Benn Lines
Plymouth University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Benn Lines.
Information Management & Computer Security | 2003
Nathan L. Clarke; Steven Furnell; Benn Lines; Paul L. Reynolds
The ability of third generation telephones to store sensitive information, such as financial records, digital certificates and company records, makes them desirable targets for impostors. This paper details the feasibility of a non‐intrusive subscriber authentication technique – the use of keystroke dynamics. This feasibility study comprises a number of investigations into the ability of neural networks to authenticate users successfully based on their interactions with a mobile phone keypad. The initial results are promising with network classification performing well, achieving a 9.8 per cent false rejection rate and an 11.0 per cent false acceptance rate.
information security conference | 2003
Nathan L. Clarke; Steven Furnell; Benn Lines; Paul L. Reynolds
The next few years will witness the widespread introduction of third generation mobile networks, completing the transition from the purely telephony devices of the first generation analogue networks, into a multimedia mobile communications tool. The ability of these new handsets to store and access sensitive information such as financial records, digital certificates and company records in association with a large handset penetration (864 million subscribers) makes them a desirable target for impostors. The authentication technique for current mobile phones has many weaknesses from a technological and subscriber perspective, and as such non-intrusive and stronger subscriber authentication techniques are required. This study investigates the plausibility of one such technique that of keystroke analysis, comparing and contrasting a number of pattern recognition and neural network based approaches to classification. It was found that neural network-based approaches performed substantially better than the pattern recognition-based approaches with false acceptance and false rejection rates of 3.2%.
Internet Research | 2001
Bogdan V. Ghita; Steven Furnell; Benn Lines; D. Le-Foll; Emmanuel C. Ifeachor
This paper presents a non‐intrusive method of determining network performance parameters for voice packet flows within a Voice over IP, or Internet Telephony call. An advantage of the method is that it allows not only end‐to‐end performance monitoring of flows, but also makes it possible to inspect the transport parameters of a specific network or link when delay sensitive traffic transits through it. The results of a preliminary test, to check the validity of the method, are also included.
Campus-wide Information Systems | 2003
L. Mued; Benn Lines; Steven Furnell; Paul L. Reynolds
This paper investigates the interaction effect of audio and video, and studies lip synchronization (lip sync). The study shows a comprehensive evaluation of achievable audio and video quality undertaken based upon different sets of impairments between audio and video, prior to transmission. The tests have been conducted on two different task scenarios, i.e. passive communication and interactive communication (person to person). The research concentrates on quantifying the effects of network impairments (packet loss) on perceived audio and video quality, as well as finding the correlations between audio and video in multimedia applications. The results presented in this paper show the strong interaction dependency between audio and video. It was justified that video has a unique benefit on multimedia quality for its psychological effects. The findings also concluded that the sensory interactions, and the attention given to a particular aspect of performance, are clearly content‐dependent.
Campus-wide Information Systems | 2003
Bogdan V. Ghita; Steven Furnell; Benn Lines; Emmanuel C. Ifeachor
This paper presents the findings of a pilot study to provide information about the characteristics of current networks and data transfers. The main aim of the study was to infer the properties of a large number of network paths. In addition, the study produced statistics relating to the average size of a typical Web page and both under the restriction of a single‐point connection. The study was performed in two steps: trace collection followed by TCP per‐flow analysis. The trace collection used the functionality of a random link generator, combined with an automatic HTTP retrieval tool. The TCP analysis was applied to the collected traces and it involved an offline TCP per‐flow method developed in previous research.
mathematical methods models and architectures for network security systems | 2001
Harjit Singh; Steven Furnell; Benn Lines; Paul Dowland
The continuous growth of computer networks, coupled with the increasing number of people relying upon information technology, has inevitably attracted both mischievous and malicious abusers. Such abuse may originate from both outside an organisation and from within, and will not necessarily be prevented by traditional authentication and access control mechanisms. Intrusion Detection Systems aim to overcome these weaknesses by continuously monitoring for signs of unauthorised activity. The techniques employed often involve the collection of vast amounts of auditing data to identify abnormalities against historical user behaviour profiles and known intrusion scenarios. The approach may be optimised using domain expertise to extract only the relevant information from the wealth available, but this can be time consuming and knowledge intensive. This paper examines the potential of Data Mining algorithms and techniques to automate the data analysis process and aid in the identification of system features and latent trends that could be used to profile user behaviour. It presents the results of a preliminary analysis and discusses the strategies used to capture and profile behavioural characteristics using data mining in the context of a conceptual Intrusion Monitoring System framework.
international conference on communications | 2003
Maria Papadaki; Steven Furnell; Benn Lines; Paul L. Reynolds
Continuing organisational dependence upon computing and networked systems, in conjunction with the mounting problems of security breaches and attacks, has served to make intrusion detection systems an increasingly common, and even essential, security countermeasure. However, whereas detection technologies have received extensive research focus for over fifteen years, the issue of intrusion response has received relatively little attention - particularly in the context of automated and active response systems. This paper considers the importance of intrusion response, and discusses the operational characteristics required of a flexible, automated responder agent within an intrusion monitoring architecture. This discussion is supported by details of a prototype implementation, based on the architecture described, which demonstrates how response policies and alerts can be managed in a practical context.
international conference on autonomic and autonomous systems | 2005
Aruna Thakur; Benn Lines; Paul L. Reynolds
In most of the synchronous e-learning tools the video of instructors image is sent using only head-and-shoulders view. Students find this video presentation rather monotonous and instructors find it restrictive. In this paper we discuss the cinematic principles for automatically capturing a more engaging lecture presentational view. Then we describe our proposed virtual class room set-up for recording the video. Finally we discuss our scheme to stream video sequence having optimum perceptual quality by dynamically controlling frame rate and resolution, taking into considerations the type of video sequence and the required bit rate
International Conference on Visual Information Engineering (VIE 2003). Ideas, Applications, Experience | 2003
L. Mued; Benn Lines; Steven Furnell; Paul L. Reynolds
Archive | 2005
Bogdan V. Ghita; Steven Furnell; Benn Lines; Emmanuel C. Ifeachor