Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sakir Sezer is active.

Publication


Featured researches published by Sakir Sezer.


IEEE Communications Magazine | 2013

Are we ready for SDN? Implementation challenges for software-defined networks

Sakir Sezer; Sandra Scott-Hayward; Pushpinder Kaur Chouhan; Barbara Fraser; David Lake; Jim Finnegan; Niel Viljoen; Marc Miller; Navneet Rao

Cloud services are exploding, and organizations are converging their data centers in order to take advantage of the predictability, continuity, and quality of service delivered by virtualization technologies. In parallel, energy-efficient and high-security networking is of increasing importance. Network operators, and service and product providers require a new network solution to efficiently tackle the increasing demands of this changing network landscape. Software-defined networking has emerged as an efficient network technology capable of supporting the dynamic nature of future network functions and intelligent applications while lowering operating costs through simplified hardware, software, and management. In this article, the question of how to achieve a successful carrier grade network with software-defined networking is raised. Specific focus is placed on the challenges of network performance, scalability, security, and interoperability with the proposal of potential solution directions.


2013 IEEE SDN for Future Networks and Services (SDN4FNS) | 2013

Sdn Security: A Survey

Sandra Scott-Hayward; Gemma O'Callaghan; Sakir Sezer

The pull of Software-Defined Networking (SDN) is magnetic. There are few in the networking community who have escaped its impact. As the benefits of network visibility and network device programmability are discussed, the question could be asked as to who exactly will benefit? Will it be the network operator or will it, in fact, be the network intruder? As SDN devices and systems hit the market, security in SDN must be raised on the agenda. This paper presents a comprehensive survey of the research relating to security in software-defined networking that has been carried out to date. Both the security enhancements to be derived from using the SDN framework and the security challenges introduced by the framework are discussed. By categorizing the existing work, a set of conclusions and proposals for future research directions are presented.


advanced information networking and applications | 2013

A New Android Malware Detection Approach Using Bayesian Classification

Suleiman Y. Yerima; Sakir Sezer; Gavin McWilliams; Igor Muttik

Mobile malware has been growing in scale and complexity as smartphone usage continues to rise. Android has surpassed other mobile platforms as the most popular whilst also witnessing a dramatic increase in malware targeting the platform. A worrying trend that is emerging is the increasing sophistication of Android malware to evade detection by traditional signature-based scanners. As such, Android app marketplaces remain at risk of hosting malicious apps that could evade detection before being downloaded by unsuspecting users. Hence, in this paper we present an effective approach to alleviate this problem based on Bayesian classification models obtained from static code analysis. The models are built from a collection of code and app characteristics that provide indicators of potential malicious activities. The models are evaluated with real malware samples in the wild and results of experiments are presented to demonstrate the effectiveness of the proposed approach.


IEEE Communications Surveys and Tutorials | 2016

A Survey of Security in Software Defined Networks

Sandra Scott-Hayward; Sriram Natarajan; Sakir Sezer

The proposition of increased innovation in network applications and reduced cost for network operators has won over the networking world to the vision of software-defined networking (SDN). With the excitement of holistic visibility across the network and the ability to program network devices, developers have rushed to present a range of new SDN-compliant hardware, software, and services. However, amidst this frenzy of activity, one key element has only recently entered the debate: Network Security. In this paper, security in SDN is surveyed presenting both the research community and industry advances in this area. The challenges to securing the network from the persistent attacker are discussed, and the holistic approach to the security architecture that is required for SDN is described. Future research directions that will be key to providing network security in SDN are identified.


ieee symposium on security and privacy | 2011

Obfuscation: The Hidden Malware

Philip O'Kane; Sakir Sezer; Kieran McLaughlin

A cyberwar exists between malware writers and antimalware researchers. At this wars heart rages a weapons race that originated in the 80s with the first computer virus. Obfuscation is one of the latest strategies to camouflage the telltale signs of malware, undermine antimalware software, and thwart malware analysis. Malware writers use packers, polymorphic techniques, and metamorphic techniques to evade intrusion detection systems. The need exists for new antimalware approaches that focus on what malware is doing rather than how its doing it.


Iet Information Security | 2014

Analysis of Bayesian classification-based approaches for Android malware detection

Suleiman Y. Yerima; Sakir Sezer; Gavin McWilliams

Mobile malware has been growing in scale and complexity spurred by the unabated uptake of smartphones worldwide. Android is fast becoming the most popular mobile platform resulting in sharp increase in malware targeting the platform. Additionally, Android malware is evolving rapidly to evade detection by traditional signature-based scanning. Despite current detection measures in place, timely discovery of new malware is still a critical issue. This calls for novel approaches to mitigate the growing threat of zero-day Android malware. Hence, the authors develop and analyse proactive machine-learning approaches based on Bayesian classification aimed at uncovering unknown Android malware via static analysis. The study, which is based on a large malware sample set of majority of the existing families, demonstrates detection capabilities with high accuracy. Empirical results and comparative analysis are presented offering useful insight towards development of effective static-analytic Bayesian classification-based solutions for detecting unknown Android malware.


IEEE Transactions on Power Delivery | 2014

Multiattribute SCADA-Specific Intrusion Detection System for Power Networks

Yi Yang; Kieran McLaughlin; Sakir Sezer; Timothy Littler; Eul Gyu Im; Bernardi Pranggono; H. F. Wang

The increased interconnectivity and complexity of supervisory control and data acquisition (SCADA) systems in power system networks has exposed the systems to a multitude of potential vulnerabilities. In this paper, we present a novel approach for a next-generation SCADA-specific intrusion detection system (IDS). The proposed system analyzes multiple attributes in order to provide a comprehensive solution that is able to mitigate varied cyber-attack threats. The multiattribute IDS comprises a heterogeneous white list and behavior-based concept in order to make SCADA cybersystems more secure. This paper also proposes a multilayer cyber-security framework based on IDS for protecting SCADA cybersecurity in smart grids without compromising the availability of normal data. In addition, this paper presents a SCADA-specific cybersecurity testbed to investigate simulated attacks, which has been used in this paper to validate the proposed approach.


Iet Information Security | 2015

High accuracy android malware detection using ensemble learning

Suleiman Y. Yerima; Sakir Sezer; Igor Muttik

With over 50 billion downloads and more than 1.3 million apps in Googles official market, Android has continued to gain popularity among smartphone users worldwide. At the same time there has been a rise in malware targeting the platform, with more recent strains employing highly sophisticated detection avoidance techniques. As traditional signature-based methods become less potent in detecting unknown malware, alternatives are needed for timely zero-day discovery. Thus, this study proposes an approach that utilises ensemble learning for Android malware detection. It combines advantages of static analysis with the efficiency and performance of ensemble machine learning to improve Android malware detection accuracy. The machine learning models are built using a large repository of malware samples and benign apps from a leading antivirus vendor. Experimental results and analysis presented shows that the proposed method which uses a large feature space to leverage the power of ensemble learning is capable of 97.3-99% detection accuracy with very low false positive rates.


ieee pes international conference and exhibition on innovative smart grid technologies | 2011

Impact of cyber-security issues on Smart Grid

Yi Yang; Timothy Littler; Sakir Sezer; Kieran McLaughlin; H. F. Wang

Greater complexity and interconnectivity across systems embracing Smart Grid technologies has meant that cyber-security issues have attracted significant attention. This paper describes pertinent cyber-security requirements, in particular cyber attacks and countermeasures which are critical for reliable Smart Grid operation. Relevant published literature is presented for critical aspects of Smart Grid cyber-security, such as vulnerability, interdependency, simulation, and standards. Furthermore, a preliminary study case is given which demonstrates the impact of a cyber attack which violates the integrity of data on the load management of real power system. Finally, the paper proposes future work plan which focuses on applying intrusion detection and prevention technology to address cyber-security issues. This paper also provides an overview of Smart Grid cyber-security with reference to related cross-disciplinary research topics.


power and energy society general meeting | 2013

Intrusion Detection System for IEC 60870-5-104 based SCADA networks

Yi Yang; Kieran McLaughlin; Timothy Littler; Sakir Sezer; Bernardi Pranggono; H. F. Wang

Increased complexity and interconnectivity of Supervisory Control and Data Acquisition (SCADA) systems in Smart Grids potentially means greater susceptibility to malicious attackers. SCADA systems with legacy communication infrastructure have inherent cyber-security vulnerabilities as these systems were originally designed with little consideration of cyber threats. In order to improve cyber-security of SCADA networks, this paper presents a rule-based Intrusion Detection System (IDS) using a Deep Packet Inspection (DPI) method, which includes signature-based and model-based approaches tailored for SCADA systems. The proposed signature-based rules can accurately detect several known suspicious or malicious attacks. In addition, model-based detection is proposed as a complementary method to detect unknown attacks. Finally, proposed intrusion detection approaches for SCADA networks are implemented and verified via Snort rules.

Collaboration


Dive into the Sakir Sezer's collaboration.

Top Co-Authors

Avatar

Kieran McLaughlin

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

John V. McCanny

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

Ciaran Toal

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xin Yang

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

David M. Laverty

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

Dwayne Burns

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi Yang

Queen's University Belfast

View shared research outputs
Top Co-Authors

Avatar

BooJoong Kang

Queen's University Belfast

View shared research outputs
Researchain Logo
Decentralizing Knowledge