Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Jules Pagna Disso is active.

Publication


Featured researches published by Jules Pagna Disso.


Procedia Computer Science | 2011

Performance Evaluation Study of Intrusion Detection Systems

Adeeb M. Alhomoud; Rashid Munir; Jules Pagna Disso; Irfan Awan; Abdullah Al-Dhelaan

Abstract With the thriving technology and the great increase in the usage of computer networks, the risk of having these network to be under attacks have been increased. Number of techniques have been created and designed to help in detecting and/or preventing such attacks. One common technique is the use of Network Intrusion Detection / Prevention Systems NIDS. Today, number of open sources and commercial Intrusion Detection Systems are available to match enterprises requirements but the performance of these Intrusion Detection Systems is still the main concern. In this paper, we have tested and analyzed the performance of the well know IDS system Snort and the new coming IDS system Suricata. Both Snort and Suricata were implemented on three different platforms (ESXi virtual server, Linux 2.6 and FreeBSD) to simulate a real environment. Finally, in our results and analysis a comparison of the performance of the two IDS systems is provided along with some recommendations as to what and when will be the ideal environment for Snort and Suricata.


conference on the future of the internet | 2016

Detection of Malicious Portable Executables Using Evidence Combinational Theory with Fuzzy Hashing

Anitta Patience Namanya; Qublai Khan Ali Mirza; Hamad Al-Mohannadi; Irfan-Ullah Awan; Jules Pagna Disso

Fuzzy hashing is a known technique that has been adopted to speed up malware analysis processes. However, Hashing has not been fully implemented for malware detection because it can easily be evaded by applying a simple obfuscation technique such as packing. This challenge has limited the usage of hashing to triaging of the samples based on the percentage of similarity between the known and unknown. In this paper, we explore the different ways fuzzy hashing can be used to detect similarities in a file by investigating particular hashes of interest. Each hashing method produces independent but related interesting results which are presented herein. We further investigate combination techniques that can be used to improve the detection rates in hashing methods. Two such evidence combination theory based methods are applied in this work in order propose a novel way of combining the results achieved from different hashing algorithms. This study focuses on file and section Ssdeep hashing, PeHash and Imphash techniques to calculate the similarity of the Portable Executable files. Our results show that the detection rates are improved when evidence combination techniques are used.


conference on the future of the internet | 2016

Cyber-Attack Modeling Analysis Techniques: An Overview

Hamad Al-Mohannadi; Qublai Khan Ali Mirza; Anitta Patience Namanya; Irfan Awan; Andrea J. Cullen; Jules Pagna Disso

Cyber attack is a sensitive issue in the world of Internet security. Governments and business organisations around the world are providing enormous effort to secure their data. They are using various types of tools and techniques to keep the business running, while adversaries are trying to breach security and send malicious software such as botnets, viruses, trojans etc., to access valuable data. Everyday the situation is getting worse because of new types of malware emerging to attack networks. It is important to understand those attacks both before and after they happen in order to provide better security to our systems. Understanding attack models provide more insight into network vulnerability, which in turn can be used to protect the network from future attacks. In the cyber security world, it is difficult to predict a potential attack without understanding the vulnerability of the network. So, it is important to analyse the network to identify top possible vulnerability list, which will give an intuitive idea to protect the network. Also, handling an ongoing attack poses significant risk on the network and valuable data, where prompt action is necessary. Proper utilisation of attack modelling techniques provide advance planning, which can be implemented rapidly during an ongoing attack event. This paper aims to analyse various types of existing attack modelling techniques to understand the vulnerability of the network, and the behaviour and goals of the adversary. The ultimate goal is to handle cyber attack in efficient manner using attack modelling techniques.


IEEE Computer | 2013

A Next-Generation Approach to Combating Botnets

Adeeb M. Alhomoud; Irfan Awan; Jules Pagna Disso; Muhammad Younas

As part of a defense-in-depth security solution for domain-controlled enterprise networks, a proposed self-healing system architecture is designed to increase resiliency against botnets with minimal disruption to network services.


2013 International Conference on Computing, Networking and Communications (ICNC) | 2013

Towards an enterprise self-healing system against botnets attacks

Adeeb M. Alhomoud; Irfan-Ullah Awan; Jules Pagna Disso

Protecting against cyber attacks is no longer a problem of organizations and home users only. Cyber security programs are now a priority of most governments. Cyber criminals have been using botnets to gain control over millions of computer, steel information and commit other malicious activities. In this paper we propose a self-healing architecture that was originally inspired from a nature paradigm and applied in the computer field. Our solution is designed to work within a network domain. We present the initial design of our solution based on the principles of self healing systems and the analysis of botnet behaviour. We discuss how to either neutralize or reverse (correct) their actions ensuring that network operations continue without disruption.


Archive | 2019

An Analysis into the Scalability of Bitcoin and Ethereum

Richard Dennis; Jules Pagna Disso

With cryptocurrencies and blockchain-based networks being increasingly used for more and more applications, a fundamental issue is now being noticed; scalability. In this paper, we conduct what we believe the first long-term assessment of the two largest blockchain-based networks; Bitcoin and Ethereum. Using historic data, we model how their growth could be over the next three years and proposed a model, a temporal blockchain, to reduce the network size and increase scalability.


International Conference on Wireless and Satellite Systems | 2017

DoS Attack Impact Assessment on Software Defined Networks

Abimbola Sangodoyin; Tshiamo Sigwele; Prashant Pillai; Yim Fun Hu; Irfan Awan; Jules Pagna Disso

Software Defined Networking (SDN) is an evolving network paradigm which promises greater interoperability, more innovation, flexible and effective solutions. Although SDN on the surface provides a simple framework for network programmability and monitoring, few has been said about security measures to make it resilient to hitherto security flaws in traditional network and the new threats the architecture is ushering in. One of the security weaknesses the architecture is ushering in due to separation of control and data plane is Denial of Service (DoS) attack. The main goal of this attack is to make network resources unavailable to legitimate users or introduce large delays. In this paper, the effect of DoS attack on SDN is presented using Mininet, OpenDaylight (ODL) controller and network performance testing tools such as iperf and ping. Internet Control Message Protocol (ICMP) flood attack is performed on a Transmission Control Protocol (TCP) server and a User Datagram Protocol (UDP) server which are both connected to OpenFlow switches. The simulation results reveal a drop in network throughput from 233 Mbps to 87.4 Mbps and the introduction of large jitter between 0.003 ms and 0.789 ms during DoS attack.


conference on the future of the internet | 2015

Detection, Mitigation and Quantitative Security Risk Assessment of Invisible Attacks at Enterprise Network

Rashid Munir; Muhammad Rafiq Mufti; Irfan Awan; Yim Fun Hu; Jules Pagna Disso

Given the increasing dependence of our societies on network information systems and the efforts being provided by security communities to secure their networks, a strong sense of insecurity still prevails. Therefore, there is a need for new countermeasures against these cyber-attacks which causes disruption to business processes. The evaluation approaches to detect and assess the security risk level of cyber-attacks are harder to develop due to lack of information such as scope of attack and the way it originate. This paper assess the security risk level of those attacks which are targeting to IT, business networks and critical infrastructure, and where malicious users actions are direct threats to the targeted system but yet not visible by the targeted system. This is achieved after classifying each Google dorks (commands) as an invisible attacks according to their characteristics. In addition, a method is devised to secure any organizations network against invisible attacks by creating a rule in Snort NIDPS signature database. Furthermore, OWASP risk rating methodology is incorporated to assess the overall severity risk level of invisible attacks on the network in terms of high, medium and low. Since, this method does not provide the quantitative security risk value of enterprise network, therefore, quantitative security risk assessment of enterprise network is determined using severity risk assessment table.


broadband and wireless computing, communication and applications | 2013

A Quantitative Measure of the Security Risk Level of Enterprise Networks

Rashid Munir; Jules Pagna Disso; Irfan Awan; Muhammad Rafiq Mufti

Along with the tremendous expansion of information technology and networking, the number of malicious attacks which cause disruption to business processes has concurrently increased. Despite such attacks, the aim for network administrators is to enable these systems to continue delivering the services they are intended for. Currently, many research efforts are directed towards securing network further whereas, little attention has been given to the quantification of network security which involves assessing the vulnerability of these systems to attacks. In this paper, a method is devised to quantify the security level of IT networks. This is achieved by electronically scanning the network using the vulnerability scanning tool (Nexpose) to identify the vulnerability level at each node classified according to the common vulnerability scoring system standards (critical, severe and moderate). Probabilistic approach is then applied to calculate an overall security risk level of sub networks and entire network. It is hoped that these metrics will be valuable for any network administrator to acquire an absolute risk assessment value of the network. The suggested methodology has been applied to a computer network of an existing UK organization with 16 nodes and a switch.


conference on the future of the internet | 2018

The World of Malware: An Overview

Anitta Patience Namanya; Andrea J. Cullen; Irfan-Ullah Awan; Jules Pagna Disso

Collaboration


Dive into the Jules Pagna Disso's collaboration.

Top Co-Authors

Avatar

Irfan Awan

University of Bradford

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Richard Dennis

University of Portsmouth

View shared research outputs
Top Co-Authors

Avatar

Yim Fun Hu

University of Bradford

View shared research outputs
Researchain Logo
Decentralizing Knowledge