Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Physical Sciences and Mathematics

The Wacdt, A Modern Vigilance Task For Network Defense, Oliver A. Guidetti, Craig Speelman, Peter Bouhlas Jan 2023

The Wacdt, A Modern Vigilance Task For Network Defense, Oliver A. Guidetti, Craig Speelman, Peter Bouhlas

Research outputs 2022 to 2026

Vigilance decrement refers to a psychophysiological decline in the capacity to sustain attention to monotonous tasks after prolonged periods. A plethora of experimental tasks exist for researchers to study vigilance decrement in classic domains such as driving and air traffic control and baggage security; however, the only cyber vigilance tasks reported in the research literature exist in the possession of the United States Air Force (USAF). Moreover, existent cyber vigilance tasks have not kept up with advances in real-world cyber security and consequently no longer accurately reflect the cognitive load associated with modern network defense. The Western Australian Cyber Defense …


A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet Jan 2017

A Framework For Forensic Reconstruction Of Spontaneous Ad Hoc Networks, Alastair Nisbet

Australian Digital Forensics Conference

Spontaneous ad hoc networks are distinguished by rapid deployment for a specific purpose, with no forward planning or pre-design in their topology. Often these networks will spring up through necessity whenever a network is required urgently but briefly. This may be in a disaster recovery setting, military uses where often the network is unplanned but the devices are pre-installed with security settings, educational networks or networks created as a one-off for a meeting such as in a business organisation. Generally, wireless networks pose problems for forensic investigators because of the open nature of the medium, but if logging procedures and …


The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet Jan 2015

The Challeges In Implementing Security In Spontaneous Ad Hoc Networks, Alastair Nisbet

Australian Information Security Management Conference

Mobile Ad Hoc Networks (MANETS) promise much in the ability to rapidly deploy a wireless network in a fashion where no prior planning is needed and the network can be running efficiently and with high security within minutes. Natural disaster response, military, education and business provide areas where MANETS can offer significant advantages in communication where infrastructure networks may take days to set up or may be impossible to implement. This research reviews a selection of MANET protocols to show the progression of the research and the issues that are yet to be addressed. It discusses the challenges to researchers …


The Cyber Simulation Terrain: Towards An Open Source Cyber Effects Simulation Ontology, Kent O'Sullivan, Benjamin Turnbull Jan 2015

The Cyber Simulation Terrain: Towards An Open Source Cyber Effects Simulation Ontology, Kent O'Sullivan, Benjamin Turnbull

Australian Information Warfare and Security Conference

Cyber resilience is characterised by an ability to understand and adapt to changing network conditions, including cyber attacks. Cyber resilience may be characterised by an effects-based approach to missions or processes. One of the fundamental preconditions underpinning cyber resilience is an accurate representation of current network and machine states and what missions they are supporting. This research outlines the need for an ontological network representation, drawing on existing literature and implementations in the domain. This work then introduces an open-source ontological representation for modelling cyber assets for the purposes of Computer Network Defence. This representation encompasses computers, network connectivity, users, …


A Simulation-Based Study Of Server Location Selection Rules In Manets Utilising Threshold Cryptography, Alastair Nisbet Dec 2013

A Simulation-Based Study Of Server Location Selection Rules In Manets Utilising Threshold Cryptography, Alastair Nisbet

Australian Information Security Management Conference

Truly Ad Hoc wireless networks where a spontaneous formation of a network occurs and there is no prior knowledge of nodes to each other present significant security challenges, especially as entirely online configuration of nodes with encryption keys must be performed. Utilising threshold cryptography in this type of MANET can greatly increase the security by requiring servers to collaborate to form a single Certificate Authority (CA). In this type of CA responsibility for certificate services is shared between a threshold of servers, greatly increasing security and making attack against the CA considerably more difficult. Choosing which nodes to take on …


Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet Dec 2012

Secure Key Deployment And Exchange Protocol For Manet Information Management, Brian Cusack, Alastair Nisbet

Australian Digital Forensics Conference

Secure Key Deployment and Exchange Protocol (SKYE) is an innovative encryption Key Management Scheme (KMS) based on a combination of features from recent protocols combined with new features for Mobile Ad Hoc Networks (MANETs). The design focuses on a truly ad hoc networking environment where geographical size of the network, numbers of network members and mobility of the members is all unknown before deployment. This paper describes the process of development of the protocol and the application to system design to assure information security and potential evidential retention for forensic purposes. Threshold encryption key management is utilized and simulation results …


Protecting Critical Infrastructure With Games Technology, Adrian Boeing, Martin Masek, Bill Bailey Dec 2008

Protecting Critical Infrastructure With Games Technology, Adrian Boeing, Martin Masek, Bill Bailey

Australian Information Warfare and Security Conference

It is widely recognised that there is a considerable gap in the protection of the national infrastructure. Trying to identify what is in fact ‘critical’ is proving to be very difficult as threats constantly evolve. An interactive prototyping tool is useful in playing out scenarios and simulating the effect of change, however existing simulators in the critical infrastructure area are typically limited in the visual representation and interactivity. To remedy this we propose the use of games technology. Through its use, critical infrastructure scenarios can be rapidly constructed, tested, and refined. In this paper, we highlight the features of games …


Security Management Education Online, Peter J. Hosie, Clifton L. Smith, Joseph Luca Jan 2003

Security Management Education Online, Peter J. Hosie, Clifton L. Smith, Joseph Luca

Research outputs pre 2011

This paper describes the philosophy and pedagogy informing the design and development of Security Science online units. The Physical Security unit is used to illustrate the development of the online learning strategies and interactive activities. Learning materials developed for this course have unique attributes as they were specifically designed to provide simulations and interactivity in the learning process. Field scenarios have been developed for the activities to make the learning experiences as realistic as possible. Simulations and graphics provide these experiences, together with security site images for actual security barriers, systems and technologies. Features of units in the course include …