Skip to main content

Showing 1–6 of 6 results for author: McKeown, S

Searching in archive cs. Search in all archives.
.
  1. arXiv:2212.08035  [pdf, other

    cs.CR

    Hamming Distributions of Popular Perceptual Hashing Techniques

    Authors: Sean McKeown, William J Buchanan

    Abstract: Content-based file matching has been widely deployed for decades, largely for the detection of sources of copyright infringement, extremist materials, and abusive sexual media. Perceptual hashes, such as Microsoft's PhotoDNA, are one automated mechanism for facilitating detection, allowing for machines to approximately match visual features of an image or video in a robust manner. However, there d… ▽ More

    Submitted 15 December, 2022; originally announced December 2022.

    Journal ref: DFRWS (Digital Forensics Research Conference) EU 2023, 21-24 March 2023, Bonn, Germany

  2. Testing And Hardening IoT Devices Against the Mirai Botnet

    Authors: Christopher Kelly, Nikolaos Pitropakis, Sean McKeown, Costas Lambrinoudakis

    Abstract: A large majority of cheap Internet of Things (IoT) devices that arrive brand new, and are configured with out-of-the-box settings, are not being properly secured by the manufactures, and are vulnerable to existing malware lurking on the Internet. Among them is the Mirai botnet which has had its source code leaked to the world, allowing any malicious actor to configure and unleash it. A combination… ▽ More

    Submitted 27 July, 2020; originally announced July 2020.

    Comments: 8 pages, conference paper

  3. Using Amazon Alexa APIs as a Source of Digital Evidence

    Authors: Clemens Krueger, Sean McKeown

    Abstract: With the release of Amazon Alexa and the first Amazon Echo device, the company revolutionised the smart home. It allowed their users to communicate with, and control, their smart home ecosystem purely using voice commands. However, this also means that Amazon processes and stores a large amount of personal data about their users, as these devices are always present and always listening in peoples'… ▽ More

    Submitted 27 July, 2020; v1 submitted 15 June, 2020; originally announced June 2020.

  4. Forensic Considerations for the High Efficiency Image File Format (HEIF)

    Authors: Sean McKeown, Gordon Russell

    Abstract: The High Efficiency File Format (HEIF) was adopted by Apple in 2017 as their favoured means of capturing images from their camera application, with Android devices such as the Galaxy S10 providing support more recently. The format is positioned to replace JPEG as the de facto image compression file type, touting many modern features and better compression ratios over the aging standard. However, w… ▽ More

    Submitted 27 July, 2020; v1 submitted 14 June, 2020; originally announced June 2020.

    Comments: 8 pages, conference paper pre-print

  5. Towards Identifying Human Actions, Intent, and Severity of APT Attacks Applying Deception Techniques -- An Experiment

    Authors: Joel Chacon, Sean McKeown, Richard Macfarlane

    Abstract: Attacks by Advanced Persistent Threats (APTs) have been shown to be difficult to detect using traditional signature- and anomaly-based intrusion detection approaches. Deception techniques such as decoy objects, often called honey items, may be deployed for intrusion detection and attack analysis, providing an alternative to detect APT behaviours. This work explores the use of honey items to classi… ▽ More

    Submitted 2 June, 2020; originally announced June 2020.

  6. arXiv:2005.06599  [pdf, other

    cs.CR cs.CY cs.LG

    Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

    Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan

    Abstract: Phishing is considered to be one of the most prevalent cyber-attacks because of its immense flexibility and alarmingly high success rate. Even with adequate training and high situational awareness, it can still be hard for users to continually be aware of the URL of the website they are visiting. Traditional detection methods rely on blocklists and content analysis, both of which require time-cons… ▽ More

    Submitted 13 May, 2020; originally announced May 2020.

    Comments: In Proceedings of the 6th ICISSP

    MSC Class: 68-06

    Journal ref: ICISSP, Volume 1, pages 289-298 (2020)