more integrated the system, the more vulnerable due to the inherent vulnerabilities found in ICT tools and software that drives the system. The security concerns have become more heightened as the concept of electronic-enabled aircraft and sma… ▽ More

    Submitted 10 July, 2021; originally announced July 2021.

    Comments: 25 pages, 3 figures, 4 tables

  2. arXiv:2105.02905  [pdf, other

    cs.CR cs.NI

    Securing the Electric Vehicle Charging Infrastructure

    Authors: Roberto Metere, Myriam Neaimeh, Charles Morisset, Carsten Maple, Xavier Bellekens, Ricardo M. Czekster

    Abstract: Electric Vehicles (EVs) can help alleviate our reliance on fossil fuels for transport and electricity systems. However, charging millions of EV batteries requires management to prevent overloading the electricity grid and minimise costly upgrades that are ultimately paid for by consumers. Managed chargers, such as Vehicle-to-Grid (V2G) chargers, allow control over the time, speed and direction o… ▽ More

    Submitted 6 July, 2022; v1 submitted 6 May, 2021; originally announced May 2021.

    Comments: 42 pages, white paper

  3. Utilising Flow Aggregation to Classify Benign Imitating Attacks

    Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens

    Abstract: Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend against these attacks. In many applications, the choice of features is more important than the cho… ▽ More

    Submitted 6 March, 2021; originally announced March 2021.

    Comments: 21 pages, 6 figures

    Journal ref: MDPI Sensors 2021, 21, 1761. Special Issue: Security and Privacy in the Internet of Things (IoT)

  4. arXiv:2101.12036  [pdf, other

    cs.SE cs.NI

    PatrIoT: IoT Automated Interoperability and Integration Testing Framework

    Authors: Miroslav Bures, Bestoun S. Ahmed, Vaclav Rechtberger, Matej Klima, Michal Trnka, Miroslav Jaros, Xavier Bellekens, Dani Almog, Pavel Herout

    Abstract: With the rapid growth of the contemporary Internet of Things (IoT) market, the established systems raise a number of concerns regarding the reliability and the potential presence of critical integration defects. In this paper, we present a PatrIoT framework that aims to provide flexible support to construct an effective IoT system testbed to implement automated interoperability and integration tes… ▽ More

    Submitted 27 January, 2021; originally announced January 2021.

    Comments: Paper accepted at IEEE International Conference on Software Testing, Verification and Validation 2021, Testing Tools Track (ICST 2021), virtual conference, April 12-16, 2021. htpps://icst2021.icmc.usp.br/track/icst-2021-Testing-Tool-Track

  5. arXiv:2101.02631  [pdf, other

    cs.CR

    Review of Specific Features and Challenges in the Current Internet of Things Systems Impacting their Security and Reliability

    Authors: Miroslav Bures, Matej Klima, Vaclav Rechtberger, Bestoun S. Ahmed, Hanan Hindy, Xavier Bellekens

    Abstract: The current development of the Internet of Things (IoT) technology poses significant challenges to researchers and industry practitioners. Among these challenges, security and reliability particularly deserve attention. In this paper, we provide a consolidated analysis of the root causes of these challenges, their relations, and their possible impacts on IoT systems' general quality characteristic… ▽ More

    Submitted 5 January, 2021; originally announced January 2021.

    Comments: Paper accepted at WorldCist'21 - 9th World Conference on Information Systems and Technologies, Portugal, 30-31 March to 1-2 April 2021, http://www.worldcist.org/

  6. arXiv:2011.10865  [pdf, ps, other

    cs.SE

    Quality and Reliability Metrics for IoT Systems: A Consolidated View

    Authors: Matej Klima, Vaclav Rechtberger, Miroslav Bures, Xavier Bellekens, Hanan Hindy, Bestoun S. Ahmed

    Abstract: Quality and reliability metrics play an important role in the evaluation of the state of a system during the development and testing phases, and serve as tools to optimize the testing process or to define the exit or acceptance criteria of the system. This study provides a consolidated view on the available quality and reliability metrics applicable to Internet of Things (IoT) systems, as no compr… ▽ More

    Submitted 21 November, 2020; originally announced November 2020.

    Comments: Paper accepted at EAI Urb-IoT 2020 - 5th EAI International Conference on IoT in Urban Space, December 2-4, 2020. https://urbaniot.eai-conferences.org/2020/

  7. arXiv:2010.06850  [pdf, other

    cs.CR cs.HC eess.SY

    A Review of Cyber-Ranges and Test-Beds: Current and Future Trends

    Authors: Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic, Xavier Bellekens

    Abstract: Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable environments that necessitate more diligent management.… ▽ More

    Submitted 14 October, 2020; originally announced October 2020.

    Comments: 43 pages, 18 Figures, 8 Tables

  8. arXiv:2007.11308  [pdf, other

    cs.SE

    Interoperability and Integration Testing Methods for IoT Systems: a Systematic Map** Study

    Authors: Miroslav Bures, Matej Klima, Vaclav Rechtberger, Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Bestoun S. Ahmed

    Abstract: The recent active development of Internet of Things (IoT) solutions in various domains has led to an increased demand for security, safety, and reliability of these systems. Security and data privacy are currently the most frequently discussed topics; however, other reliability aspects also need to be focused on to maintain the smooth and safe operation of IoT systems. Until now, there has been no… ▽ More

    Submitted 22 July, 2020; originally announced July 2020.

  9. Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection

    Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne, Xavier Bellekens

    Abstract: Machine Learning (ML) and Deep Learning (DL) have been used for building Intrusion Detection Systems (IDS). The increase in both the number and sheer variety of new cyber-attacks poses a tremendous challenge for IDS solutions that rely on a database of historical attack signatures. Therefore, the industrial pull for robust IDSs that are capable of flagging zero-day attacks is growing. Current outl… ▽ More

    Submitted 16 November, 2020; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: 18 pages, 4 figures

    Journal ref: Electronics 2020, 9, 1684

  10. Leveraging Siamese Networks for One-Shot Intrusion Detection Model

    Authors: Hanan Hindy, Christos Tachtatzis, Robert Atkinson, David Brosset, Miroslav Bures, Ivan Andonovic, Craig Michie, Xavier Bellekens

    Abstract: The use of supervised Machine Learning (ML) to enhance Intrusion Detection Systems has been the subject of significant research. Supervised ML is based upon learning by example, demanding significant volumes of representative instances for effective training and the need to re-train the model for every unseen cyber-attack class. However, retraining the models in-situ renders the network susceptibl… ▽ More

    Submitted 5 November, 2022; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: 12 pages, 2 figures, J Intell Inf Syst (2022)

  11. arXiv:2006.15340  [pdf, other

    cs.CR

    Machine Learning Based IoT Intrusion Detection System: An MQTT Case Study (MQTT-IoT-IDS2020 Dataset)

    Authors: Hanan Hindy, Ethan Bayne, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Xavier Bellekens

    Abstract: The Internet of Things (IoT) is one of the main research fields in the Cybersecurity domain. This is due to (a) the increased dependency on automated device, and (b) the inadequacy of general purpose Intrusion Detection Systems (IDS) to be deployed for special purpose networks usage. Numerous lightweight protocols are being proposed for IoT devices communication usage. One of the distinguishable I… ▽ More

    Submitted 16 November, 2020; v1 submitted 27 June, 2020; originally announced June 2020.

    Comments: 14 pages, 5 figures, to be published in the proceeding of the 12th International Network Conference 2020 (INC2020)

  12. Cyber Security in the Age of COVID-19: A Timeline and Analysis of Cyber-Crime and Cyber-Attacks during the Pandemic

    Authors: Har**der Singh Lallie, Lynsay A. Shepherd, Jason R. C. Nurse, Arnau Erola, Gregory Epiphaniou, Carsten Maple, Xavier Bellekens

    Abstract: The COVID-19 pandemic was a remarkable unprecedented event which altered the lives of billions of citizens globally resulting in what became commonly referred to as the new-normal in terms of societal norms and the way we live and work. Aside from the extraordinary impact on society and business as a whole, the pandemic generated a set of unique cyber-crime related circumstances which also affecte… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

    Comments: 20 pages, 6 figures

    Journal ref: Computers & Security 2021

  13. arXiv:1911.06260  [pdf, other

    cs.CR

    A Security Perspective on Unikernels

    Authors: Joshua Talbot, Przemek Pikula, Craig Sweetmore, Samuel Rowe, Hanan Hindy, Christos Tachtatzis, Robert Atkinson, Xavier Bellekens

    Abstract: Cloud-based infrastructures have grown in popularity over the last decade leveraging virtualisation, server, storage, compute power and network components to develop flexible applications. The requirements for instantaneous deployment and reduced costs have led the shift from virtual machine deployment to containerisation, increasing the overall flexibility of applications and increasing performan… ▽ More

    Submitted 14 November, 2019; originally announced November 2019.

    Comments: 6 pages, 4 figures

  14. Cyber-Security Internals of a Skoda Octavia vRS: A Hands on Approach

    Authors: Colin Urquhart, Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Hanan Hindy, Amar Seeam

    Abstract: The convergence of information technology and vehicular technologies are a growing paradigm, allowing information to be sent by and to vehicles. This information can further be processed by the Electronic Control Unit (ECU) and the Controller Area Network (CAN) for in-vehicle communications or through a mobile phone or server for out-vehicle communication. Information sent by or to the vehicle can… ▽ More

    Submitted 21 October, 2019; originally announced October 2019.

    Comments: 13 pages, 27 figures

    Journal ref: in IEEE Access, vol. 7, pp. 146057-146069, 2019

  15. Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning

    Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier Bellekens

    Abstract: Network Control Systems (NAC) have been used in many industrial processes. They aim to reduce the human factor burden and efficiently handle the complex process and communication of those systems. Supervisory control and data acquisition (SCADA) systems are used in industrial, infrastructure and facility processes (e.g. manufacturing, fabrication, oil and water pipelines, building ventilation, etc… ▽ More

    Submitted 6 March, 2019; originally announced April 2019.

    Comments: 17 pages, 8 figures, 4 tables. In the proceeding of International Workshop on the Security of Industrial Control Systems and Cyber-Physical Systems CyberICPS, In Conjunction With ESORICS 2018

    Journal ref: Computer Security. SECPRE 2018, CyberICPS 2018. Lecture Notes in Computer Science, vol 11387. Springer, Cham

  16. arXiv:1903.08918  [pdf, other

    cs.CR cs.HC

    From Cyber-Security Deception To Manipulation and Gratification Through Gamification

    Authors: Xavier Bellekens, Gayan Jayasekara, Hanan Hindy, Miroslav Bures, David Brosset, Christos Tachtatzis, Robert Atkinson

    Abstract: With the ever growing networking capabilities and services offered to users, attack surfaces have been increasing exponentially, additionally, the intricacy of network architectures has increased the complexity of cyber-defenses, to this end, the use of deception has recently been trending both in academia and industry. Deception enables to create proactive defense systems, luring attackers in ord… ▽ More

    Submitted 21 March, 2019; originally announced March 2019.

    Comments: 17 Pages, Accepted in HCI International 2019

  17. arXiv:1812.09683  [pdf, ps, other

    cs.NI

    A Comprehensive View on Quality Characteristics of the IoT Solutions

    Authors: Miroslav Bures, Xavier Bellekens, Karel Frajtak, Bestoun S. Ahmed

    Abstract: Categorization of quality characteristics helps in a more effective structuring of the testing process and in the determination of properties, which can be verified in the system under test. In the emerging area of Internet of Things (IoT) systems, several individual attempts have been made to summarize these aspects, but the previous work is rather heterogenic and focuses on specific subareas. He… ▽ More

    Submitted 23 December, 2018; originally announced December 2018.

    Comments: Paper accepted at Urb-IoT 2018 - 3rd EAI International Conference on IoT in Urban Space. November 21-23, 2018, Guimares, Portugal. http://urbaniot.org/full-program/

  18. Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis

    Authors: Adam Rapley, Xavier Bellekens, Lynsay A. Shepherd, Colin McLean

    Abstract: Writing desktop applications in JavaScript offers developers the opportunity to write cross-platform applications with cutting edge capabilities. However in doing so, they are potentially submitting their code to a number of unsanctioned modifications from malicious actors. Electron is one such JavaScript application framework which facilitates this multi-platform out-the-box paradigm and is based… ▽ More

    Submitted 15 November, 2018; v1 submitted 14 November, 2018; originally announced November 2018.

    Comments: 19 pages

  19. A Taxonomy of Network Threats and the Effect of Current Datasets on Intrusion Detection Systems

    Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Christos Tachtatzis, Robert Atkinson, Xavier Bellekens

    Abstract: As the world moves towards being increasingly dependent on computers and automation, building secure applications, systems and networks are some of the main challenges faced in the current decade. The number of threats that individuals and businesses face is rising exponentially due to the increasing complexity of networks and services of modern networks. To alleviate the impact of these threats,… ▽ More

    Submitted 5 June, 2020; v1 submitted 9 June, 2018; originally announced June 2018.

    Comments: 28 Pages, 6 Figures

    Journal ref: IEEE Access, 2020

  20. arXiv:1806.03516  [pdf, other

    cs.CR

    A Taxonomy of Malicious Traffic for Intrusion Detection Systems

    Authors: Hanan Hindy, Elike Hodo, Ethan Bayne, Amar Seeam, Robert Atkinson, Xavier Bellekens

    Abstract: With the increasing number of network threats it is essential to have a knowledge of existing and new network threats in order to design better intrusion detection systems. In this paper we propose a taxonomy for classifying network attacks in a consistent way, allowing security researchers to focus their efforts on creating accurate intrusion detection systems and targeted datasets.

    Submitted 9 June, 2018; originally announced June 2018.

    Comments: 4 Pages, 2 Figures, Accepted in IEEE CyberSA 2018 Proceedings

  21. arXiv:1709.08385  [pdf, other

    cs.CR cs.AI cs.NE

    Deep Learning Based Cryptographic Primitive Classification

    Authors: Gregory D. Hill, Xavier J. A. Bellekens

    Abstract: Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased. Reverse engineering potentially malicious software is a cumbersome task due to platform eccentrici… ▽ More

    Submitted 25 September, 2017; originally announced September 2017.

    Comments: 9 Pages, 6 Figures

  22. Machine Learning Approach for Detection of nonTor Traffic

    Authors: Elike Hodo, Xavier Bellekens, Ephraim Iorkyase, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson

    Abstract: Intrusion detection has attracted a considerable interest from researchers and industries. After many years of research the community still faces the problem of building reliable and efficient intrusion detection systems (IDS) capable of handling large quantities of data with changing patterns in real time situations. The Tor network is popular in providing privacy and security to end user by anon… ▽ More

    Submitted 29 August, 2017; originally announced August 2017.

    Comments: 6 pages, 4 figures, Accepted and Presented in ARES '17 Proceedings of the 12th International Conference on Availability, Reliability and Security

    Journal ref: Information 2018, 9(9), 231

  23. Threat analysis of IoT networks Using Artificial Neural Network Intrusion Detection System

    Authors: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Pierre-louis Dubouilh, Ephraim Iorkyase, Christos Tachtatzis, Robert Atkinson

    Abstract: The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: Published in The 2016 International Symposium on Networks, Computers and Communications (IEEE ISNCC'16) , Hammamet, Tunisia, 2016

  24. GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing

    Authors: Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Craig Renfrew, Tony Kirkham

    Abstract: Large industrial systems that combine services and applications, have become targets for cyber criminals and are challenging from the security, monitoring and auditing perspectives. Security log analysis is a key step for uncovering anomalies, detecting intrusion, and enabling incident response. The constant increase of link speeds, threats and users, produce large volumes of log data and become i… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: Published in The 7th International Conference of Security of Information and Networks, SIN 2014, Glasgow, UK, September, 2014

    ACM Class: D.4.6; K.6.5

  25. A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems

    Authors: Xavier Bellekens, Christos Tachtatzis, Robert Atkinson, Craig Renfrew, Tony Kirkham

    Abstract: Pattern Matching is a computationally intensive task used in many research fields and real world applications. Due to the ever-growing volume of data to be processed, and increasing link speeds, the number of patterns to be matched has risen significantly. In this paper we explore the parallel capabilities of modern General Purpose Graphics Processing Units (GPGPU) applications for high speed patt… ▽ More

    Submitted 7 April, 2017; originally announced April 2017.

    Comments: Published in The 7th International Conference of Security of Information and Networks, SIN 2014, Glasgow, UK, September, 2014

    ACM Class: D.4.6; K.6.5

  26. arXiv:1702.03657  [pdf, other

    cs.DS cs.DC

    Trie Compression for GPU Accelerated Multi-Pattern Matching

    Authors: Xavier Bellekens, Amar Seeam, Christos Tachtatzis, Robert Atkinson

    Abstract: Graphics Processing Units allow for running massively parallel applications offloading the CPU from computationally intensive resources, however GPUs have a limited amount of memory. In this paper a trie compression algorithm for massively parallel pattern matching is presented demonstrating 85% less space requirements than the original highly efficient parallel failure-less aho-corasick, whilst d… ▽ More

    Submitted 13 February, 2017; originally announced February 2017.

    Comments: 4 pages, 6 figures. Accepted and Published in The Ninth International Conferences on Pervasive Patterns and Applications PATTERNS 2017 (19 - 23/02, 2017 - Athens, Greece)

  27. arXiv:1701.02145  [pdf

    cs.CR cs.LG

    Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey

    Authors: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson

    Abstract: Intrusion detection has attracted a considerable interest from researchers and industries. The community, after many years of research, still faces the problem of building reliable and efficient IDS that are capable of handling large quantities of data, with changing patterns in real time situations. The work presented in this manuscript classifies intrusion detection systems (IDS). Moreover, a ta… ▽ More

    Submitted 9 January, 2017; originally announced January 2017.