Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Desmond Allan Schmidt is active.

Publication


Featured researches published by Desmond Allan Schmidt.


security of information and networks | 2012

Ensemble-based DDoS detection and mitigation model

Sajal Bhatia; Desmond Allan Schmidt; George M. Mohay

This work-in-progress paper presents an ensemble-based model for detecting and mitigating Distributed Denial-of-Service (DDoS) attacks, and its partial implementation. The model utilises network traffic analysis and MIB (Management Information Base) server load analysis features for detecting a wide range of network and application layer DDoS attacks and distinguishing them from Flash Events. The proposed model will be evaluated against realistic synthetic network traffic generated using a software-based traffic generator that we have developed as part of this research. In this paper, we summarise our previous work, highlight the current work being undertaken along with preliminary results obtained and outline the future directions of our work.


network and system security | 2010

Validating Denial of Service Vulnerabilities in Web Services

Suriadi Suriadi; Andrew J. Clark; Desmond Allan Schmidt

The loosely-coupled and dynamic nature of web services architectures has many benefits, but also leads to an increased vulnerability to denial of service attacks. While many papers have surveyed and described these vulnerabilities, they are often theoretical and lack experimental data to validate them, and assume an obsolete state of web services technologies. This paper describes experiments involving several denial of service vulnerabilities in well-known web services platforms, including Java Metro, Apache Axis, and Microsoft.NET. The results both confirm and deny the presence of some of the most well-known vulnerabilities in web services technologies. Specifically, major web services platforms appear to cope well with attacks that target memory exhaustion. However, attacks targeting CPU-time exhaustion are still effective, regardless of the victim’s platform.


ACM Computing Surveys | 2016

A Survey and Analysis of the GNSS Spoofing Threat and Countermeasures

Desmond Allan Schmidt; Kenneth Radke; Seyit A. Camtepe; Ernest Foo; Michal Ren

Detection and prevention of global navigation satellite system (GNSS) “spoofing” attacks, or the broadcast of false global navigation satellite system services, has recently attracted much research interest. This survey aims to fill three gaps in the literature: first, to assess in detail the exact nature of threat scenarios posed by spoofing against the most commonly cited targets; second, to investigate the many practical impediments, often underplayed, to carrying out GNSS spoofing attacks in the field; and third, to survey and assess the effectiveness of a wide range of proposed defences against GNSS spoofing. Our conclusion lists promising areas of future research.


Faculty of Science and Technology; Information Security Institute | 2010

A Distributed Denial of Service Testbed

Desmond Allan Schmidt; Suriadi Suriadi; Alan Tickle; Andrew J. Clark; George M. Mohay; Ejaz Ahmed; James Mackie

The Denial of Service Testing Framework (dosTF) being developed as part of the joint India-Australia research project for ’Protecting Critical Infrastructure from Denial of Service Attacks’ allows for the construction, monitoring and management of emulated Distributed Denial of Service attacks using modest hardware resources. The purpose of the testbed is to study the effectiveness of different DDoS mitigation strategies and to allow for the testing of defense appliances. Experiments are saved and edited in XML as abstract descriptions of an attack/defense strategy that is only mapped to real resources at run-time. It also provides a web-application portal interface that can start, stop and monitor an attack remotely. Rather than monitoring a service under attack indirectly, by observing traffic and general system parameters, monitoring of the target application is performed directly in real time via a customised SNMP agent.


network computing and applications | 2012

Modelling Web-server Flash Events

Sajal Bhatia; George M. Mohay; Desmond Allan Schmidt; Alan Tickle

A Flash Event (FE) represents a period of time when a web-server experiences a dramatic increase in incoming traffic, either following a newsworthy event that has prompted users to locate and access it, or as a result of redirection from other popular web or social media sites. This usually leads to network congestion and Quality-of-Service (QoS) degradation. These events can be mistaken for Distributed Denial-of-Service (DDoS) attacks aimed at disrupting the server. Accurate detection of FEs and their distinction from DDoS attacks is important, since different actions need to be undertaken by network administrators in these two cases. However, lack of public domain FE datasets hinders research in this area. In this paper we present a detailed study of flash events and classify them into three broad categories. In addition, the paper describes FEs in terms of three key components: the volume of incoming traffic, the related source IP-addresses, and the resources being accessed. We present such a FE model with minimal parameters and use publicly available datasets to analyse and validate our proposed model. The model can be used to generate different types of FE traffic, closely approximating real-world scenarios, in order to facilitate research into distinguishing FEs from DDoS attacks.


Computers & Security | 2014

A framework for generating realistic traffic for Distributed Denial-of-Service attacks and Flash Events

Sajal Bhatia; Desmond Allan Schmidt; George M. Mohay; Alan Tickle


Historical Social Research | 2012

The role of markup in the digital humanities

Desmond Allan Schmidt


Digital Humanities Quarterly | 2010

Digital Encoding as a Hermeneutic and Semiotic Act: The Case of Valerio Magrelli

Domenico Fiormonte; Valentina Martiradonna; Desmond Allan Schmidt


Archive | 2011

La rappresentazione digitale della varianza testuale

Domenico Fiormonte; Desmond Allan Schmidt


Intelligenza Artificiale | 2010

Multi-version documents: a digitisation solution for textual cultural heritage artefacts

Desmond Allan Schmidt; Domenico Fiormonte

Collaboration


Dive into the Desmond Allan Schmidt's collaboration.

Top Co-Authors

Avatar

George M. Mohay

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Alan Tickle

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Sajal Bhatia

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Andrew J. Clark

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Suriadi Suriadi

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ejaz Ahmed

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Ernest Foo

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

James Mackie

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Kenneth Radke

Queensland University of Technology

View shared research outputs
Top Co-Authors

Avatar

Seyit A. Camtepe

Queensland University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge