Murray Brand
Edith Cowan University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Murray Brand.
The Journal of Digital Forensics, Security and Law | 2010
Murray Brand; Craig Valli; Andrew Woodward
Malicious software (malware) has a wide variety of analysis avoidance techniques that it can employ to hinder forensic analysis. Although legitimate software can incorporate the same analysis avoidance techniques to provide a measure of protection against reverse engineering and to protect intellectual property, malware invariably makes much greater use of such techniques to make detailed analysis labour intensive and very time consuming. Analysis avoidance techniques are so heavily used by malware that the detection of the use of analysis avoidance techniques could be a very good indicator of the presence of malicious intent. However, there is a tendency for analysis tools to focus on hiding the presence of the tool itself from being detected by the malware, and not on recording the detection and recording of analysis avoidance techniques. In addition, the coverage of anti-anti-analysis techniques in common tools and plugins is much less than the number of analysis avoidance techniques that exist. The purpose of this paper is to suggest that the discovery of the intent of deception may be a very good indicator of an underlying malicious objective of the software under investigation.
computational intelligence and security | 2013
Samaneh Rastegari; Philip Hingston; Chiou-Peng Lam; Murray Brand
The increased number of security threats against the Internet has made communications more vulnerable to attacks. Despite much research and improvement in network security, the number of denial of service (DoS) attacks has rapidly grown in frequency, severity, and sophistication in recent years. Thus, serious attention needs to be paid to network security. However, to create a secure network that can stay ahead of all threats, detection and response features are real challenges. In this paper, we look at the the interaction between the attacker and the defender in a Red Team/Blue Team exercise. We also propose a quantitative decision framework which is able to provide optimal solutions to defend against well-organized and sophisticated attacks. A large number of possible scenarios for testing of DoS defences will be examined through this framework in order to help experts to improve decisions regarding optimal solutions to defend against DoS threats.
Archive | 2011
Murray Brand; Craig Valli; Andrew Woodward
Archive | 2008
Patryk Szewczyk; Murray Brand
Archive | 2007
Murray Brand
Archive | 2012
Craig Valli; Andrew Woodward; Clinton Carpene; Peter Hannay; Murray Brand; Reino Karvinen; Christopher Holme
Archive | 2010
Murray Brand; Craig Valli; Andrew Woodward
Archive | 2012
Murray Brand; Patricia A. H. Williams
Archive | 2011
Murray Brand
Archive | 2007
Murray Brand