Skip to main content

Research Repository

Advanced Search

Outputs (6)

Digital twins in industry 4.0 cyber security (2024)
Conference Proceeding
Lo, C., Win, T. Y., Rezaeifar, Z., Khan, Z., & Legg, P. (2024). Digital twins in industry 4.0 cyber security. In Proceedings of the IEEE Smart World Congress 2023. https://doi.org/10.1109/swc57546.2023.10449147

The increased adoption of sophisticated Cyber Physical Systems (CPS) in critical infrastructure and various aspects of Industry 4.0 has exposed vulnerabilities stemming from legacy CPS and Industrial Internet of Things (IIoT) devices. The interconnec... Read More about Digital twins in industry 4.0 cyber security.

PROTECT: Container process isolation using system call interception (2017)
Conference Proceeding
Win, T. Y., Tso, F. P., Mair, Q., & Tianfield, H. (in press). PROTECT: Container process isolation using system call interception. In 2017 14th International Symposium on Pervasive Systems, Algorithms and Networks \& 2017 11th International Conference on Frontier of Computer Science and Technology \& 2017 Third International Symposium of Creative Computing (ISPAN-FCST-ISCC). , (191-196). https://doi.org/10.1109/ISPAN-FCST-ISCC.2017.24

Virtualization is the underpinning technology enabling cloud computing service provisioning, and container-based virtualization provides an efficient sharing of the underlying host kernel libraries amongst multiple guests. While there has been resear... Read More about PROTECT: Container process isolation using system call interception.

Big data based security analytics for protecting virtualized infrastructures in cloud computing (2017)
Journal Article
Win, T. Y., Tianfield, H., & Mair, Q. (2018). Big data based security analytics for protecting virtualized infrastructures in cloud computing. IEEE Transactions on Big Data, 4(1), 11-25. https://doi.org/10.1109/TBDATA.2017.2715335

Virtualized infrastructure in cloud computing has become an attractive target for cyberattackers to launch advanced attacks. This paper proposes a novel big data based security analytics approach to detecting advanced attacks in virtualized infrastru... Read More about Big data based security analytics for protecting virtualized infrastructures in cloud computing.

Detection of malware and kernel-level rootkits in cloud computing environments (2016)
Conference Proceeding
Win, T. Y., Tianfield, H., & Mair, Q. (in press). Detection of malware and kernel-level rootkits in cloud computing environments. In 2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing. , (295-300). https://doi.org/10.1109/CSCloud.2015.54

Cyberattacks targeted at virtualization infrastructure underlying cloud computing services has become increasingly sophisticated. This paper presents a novel malware and rookit detection system which protects the guests against different attacks. It... Read More about Detection of malware and kernel-level rootkits in cloud computing environments.

Virtualization security combining mandatory access control and virtual machine introspection (2015)
Conference Proceeding
Win, T. Y., Tianfield, H., & Mair, Q. (in press). Virtualization security combining mandatory access control and virtual machine introspection. In 2014 IEEE/ACM 7th International Conference on Utility and Cloud Computing. , (1004-1009). https://doi.org/10.1109/UCC.2014.165

Virtualization has become a target for attacks in cloud computing environments. Existing approaches to protecting the virtualization environment against the attacks are limited in protection scope and are with high overheads. This paper proposes a no... Read More about Virtualization security combining mandatory access control and virtual machine introspection.