Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kieran McLaughlin is active.

Publication


Featured researches published by Kieran McLaughlin.


ieee symposium on security and privacy | 2011

Obfuscation: The Hidden Malware

Philip O'Kane; Sakir Sezer; Kieran McLaughlin

A cyberwar exists between malware writers and antimalware researchers. At this wars heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis. Malware writers use packers, polymorphic techniques, and metamorphic techniques to evade intrusion detection systems. The need exists for new antimalware approaches that focus on what malware is doing rather than how its doing it.


IEEE Transactions on Power Delivery | 2014

Multiattribute SCADA-Specific Intrusion Detection System for Power Networks

Yi Yang; Kieran McLaughlin; Sakir Sezer; Timothy Littler; Eul Gyu Im; Bernardi Pranggono; H. F. Wang

The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.


ieee pes international conference and exhibition on innovative smart grid technologies | 2011

Impact of cyber-security issues on Smart Grid

Yi Yang; Timothy Littler; Sakir Sezer; Kieran McLaughlin; H. F. Wang

Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.


power and energy society general meeting | 2013

Intrusion Detection System for IEC 60870-5-104 based SCADA networks

Yi Yang; Kieran McLaughlin; Timothy Littler; Sakir Sezer; Bernardi Pranggono; H. F. Wang

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.


IEEE Transactions on Very Large Scale Integration Systems | 2009

Design and Implementation of a Field Programmable CRC Circuit Architecture

Ciaran Toal; Kieran McLaughlin; Sakir Sezer; Xin Yang

The design and implementation of a programmable cyclic redundancy check (CRC) computation circuit architecture, suitable for deployment in network related system-on-chips (SoCs) is presented. The architecture has been designed to be field reprogrammable so that it is fully flexible in terms of the polynomial deployed and the input port width. The circuit includes an embedded configuration controller that has a low reconfiguration time and hardware cost. The circuit has been synthesised and mapped to 130-nm UMC standard cell [application-specific integrated circuit (ASIC)] technology and is capable of supporting line speeds of 5 Gb/s.


IEEE Transactions on Information Forensics and Security | 2013

SVM Training Phase Reduction Using Dataset Feature Filtering for Malware Detection

Philip O'Kane; Sakir Sezer; Kieran McLaughlin; Eul Gyu Im

N-gram analysis is an approach that investigates the structure of a program using bytes, characters, or text strings. A key issue with N-gram analysis is feature selection amidst the explosion of features that occurs when N is increased. The experiments within this paper represent programs as operational code (opcode) density histograms gained through dynamic analysis. A support vector machine is used to create a reference model, which is used to evaluate two methods of feature reduction, which are “area of intersect” and “subspace analysis using eigenvectors.” The findings show that the relationships between features are complex and simple statistics filtering approaches do not provide a viable approach. However, eigenvector subspace analysis produces a suitable filter.


workshop on information security applications | 2017

STPA-SafeSec: Safety and security analysis for cyber-physical systems

Ivo Friedberg; Kieran McLaughlin; Paul Smith; David M. Laverty; Sakir Sezer

Abstract Cyber-physical systems tightly integrate physical processes and information and communication technologies. As todays critical infrastructures, e.g., the power grid or water distribution networks, are complex cyber-physical systems, ensuring their safety and security becomes of paramount importance. Traditional safety analysis methods, such as HAZOP, are ill-suited to assess these systems. Furthermore, cybersecurity vulnerabilities are often not considered critical, because their effects on the physical processes are not fully understood. In this work, we present STPA-SafeSec, a novel analysis methodology for both safety and security. Its results show the dependencies between cybersecurity vulnerabilities and system safety. Using this information, the most effective mitigation strategies to ensure safety and security of the system can be readily identified. We apply STPA-SafeSec to a use case in the power grid domain, and highlight its benefits.


emerging technologies and factory automation | 2015

Investigating cyber-physical attacks against IEC 61850 photovoltaic inverter installations

BooJoong Kang; Peter Maynard; Kieran McLaughlin; Sakir Sezer; Filip Andren; Christian Seitl; Friederich Kupzog; Thomas Strasser

Cyber-attacks against Smart Grids have been found in the real world. Malware such as Havex and BlackEnergy have been found targeting industrial control systems (ICS) and researchers have shown that cyber-attacks can exploit vulnerabilities in widely used Smart Grid communication standards. This paper addresses a deep investigation of attacks against the manufacturing message specification of IEC 61850, which is expected to become one of the most widely used communication services in Smart Grids. We investigate how an attacker can build a custom tool to execute man-in-the-middle attacks, manipulate data, and affect the physical system. Attack capabilities are demonstrated based on NESCOR scenarios to make it possible to thoroughly test these scenarios in a real system. The goal is to help understand the potential for such attacks, and to aid the development and testing of cyber security solutions. An attack use-case is presented that focuses on the standard for power utility automation, IEC 61850 in the context of inverter-based distributed energy resource devices; especially photovoltaics (PV) generators.


advanced video and signal based surveillance | 2010

Intelligent Sensor Information System For Public Transport To Safely Go

Paul C. Miller; Weiru Liu; Chris Fowler; Huiyu Zhou; Jiali Shen; Jianbing Ma; Jianguo Zhang; WeiQi Yan; Kieran McLaughlin; Sakir Sezer

The Intelligent Sensor Information System (ISIS) isdescribed. ISIS is an active CCTV approach to reducingcrime and anti-social behavior on public transportsystems such as buses. Key to the system is the idea ofevent composition, in which directly detected atomicevents are combined to infer higher-level events withsemantic meaning. Video analytics are described thatprofile the gender of passengers and track them as theymove about a 3-D space. The overall system architectureis described which integrates the on-board eventrecognition with the control room software over a wirelessnetwork to generate a real-time alert. Data frompreliminary data-gathering trial is presented.


advanced industrial conference on telecommunications | 2006

Exploring CAM Design For Network Processing Using FPGA Technology

Kieran McLaughlin; Niall O'Connor; Sakir Sezer

Content Addressable Memory (CAM) is becoming increasingly important in the area of communication systems design. This paper investigates a number of CAM designs suitable for implementation on FPGA. Three fundamental designs are examined based on registers, RAM blocks and LUTs. The designs are synthesized with speed and area costs presented and evaluated. This shows how CAMs can be designed for use in FPGA’s in small to medium size applications where a CAM is otherwise unavailable.

Collaboration


Dive into the Kieran McLaughlin's collaboration.

Top Co-Authors

Avatar

Sakir Sezer

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

Yi Yang

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

David M. Laverty

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ivo Friedberg

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Paul Smith

Austrian Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Peter Maynard

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

BooJoong Kang

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

Timothy Littler

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

H. F. Wang

North China Electric Power University

View shared research outputs
Researchain Logo
Decentralizing Knowledge