Zobrazeno 1 - 10
of 22
pro vyhledávání: '"Peter Maynard"'
Publikováno v:
Maynard, P, McLaughlin, K & Sezer, S 2020, ' Decomposition and sequential-AND analysis of known cyber-attacks on critical infrastructure control systems ', Journal of Cybersecurity, vol. 6, no. 1 . https://doi.org/10.1093/cybsec/tyaa020
We perform a detailed survey and analysis of the most significant attacks, which have targeted industrial control systems over the past decade, based on detailed incident reports from scientific and non-traditional resources. This work is the first t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::00a6fd1a4daea29f4287babc2dd5d61c
https://pure.qub.ac.uk/en/publications/decomposition-and-sequentialand-analysis-of-known-cyberattacks-on-critical-infrastructure-control-systems(6bc23605-38a7-4d48-8dce-e4f5dc21dc2b).html
https://pure.qub.ac.uk/en/publications/decomposition-and-sequentialand-analysis-of-known-cyberattacks-on-critical-infrastructure-control-systems(6bc23605-38a7-4d48-8dce-e4f5dc21dc2b).html
Autor:
Peter Maynard, Kieran McLaughlin
Publikováno v:
CyberSA
The hacktivist threat actor is listed in many risk decision documents. Yet their tactics and techniques often remain a mystery. We create a MITRE ATT&CK (ATT&CK) model of a well known hacktivist who goes under the pseudonym of Phineas Fisher, and map
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::22d410f79eb5e076115b88678506ccc6
http://arxiv.org/abs/2004.14360
http://arxiv.org/abs/2004.14360
Autor:
Peter Maynard, Kieran McLaughlin
Publikováno v:
ICETE (2)
We describe a new class of packet injection attacks called Man-on-the-Side Attacks (MotS), previously only seen where state actors have "compromised" a number of telecommunication companies. MotS injection attacks have not been widely investigated in
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::1dd4685110dc214f27787154a8d69dd0
http://arxiv.org/abs/2004.14334
http://arxiv.org/abs/2004.14334
Publikováno v:
Hui, H, Maynard, P & McLaughlin, K 2019, ICS Interaction Testbed: A Platform for Cyber-Physical Security Research . in 6th International Symposium for ICS & SCADA Cyber Security Research 2019: Proceedings . BCS, pp. 89-96, 6th International Symposium for ICS & SCADA Cyber Security Research 2019, Athens, Greece, 10/09/2019 . https://doi.org/10.14236/ewic/icscsr19.12
To perform cyber security research on cyber-physical systems, the involvement of real physical systems and components is an obvious benefit. However, in the area of industrial control systems, limited accessibility to operational systems for experime
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::42ac3b136600838dc914d4d07e9c6395
https://pure.qub.ac.uk/en/publications/5b445897-95cf-4893-9944-009c290fda77
https://pure.qub.ac.uk/en/publications/5b445897-95cf-4893-9944-009c290fda77
Publikováno v:
Maynard, P, McLaughlin, K & Sezer, S 2018, An Open Framework for Deploying Experimental SCADA Testbed Networks . in 5th International Symposium for ICS & SCADA Cyber Security Research 2018: Proceedings . BCS, pp. 92-101, 5th International Symposium for ICS & SCADA Cyber Security Research 2018, Hamburg, Germany, 28/08/2018 . https://doi.org/10.14236/ewic/ICS2018.11
A scalable framework for automatically deploying locally (or remotely) a number of virtual machines that replicate a Supervisory Control And Data Acquisition (SCADA) network is proposed. This includes multiple virtual hosts emulating sensors and actu
Publikováno v:
ICISSP
Publikováno v:
Tanczer, L, McConville, R & Maynard, P 2016, ' Censorship and Surveillance in the Digital Age : The Technological Challenges for Academics ', Journal of Global Security Studies, vol. 1, no. 4, pp. 346-355 . https://doi.org/10.1093/jogss/ogw016
Technologically supported censorship and surveillance practices have become prominent topics and also affect the academic profession. In particular, the growing reliance on digital tools makes scholars as well as their research data and/or participan
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::df7b9923e23ede6b4bf40cfd60a31cf1
https://research-information.bris.ac.uk/ws/files/150040481/Ryan_McConville_Censorshipin_the_Digital_Age.pdf
https://research-information.bris.ac.uk/ws/files/150040481/Ryan_McConville_Censorshipin_the_Digital_Age.pdf
Publikováno v:
Khan, R, Maynard, P, McLaughlin, K, Laverty, D & Sezer, S 2016, Threat Analysis of BlackEnergy Malware for Synchrophasor based Real-time Control and Monitoring in Smart Grid . in 4th International Symposium for ICS & SCADA Cyber Security Research 2016 . BCS, pp. 53-63, 4th International Symposium for ICS & SCADA Cyber Security Research 2016, Belfast, United Kingdom, 23/08/2016 . https://doi.org/10.14236/ewic/ICS2016.7
ICS-CSR
ICS-CSR
The BlackEnergy malware targeting critical infrastructures has a long history. It evolved over time from a simple DDoS platform to a quite sophisticated plug-in based malware. The plug-in architecture has a persistent malware core with easily install
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::376431c37b060b7df51c30ff683a42bd
https://pure.qub.ac.uk/en/publications/threat-analysis-of-blackenergy-malware-for-synchrophasor-based-realtime-control-and-monitoring-in-smart-grid(df705d06-011e-481b-95cd-59dbd3f29b09).html
https://pure.qub.ac.uk/en/publications/threat-analysis-of-blackenergy-malware-for-synchrophasor-based-realtime-control-and-monitoring-in-smart-grid(df705d06-011e-481b-95cd-59dbd3f29b09).html
Publikováno v:
Maynard, P, McLaughlin, K & Sezer, S 2016, Modelling Duqu 2.0 Malware using Attack Trees with Sequential Conjunction . in Proceedings of the 2nd International Conference on Information Systems Security and Privacy . SciTePress, pp. 465-472, 2nd International Conference on Information Systems Security and Privacy, Rome, Italy, 19/01/2016 . https://doi.org/10.5220/0005745704650472
ICISSP
ICISSP
In this paper we identify requirements for choosing a threat modelling formalisation for modelling sophisticated malware such as Duqu 2.0. We discuss the gaps in current formalisations and propose the use of Attack Trees with Sequential Conjunction w
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::39fe2184d56f5cab76d33637dd8c93bb
https://pure.qub.ac.uk/en/publications/modelling-duqu-20-malware-using-attack-trees-with-sequential-conjunction(71dfc912-d7af-4e2f-b6b0-3844ab7cb654).html
https://pure.qub.ac.uk/en/publications/modelling-duqu-20-malware-using-attack-trees-with-sequential-conjunction(71dfc912-d7af-4e2f-b6b0-3844ab7cb654).html
Autor:
Kirstin Gray, Duncan Thorburn Burns, Peter Maynard, Peter Colwell, Michael Walker, Christopher Hopley, David Bell
Publikováno v:
Food Analytical Methods. 5:874-880
Morpholine is a precursor of carcinogenic nitrosamines and although the possibility of their formation in the human stomach after ingestion of morpholine-treated apples is reported as highly unlikely morpholine has not been authorised as a food addit