Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 30 of 58

Full-Text Articles in Physical Sciences and Mathematics

A Hybrid Feature Selection For Network Intrusion Detection Systems: Central Points, Nour Moustafa, Jill Slay Jan 2015

A Hybrid Feature Selection For Network Intrusion Detection Systems: Central Points, Nour Moustafa, Jill Slay

Australian Information Warfare and Security Conference

Network intrusion detection systems are an active area of research to identify threats that face computer networks. Network packets comprise of high dimensions which require huge effort to be examined effectively. As these dimensions contain some irrelevant features, they cause a high False Alarm Rate (FAR). In this paper, we propose a hybrid method as a feature selection, based on the central points of attribute values and an Association Rule Mining algorithm to decrease the FAR. This algorithm is designed to be implemented in a short processing time, due to its dependency on the central points of feature values with …


The Cyber Simulation Terrain: Towards An Open Source Cyber Effects Simulation Ontology, Kent O'Sullivan, Benjamin Turnbull Jan 2015

The Cyber Simulation Terrain: Towards An Open Source Cyber Effects Simulation Ontology, Kent O'Sullivan, Benjamin Turnbull

Australian Information Warfare and Security Conference

Cyber resilience is characterised by an ability to understand and adapt to changing network conditions, including cyber attacks. Cyber resilience may be characterised by an effects-based approach to missions or processes. One of the fundamental preconditions underpinning cyber resilience is an accurate representation of current network and machine states and what missions they are supporting. This research outlines the need for an ontological network representation, drawing on existing literature and implementations in the domain. This work then introduces an open-source ontological representation for modelling cyber assets for the purposes of Computer Network Defence. This representation encompasses computers, network connectivity, users, …


Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein Jan 2015

Is The Internet The Main Medium Of Transmitting Terrorism?, Hatem El Zein

Australian Information Warfare and Security Conference

The influx of virtual media platforms has allowed extremists and terrorists to transmit their messages to wider audiences without passing through a gatekeeper or being a subject to editorial policies existed in traditional media outlets. Thus, extremists and terrorists exploit virtual media platforms to report their actions; propagate their ideologies and ultimately to boost their objectives, because these mediums enabled them to have control over time and space. As a result, some governments work to deprive extremists and terrorists from this 'oxygen' through monitoring the cyberspace to block the suspected virtual media platforms. The reactions of some governments to face …


Prerequisites For Creating Resources And Compositions For Cyber Defence, Tuija Kuusisto, Rauno Kuusisto Jan 2014

Prerequisites For Creating Resources And Compositions For Cyber Defence, Tuija Kuusisto, Rauno Kuusisto

Australian Information Warfare and Security Conference

The aim of this paper is to increase understanding about the prerequisites which evolving cyber society sets for actors, activities and structures of the defenders of society. The research proposes an approach for identifying, analysing and scheduling these prerequisites for decision-making. The paper presents results of two case studies where the proposed approach is applied. The case studies indicate that in the future compositions are needed for forming of joint defence cyber community and resources for joining this community in affordable and beneficial ways. These are the next steps on the strategic path to jointly defended cyber community of global …


Design Requirements For Generating Deceptive Content To Protect Document Repositories, Ben Whitham Jan 2014

Design Requirements For Generating Deceptive Content To Protect Document Repositories, Ben Whitham

Australian Information Warfare and Security Conference

For nearly 30 years, fake digital documents have been used to identify external intruders and malicious insider threats. Unfortunately, while fake files hold potential to assist in data theft detection, there is little evidence of their application outside of niche organisations and academic institutions. The barrier to wider adoption appears to be the difficulty in constructing deceptive content. The current generation of solutions principally: (1) use unrealistic random data; (2) output heavily formatted or specialised content, that is difficult to apply to other environments; (3) require users to manually build the content, which is not scalable, or (4) employ an …


Detecting Covert Communication Channels In Raster Images, Brian Cusack, Jarrett Chambers Jan 2014

Detecting Covert Communication Channels In Raster Images, Brian Cusack, Jarrett Chambers

Australian Information Warfare and Security Conference

Digital image steganography is a method for hiding secret messages within everyday Internet communication channels. Such covert communications provide protection for communications and exploit the opportunities available in digital media. Digital image steganography makes the nature and content of a message invisible to other users by taking ordinary internet artefacts and using them as cover objects for the messages. In this paper we demonstrate the capability with raster image files and discuss the challenges of detecting such covert communications. The contribution of the research is community awareness of covert communication capability in digital media and the motivation for including such …


15th Australian Information Warfare Conference, 2014, Edith Cowan University - Conference Details, Security Research Institute, Edith Cowan University Jan 2014

15th Australian Information Warfare Conference, 2014, Edith Cowan University - Conference Details, Security Research Institute, Edith Cowan University

Australian Information Warfare and Security Conference

No abstract provided.


3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng Dec 2013

3d Visual Method Of Variant Logic Construction For Random Sequence, Huan Wang, Jeffrey Zheng

Australian Information Warfare and Security Conference

As Internet security threats continue to evolve, in order to ensure information transmission security, various encrypt and decrypt has been used in channel coding and decoding of data communication. While cryptography requires a very high degree of apparent randomness, Random sequences play an important role in cryptography. Both CA (Cellular Automata) and RC4 contain pseudo‐random number generators and may have intrinsic properties respectively. In this paper, a 3D visualization model (3DVM) is proposed to display spatial characteristics of the random sequences from CA or RC4 keystream. Key components of this model and core mechanism are described. Every module and their …


The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook Dec 2013

The Influence And Deception Of Twitter: The Authenticity Of The Narrative And Slacktivism In The Australian Electoral Process, Benjamin Waugh, Maldini Abdipanah, Omid Hashemi, Shaquille A. Rahman, David M. Cook

Australian Information Warfare and Security Conference

It is uncertain how many discreet users occupy the social media community. Fake tweets, sock puppets, force‐multipliers and botnets have become embedded within the fabric of new media in sufficient numbers that social media support by means of quantity is no longer a reliable metric for determining authority and influence within openly expressed issues and causes. Election campaigns, and their associated political agendas, can now be influenced by non‐specific virtual presences that cajole and redirect opinions without declaring identity or allegiance. In the lead up to the 2013 Australian Federal Election, the open source Twitter activity for the two major …


Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai Dec 2013

Complementary Feature Level Data Fusion For Biometric Authentication Using Neural Networks, Mark Abernethy, Shri Rai

Australian Information Warfare and Security Conference

Data fusion as a formal research area is referred to as multi‐sensor data fusion. The premise is that combined data from multiple sources can provide more meaningful, accurate and reliable information than that provided by data from a single source. There are many application areas in military and security as well as civilian domains. Multi‐sensor data fusion as applied to biometric authentication is termed multi‐modal biometrics. Though based on similar premises, and having many similarities to formal data fusion, multi‐modal biometrics has some differences in relation to data fusion levels. The objective of the current study was to apply feature …


Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone Dec 2013

Towards Detection And Control Of Civilian Unmanned Aerial Vehicles, Matthew Peacock, Michael N. Johnstone

Australian Information Warfare and Security Conference

Considering the significant number of non‐military unmanned aerial vehicles (UAVs) that can be purchased to operate in unregulated air space and the range of such devices, the potential for security and privacy problems to arise is significant. This can lead to consequent harm for critical infrastructure in the event of these UAVs being used for criminal or terrorist purposes. Further, if these devices are not being detected, there is a privacy problem to be addressed as well. In this paper we test a specific UAV, the Parrot AR Drone version 2, and present a forensic analysis of tests used to …


Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai Dec 2012

Applying Feature Selection To Reduce Variability In Keystroke Dynamics Data For Authentication Systems, Mark Abernethy, Shri Rai

Australian Information Warfare and Security Conference

Authentication systems enable the verification of claimed identity. Password-based authentication systems are ubiquitous even though such systems are amenable to numerous attack vectors and are therefore responsible for a large number of security breaches. Biometrics has been increasingly researched and used as an alternative to password-based systems. There are a number of alternative biometric characteristics that can be used for authentication purposes, each with different positive and negative implementation factors. Achieving a successful authentication performance requires effective data processing. This study investigated the use of keystroke dynamics for authentication purposes. A feature selection process, based on normality statistics, was applied …


The Regulation Of Space And Cyberspace: One Coin, Two Sides, Brett Biddington Dec 2012

The Regulation Of Space And Cyberspace: One Coin, Two Sides, Brett Biddington

Australian Information Warfare and Security Conference

In the 1960s, during some very tense days in the Cold War the United States of America (USA) and the Union of Socialist Soviet Republics (USSR) brokered a deal in the United Nations for a treaty regime to govern human activities in outer space. This regime has served well enough for almost 50 years. In recent years, however, fears of space weaponisation, the proliferation of space debris in the Low Earth Orbits (LEO) and increasing demands on the electromagnetic spectrum (EMS) have led to demands for regulatory reform. Some nations now consider space to be the fourth domain of modern …


The Reception, Incorporation And Employment Of Informatin Operations By The Australia Defence Force: 1990-2012, Jeff Malone Dec 2012

The Reception, Incorporation And Employment Of Informatin Operations By The Australia Defence Force: 1990-2012, Jeff Malone

Australian Information Warfare and Security Conference

The paper investigates the Australian Defence Force’s (ADF) approach – understood here as the reception, incorporation and operational employment – to military information operations (IO), from 1990 to 2012. The paper identifies key characteristics of the ADF’s approach to IO, and proposes explanatory factors to account for the specific form the ADF’s approach to IO has been manifested. The paper concludes with predictions regarding the future form of IO within the ADF, in the context of the increasing significance of social media, the upcoming 2013 Defence White Paper (WP13) and the US ‘pivot’ to the Asia-Pacific region. The paper is …


Protective Emblems In Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, Andrew Blyth Dec 2012

Protective Emblems In Cyber Warfare, Iain Sutherland, Konstantinos Xynos, Andrew Jones, Andrew Blyth

Australian Information Warfare and Security Conference

The Tallinn Manual will be released in February 2013 and makes a significant step towards defining the concepts of cyber warfare. The early draft of the manual is available and the expert working party have interpreted the existing international agreements, instruments and conventions and applied them to the field of cyber warfare. The manual makes a number of interpretations on the legal position of civilians and other parties. The manual makes it clear that the existing conventions are applicable and that civilian / religious and medical systems should be viewed as non-combatants in a cyber conflict. In the kinetic warfare …


Exterminating The Cyber Flea: Irregular Warfare Lessons For Cyber Defence, Ben Whitham Dec 2012

Exterminating The Cyber Flea: Irregular Warfare Lessons For Cyber Defence, Ben Whitham

Australian Information Warfare and Security Conference

Traditional approaches to tactical Computer Network Defence (CND), drawn from the lessons and doctrine of conventional warfare, are based on a team of deployed security professionals countering the adversary’s cyber forces. The concept of the adversary in cyberspace does not fit neatly into the conventional military paradigms. Rather than fighting an identifiable foe, cyber adversaries are clandestine, indistinguishable from legitimate users or external services, operate across state boundaries, and from safe havens that provide sanctuary from prosecution. The defender also faces imbalances with rules of engagement and a severe disparity between the cost of delivering the defence and the attackers …


Designing A Knowledge Distribution Simulator, Martin Hill, Graham Fletcher Jan 2011

Designing A Knowledge Distribution Simulator, Martin Hill, Graham Fletcher

Australian Information Warfare and Security Conference

To make good decisions, we need to be suitably informed. 'Good' and 'Suitably' in this case depend on the informational needs of the decision and the mechanisms of getting the information to the decision maker in time. The trade-offs in qualities, quantities, timeliness, impacts on other activities, and so on are infamously wickedly complex, and usually buried in a clutter of special circumstances, personality characteristics, environments unsuitable for study, and so on. Decision-making systems can be explored using case studies and exercises, but these are limited by the expense and time of using real people. A virtual simulator for large …


Designing Cyber Warfare Information Infrastructure Resilience, Semir Daskapan, Jan Van Der Berg Jan 2011

Designing Cyber Warfare Information Infrastructure Resilience, Semir Daskapan, Jan Van Der Berg

Australian Information Warfare and Security Conference

Due to many cyber attacks in the last years, governments are realizing how vulnerable they have become should there be a break out of a cyberwar. This urged them to establish a cyber warfare information infrastructure in a short time. However, this cyber warfare information infrastructure relies heavily on public infrastructures, like electricity and the Internet, which will be most likely targeted themselves. Therefore, a cyber warfare information infrastructure is by definition a vulnerable infrastructure that needs to be secured against attacks and made resilient. In this paper, we provide a method inspired by the theory of Complex Adaptive Systems …


Penetration Of Zigbee-Based Wireless Sensor Networks, Michael N. Johnstone, Jeremy A. Jarvis Jan 2011

Penetration Of Zigbee-Based Wireless Sensor Networks, Michael N. Johnstone, Jeremy A. Jarvis

Australian Information Warfare and Security Conference

Wireless Sensor Networks are becoming popular as a simple means of collecting data by public utilities, motor vehicle manufacturers and other organisations. Unfortunately the devices on such networks are often insecure by default, which presents problems in terms of the integrity of the data provided across those networks. This paper explores a range of attacks that were successful on a network consisting of nodes using the ZigBee protocol stack and proposes defences that can be put in place to circumvent these attacks thus leading to more secure systems and increasing user confidence.


Success Of Agile Environment In Complex Projects, Abbass Ghanbary, Julian Day Nov 2010

Success Of Agile Environment In Complex Projects, Abbass Ghanbary, Julian Day

Australian Information Warfare and Security Conference

This paper discusses the impact of agile methodology in complex and modular interrelated projects based on the authors’ practical experience and observations. With the advancement of Web technologies and complex computer systems, business applications are able to transcend boundaries in order to fully meet business requirements and comply with the legislation, policies and procedures. The success of software development as well as software deployment of these complex applications is dependent upon the employed methodology and project management. This is so because employed methodology plays an important position in capturing and modeling of business requirements and project management helps to ensure …


International Relations And Cyber Attacks: Official And Unofficial Discourse, Kay Hearn, Patricia A H Williams, Rachel J. Mahncke Nov 2010

International Relations And Cyber Attacks: Official And Unofficial Discourse, Kay Hearn, Patricia A H Williams, Rachel J. Mahncke

Australian Information Warfare and Security Conference

The potential for cyberwarfare is vast and is of concern to all nations, and national security defence. It appears that many countries are actively trying to protect their computer networks, whilst looking for ways that might bring down the networks of other countries, although this is not officially acknowledged. Bringing down another nations computer networks could give the attacking national intelligence and control. These kinds of interactions are now a part of the way in which international relations are played out, and the internet is also a place in which international relations are contested. As such the internet plays a …


2d Spatial Distributions For Measures Of Random Sequences Using Conjugate Maps, Qingping Li, Jeffrey Zhi J. Zheng Nov 2010

2d Spatial Distributions For Measures Of Random Sequences Using Conjugate Maps, Qingping Li, Jeffrey Zhi J. Zheng

Australian Information Warfare and Security Conference

Advanced visual tools are useful to provide additional information for modern information warfare. 2D spatial distributions of random sequences play an important role to understand properties of complex sequences. This paper proposes time-sequences from a given logical function of 1D Cellular Automata in both Poincare map and conjugate map. Multiple measure sequences of Markov chains can be used to display spatial distributions using conjugate maps. Measure sequences recursively produced by different logical functions generating maps. Possible complementary feature exits between pair functions, Conjugate symmetry relationships between a pair of logical functions in conjugate maps can be observed.


Influence Operations: Action And Attitude, William Hutchinson Nov 2010

Influence Operations: Action And Attitude, William Hutchinson

Australian Information Warfare and Security Conference

This paper investigates the relationships between attitudes, behaviour and influence. The major objective of influence operations is predominantly to exert soft power and in doing this there is an assumption that it will change attitudes. It is assumed that by changing attitudes favourable to the influencer that behaviours will be changed. However, this is a problematic assumption. Influence operations whose messages seem to contradict the real behaviour of the influencer tends to nullify the message; and, in fact, might reinforce the attitudes and behaviours of the foe and begin to alienate friends. Messages should be based on a credible reality; …


Information Warfare: Time For A Redefinition, Patricia A H Williams Nov 2010

Information Warfare: Time For A Redefinition, Patricia A H Williams

Australian Information Warfare and Security Conference

Information warfare has become an increasingly diverse field. The changes to its composition have been primarily driven by changes in technology and the resulting increased access to information. Further, it has been the progressively more diverse methods available for communication that has fuelled expanding applications for information warfare techniques into non-military environments. In order for younger generations of students to understand the place of information warfare in the larger security picture, there is a need to shift the emphasis from many of the military underpinnings to its relevance in modern society and the challenges in the commercial environment. This paper …


Australian Critical Infrastructure Protection: A Case Of Two Tales, Matthew Warren, Graeme Pye, William Hutchinson Nov 2010

Australian Critical Infrastructure Protection: A Case Of Two Tales, Matthew Warren, Graeme Pye, William Hutchinson

Australian Information Warfare and Security Conference

The protection of critical infrastructures and the choices made in terms of priorities and cost, all impact upon the planning, precautions and security aspects of protecting these important systems. Often the when choices made is difficult to assess at the time the decision is taken and it is only after an incident that the truth of the choices made become fully evident. The paper focuses on two recent examples of Australian Critical Infrastructure protection and the issues that related to those examples.


Wikileaks: The Truth Or Not, Ian Rosewall, Matthew J. Warren Nov 2010

Wikileaks: The Truth Or Not, Ian Rosewall, Matthew J. Warren

Australian Information Warfare and Security Conference

We live in the Information Age, an age where information is shared in a global context and in real time. The issue is whether all information should be disclosed. In the ‘Information Age’ do secrets still exist? Another major issue is whether groups of vigilantes are the ones who should be disclosing this information, should these vigilante groups be trusted? This paper will focus upon the impact of Wikileaks and the problem of Information disclosure especially when that information is confidential. It will identify cases for discussion. In the main these cases will be of a military flavour.


When You Can't See The Forest For The Domains: Why A Two Forest Model Should Be Used To Achieve Logical Segregation Between Scada And Corporate Networks, Andrew Woodward, Brett Turner Dec 2009

When You Can't See The Forest For The Domains: Why A Two Forest Model Should Be Used To Achieve Logical Segregation Between Scada And Corporate Networks, Andrew Woodward, Brett Turner

Australian Information Warfare and Security Conference

The increasing convergence of corporate and control systems networks creates new challenges for the security of critical infrastructure. There is no argument that whilst this connection of what was traditionally an isolated network, to a usually internet enabled corporate network, is unavoidable, segregation must be maintained. One such challenge presented is how to properly and appropriately configure an active directory environment to allow for exchange of required data, but still maintain the security goal of separation of the two networks. This paper argues that while separate domains may seem to achieve this goal, the reality is that a domain is …


Tactical Analysis Of Attack In Physical And Digital Security Incidents:Towards A Model Of Asymmetry, Atif Ahmad Dec 2009

Tactical Analysis Of Attack In Physical And Digital Security Incidents:Towards A Model Of Asymmetry, Atif Ahmad

Australian Information Warfare and Security Conference

Asymmetric warfare is frequently described as a conflict where ‘weaker’ parties aim to offset their relatively inadequate resources by using particular strategies and tactics to their advantage. This research-in-progress paper develops a concept model of asymmetric warfare that represents the leverage available to the ‘weaker’ party over the ‘stronger’ party simply because the former is attacking rather than defending. Points of leverage include choice of timing, location, method of attack, best use of limited resources and time to prepare. The resulting concept model is used to discuss generic defensive strategies that can be applied by ‘stronger’ parties in the physical …


Culture Jamming: From Activism To Hactivism, Kay Hearn, Rachel J. Mahncke, Patricia A. Williams Dec 2009

Culture Jamming: From Activism To Hactivism, Kay Hearn, Rachel J. Mahncke, Patricia A. Williams

Australian Information Warfare and Security Conference

A new kind of Internet threat has emerged. Hacking is increasingly being used as a weapon by individuals to promote their political ideologies by engaging in distributed citizen-based warfare. Their aim is to disrupt communications using internet enabled networks and organisations. Examples of these online assaults during 2009 were evident during the Iranian protests and the Melbourne International Film Festival. Such attacks use denial of service techniques and utilised social networking websites such as Facebook, Twitter and You Tube to post links to access hacking instructions. Posts on social networking websites and news stories from a variety of sources online, …


Ascent Of Asymmetric Risk In Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, Atif Ahmad Dec 2009

Ascent Of Asymmetric Risk In Information Security: An Initial Evaluation., Tobias Ruighaver, Matthew Warren, Atif Ahmad

Australian Information Warfare and Security Conference

Dramatic changes in the information security risk landscape over several decades have not yet been matched by similar changes in organizational information security, which is still mainly based on a mindset that security is achieved through extensive preventive controls. As a result, maintenance cost of information security is increasing rapidly, but this increased expenditure has not really made an attack more difficult. The opposite seems to be true, information security attacks have become easier to perpetrate and appear more like information warfare tactics. At the same time, the damage caused by a successful attack has increased significantly and may sometimes …