Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 9 of 9

Full-Text Articles in Physical Sciences and Mathematics

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli Jan 2009

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli

Research outputs pre 2011

Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.


A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao Jan 2009

A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao

Research outputs pre 2011

An important issue in protocol conformance testing is how to generate test sequences in an efficient and effective way that achieves the required fault detection coverage. We proposed an approach for finding shorter test sequences for protocol conformance testing based on the Wp method in our previous work. While the method generated good quality test sequences, an extra leading sequence may have to be added if the final test sequence generated was not started from the same starting state of the given FSM. A new approach is proposed in this paper to overcome this problem thus to improve the quality …


Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward Jan 2009

Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. SCADA systems have unique security and operational requirements. However, many of the most basic security measures are missing in these networks. This examines some of these issues and proposes some technologies that could help secure these networks from attack.


Scada Forensics With Snort Ids, Craig Valli Jan 2009

Scada Forensics With Snort Ids, Craig Valli

Research outputs pre 2011

This paper is a research in progress paper outlining an approach using open source IDS (Snort) and honeypot (nepenthes, honeyd) technologies to create a resilient layered defensive approach for SCADA and control systems networks.


A Max-Min Multiobjective Technique To Optimize Model Based Test Suite, Usman Farooq, Chiou P. Lam Jan 2009

A Max-Min Multiobjective Technique To Optimize Model Based Test Suite, Usman Farooq, Chiou P. Lam

Research outputs pre 2011

Generally, quality software production seeks timely delivery with higher productivity at lower cost. Redundancy in a test suite raises the execution cost and wastes scarce project resources. In model-based testing, the testing process starts with earlier software developmental phases and enables fault detection in earlier phases. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The paper presents a novel max-min multiobjective technique incorporated into a test suite optimization framework to find a better trade-off between the intrinsically conflicting goals. For illustration two objectives i.e. coverage and size …


Evolving The Quality Of A Model-Based Test Suite, Usman Farooq, Chiou P. Lam Jan 2009

Evolving The Quality Of A Model-Based Test Suite, Usman Farooq, Chiou P. Lam

Research outputs pre 2011

Redundant test cases in newly generated test suites often remain undetected until execution and waste scarce project resources. In model-based testing, the testing process starts early on in the developmental phases and enables early fault detection. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The article presents a novel model-based test suite optimization technique involving UML activity diagrams by formulating the test suite optimization problem as an Equality Knapsack Problem. The aim here is the development of a test suite optimization framework that could optimize the model-based …


Iterated Prisoner's Dilemma For Species, Philip Hingston Jan 2009

Iterated Prisoner's Dilemma For Species, Philip Hingston

Research outputs pre 2011

The Iterated Prisoner's Dilemma (IPD) is widely used to study the evolution of cooperation between self-interested agents. Existing work asks how genes that code for cooperation arise and spread through a single-species population of IPD playing agents. In this paper, we focus on competition between different species of agents. Making this distinction allows us to separate and examine macroevolutionary phenomena. We illustrate with some species-level simulation experiments with agents that use well-known strategies, and with species of agents that use team strategies.


Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli Jan 2009

Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Research outputs pre 2011

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.


Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka Jan 2009

Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka

Research outputs pre 2011

No abstract provided.