Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xavier J. A. Bellekens is active.

Publication


Featured researches published by Xavier J. A. Bellekens.


international symposium on networks computers and communications | 2016

Threat analysis of IoT networks using artificial neural network intrusion detection system

Elike Hodo; Xavier J. A. Bellekens; Andrew Hamilton; Pierre-Louis Dubouilh; Ephraim Iorkyase; Christos Tachtatzis; Robert C. Atkinson

The Internet of things (IoT) is still in its infancy and has attracted much interest in many industrial sectors including medical fields, logistics tracking, smart cities and automobiles. However as a paradigm, it is susceptible to a range of significant intrusion threats. This paper presents a threat analysis of the IoT and uses an Artificial Neural Network (ANN) to combat these threats. A multi-level perceptron, a type of supervised ANN, is trained using internet packet traces, then is assessed on its ability to thwart Distributed Denial of Service (DDoS/DoS) attacks. This paper focuses on the classification of normal and threat patterns on an IoT Network. The ANN procedure is validated against a simulated IoT network. The experimental results demonstrate 99.4% accuracy and can successfully detect various DDoS/DoS attacks.


security of information and networks | 2014

A Highly-Efficient Memory-Compression Scheme for GPU-Accelerated Intrusion Detection Systems

Xavier J. A. Bellekens; Christos Tachtatzis; Robert C. Atkinson; Craig Renfrew; Tony Kirkham

Pattern Matching is a computationally intensive task used in many research fields and real world applications. Due to the ever-growing volume of data to be processed, and increasing link speeds, the number of patterns to be matched has risen significantly. In this paper we explore the parallel capabilities of modern General Purpose Graphics Processing Units (GPGPU) applications for high speed pattern matching. A highly compressed failure-less Aho-Corasick algorithm is presented for Intrusion Detection Systems on off-the-shelf hardware. This approach maximises the bandwidth for data transfers between the host and the Graphics Processing Unit (GPU). Experiments are performed on multiple alphabet sizes, demonstrating the capabilities of the library to be used in different research fields, while sustaining an adequate throughput for intrusion detection systems or DNA sequencing. The work also explores the performance impact of adequate prefix matching for alphabet sizes and varying pattern numbers achieving speeds up to 8Gbps and low memory consumption for intrusion detection systems.


security of information and networks | 2014

GLoP: Enabling Massively Parallel Incident Response Through GPU Log Processing

Xavier J. A. Bellekens; Christos Tachtatzis; Robert C. Atkinson; Craig Renfrew; Tony Kirkham

Large industrial systems that combine services and applications, have become targets for cyber criminals and are challenging from the security, monitoring and auditing perspectives. Security log analysis is a key step for uncovering anomalies, detecting intrusion, and enabling incident response. The constant increase of link speeds, threats and users, produce large volumes of log data and become increasingly difficult to analyse on a Central Processing Unit (CPU). This paper presents a massively parallel Graphics Processing Unit (GPU) Log Processing (GLoP) library and can also be used for Deep Packet Inspection (DPI), using a prefix matching technique, harvesting the full power of off-the-shelf technologies. GLoP implements two different algorithm using different GPU memory and is compared against CPU counterpart implementations. The library can be used for processing nodes with single or multiple GPUs as well as GPU cloud farms. The results show throughput of 20 Gbps and demonstrate that modern GPUs can be utilised to increase the operational speed of large scale log processing scenarios, saving precious time before and after an intrusion has occurred.


International Journal of Computer Science & Applications | 2016

A study on situational awareness security and privacy of wearable health monitoring devices

Xavier J. A. Bellekens; Kamila Nieradzinska; Alexandra Bellekens; Preetila Seeam; Andrew Hamilton; Amar Seeam

Situational Awareness provides a user centric approach to security and privacy. The human factor is often recognised as the weakest link in security, therefore situational perception and risk awareness play a leading role in the adoption and implementation of security mechanisms. In this study we assess the understanding of security and privacy of users in possession of wearable devices. The findings demonstrate privacy complacency, as the majority of users trust the application and the wearable device manufacturer. Moreover the survey findings demonstrate a lack of understanding of security and privacy by the sample population. Finally the theoretical implications of the findings are discussed. Keyword: Situational Awareness, eHealth, Wearables, Security, Privacy,


integrated network management | 2015

Data remanence and digital forensic investigation for CUDA Graphics Processing Units

Xavier J. A. Bellekens; James Irvine; Christos Tachtatzis; Robert C. Atkinson; Tony Kirkham; Craig Renfrew

This paper investigates the practicality of memory attacks on commercial Graphics Processing Units (GPUs). With recent advances in the performance and viability of using GPUs for various highly-parallelised data processing tasks, a number of security challenges are raised. Unscrupulous software running subsequently on the same GPU, either by the same user, or another user, in a multi-user system, may be able to gain access to the contents of the GPU memory. This contains data from previous program executions. In certain use-cases, where the GPU is used to offload intensive parallel processing such as pattern matching for an intrusion detection system, financial systems, or cryptographic algorithms, it may be possible for the GPU memory to contain privileged data, which would ordinarily be inaccessible to an unprivileged application running on the host computer. With GPUs potentially yielding access to confidential information, existing research in the field is built upon, to investigate the practicality of extracting data from global, shared and texture memory, and retrieving this data for further analysis. These techniques are also implemented on various GPUs using three different Nvidia CUDA versions. A novel methodology for digital forensic examination of GPU memory for remanent data is then proposed, along with some suggestions and considerations towards countermeasures and anti-forensic techniques.


availability, reliability and security | 2017

Machine Learning Approach for Detection of nonTor Traffic

Elike Hodo; Xavier J. A. Bellekens; Ephraim Iorkyase; Andrew Hamilton; Christos Tachtatzis; Robert C. Atkinson

Intrusion detection has attracted a considerable interest from researchers and industries. After many years of research the community still faces the problem of building reliable and efficient intrusion detection systems (IDS) capable of handling large quantities of data with changing patterns in real time situations. The Tor network is popular in providing privacy and security to end user by anonymising the identity of internet users connecting through a series of tunnels and nodes. This work focuses on the classification of Tor traffic and nonTor traffic to expose the activities within Tor traffic that minimizes the protection of users. A study to compare the reliability and efficiency of Artificial Neural Network and Support vector machine in detecting nonTor traffic in UNB-CIC Tor Network Traffic dataset is presented in this paper. The results are analysed based on the overall accuracy, detection rate and false positive rate of the two algorithms. Experimental results show that both algorithms could detect nonTor traffic in the dataset. A hybrid Artificial neural network proved a better classifier than SVM in detecting nonTor traffic in UNB-CIC Tor Network Traffic dataset.


2017 1st International Conference on Next Generation Computing Applications (NextComp) | 2017

Critical patient eHealth monitoring system using wearable sensors

Michelle Omoogun; Visham Ramsurrun; Shivanand Prabhoolall Guness; Preetila Seeam; Xavier J. A. Bellekens; Amar Seeam

Patient monitoring has advanced over the years, from bed side monitors in the hospital, to wearable devices that can monitor patients and communicate their data remotely to medical servers over wireless networks. It is a process that involves monitoring major vital signs of a patient, to check if their health is normal or deteriorating within a period of time. In a remote situation, vital signs information, can help health care providers to easily send help to patients when their health is at immediate risk. The problem with this kind of remote monitoring system is that most times the patients must be within a specified location to either monitor their health or receive emergency help. This paper presents a potential solution in the form of a global vital sign monitoring system and consists of two components to demonstrate the functionality; a wearable wireless monitoring device that records the temperature and pulse rate of the patient wearing it and a web application, which allows the patient and the emergency response unit to interact together over cellular network.


security of information and networks | 2016

Strategies for Protecting Intellectual Property when Using CUDA Applications on Graphics Processing Units

Xavier J. A. Bellekens; Christos Tachtatzis; James Irvine; Robert C. Atkinson

Recent advances in the massively parallel computational abilities of graphical processing units (GPUs) have increased their use for general purpose computation, as companies look to take advantage of big data processing techniques. This has given rise to the potential for malicious software targeting GPUs, which is of interest to forensic investigators examining the operation of software. The ability to carry out reverse-engineering of software is of great importance within the security and forensics fields, particularly when investigating malicious software or carrying out forensic analysis following a successful security breach. Due to the complexity of the Nvidia CUDA (Compute Unified Device Architecture) framework, it is not clear how best to approach the reverse engineering of a piece of CUDA software. We carry out a review of the different binary output formats which may be encountered from the CUDA compiler, and their implications on reverse engineering. We then demonstrate the process of carrying out disassembly of an example CUDA application, to establish the various techniques available to forensic investigators carrying out black-box disassembly and reverse engineering of CUDA binaries. We show that the Nvidia compiler, using default settings, leaks useful information. Finally, we demonstrate techniques to better protect intellectual property in CUDA algorithm implementations from reverse engineering.


Information-an International Interdisciplinary Journal | 2018

CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives

Gregory Hill; Xavier J. A. Bellekens

Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased. Reverse engineering potentially malicious software is a cumbersome task due to platform eccentricities and obfuscated transmutation mechanisms, hence requiring smarter, more efficient detection strategies. The following manuscript presents a novel approach for the classification of cryptographic primitives in compiled binary executables using deep learning. The model blueprint, a Dynamic Convolutional Neural Network (DCNN), is fittingly configured to learn from variable-length control flow diagnostics output from a dynamic trace. To rival the size and variability of equivalent datasets, and to adequately train our model without risking adverse exposure, a methodology for the procedural generation of synthetic cryptographic binaries is defined, using core primitives from OpenSSL with multivariate obfuscation, to draw a vastly scalable distribution. The library, CryptoKnight, rendered an algorithmic pool of AES, RC4, Blowfish, MD5 and RSA to synthesise combinable variants which automatically fed into its core model. Converging at 96% accuracy, CryptoKnight was successfully able to classify the sample pool with minimal loss and correctly identified the algorithm in a real-world crypto-ransomware application.


2017 International Conference on Cyber Security And Protection Of Digital Services (Cyber Security) | 2017

When eHealth meets the internet of things: Pervasive security and privacy challenges

Michelle Omoogun; Preetila Seeam; Visham Ramsurrun; Xavier J. A. Bellekens; Amar Seeam

eHealth mobile technologies are becoming increasingly prevalent in both the personal and medical world, assisting healthcare professionals to monitor the progress and current condition of patients. These devices often gather, transmit and analyse personal data. Healthcare data has rigid requirements for security, confidentiality, and availability, whilst access traceability and control, and long-term preservation are also highly desirable, particularly when exposed to cloud computing environments. This article explores some of the security and privacy challenges eHealth devices currently face. Legislative implications of data breaches are considered, as well as service provider accountability. The work also provides numerous security and privacy recommendations, in order to improve future implementations.

Collaboration


Dive into the Xavier J. A. Bellekens's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Andrew Hamilton

University of Strathclyde

View shared research outputs
Top Co-Authors

Avatar

Elike Hodo

University of Strathclyde

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge