Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (12)

Search Parameters:
Authors = Xavier Bellekens ORCID = 0000-0003-1849-5788

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
22 pages, 430 KiB  
Review
Cyber-Security Challenges in Aviation Industry: A Review of Current and Future Trends
by Elochukwu Ukwandu, Mohamed Amine Ben-Farah, Hanan Hindy, Miroslav Bures, Robert Atkinson, Christos Tachtatzis, Ivan Andonovic and Xavier Bellekens
Information 2022, 13(3), 146; https://doi.org/10.3390/info13030146 - 10 Mar 2022
Cited by 60 | Viewed by 47819
Abstract
The integration of Information and Communication Technology (ICT) tools into mechanical devices in routine use within the aviation industry has heightened cyber-security concerns. The extent of the inherent vulnerabilities in the software tools that drive these systems escalates as the level of integration [...] Read more.
The integration of Information and Communication Technology (ICT) tools into mechanical devices in routine use within the aviation industry has heightened cyber-security concerns. The extent of the inherent vulnerabilities in the software tools that drive these systems escalates as the level of integration increases. Moreover, these concerns are becoming even more acute as the migration within the industry in the deployment of electronic-enabled aircraft and smart airports gathers pace. A review of cyber-security attacks and attack surfaces within the aviation sector over the last 20 years provides a mapping of the trends and insights that are of value in informing on future frameworks to protect the evolution of a key industry. The goal is to identify common threat actors, their motivations, attacks types and map the vulnerabilities within aviation infrastructures most commonly subject to persistent attack campaigns. The analyses will enable an improved understanding of both the current and potential future cyber-security protection provisions for the sector. Evidence is provided that the main threats to the industry arise from Advance Persistent Threat (APT) groups that operate, in collaboration with a particular state actor, to steal intellectual property and intelligence in order to advance their domestic aerospace capabilities as well as monitor, infiltrate and subvert other sovereign nations’ capabilities. A segment of the aviation industry commonly attacked is the Information Technology (IT) infrastructure, the most prominent type of attack being malicious hacking with intent to gain unauthorised access. The analysis of the range of attack surfaces and the existing threat dynamics has been used as a foundation to predict future cyber-attack trends. The insights arising from the review will support the future definition and implementation of proactive measures that protect critical infrastructures against cyber-incidents that damage the confidence of customers in a key service-oriented industry. Full article
(This article belongs to the Section Information Security and Privacy)
Show Figures

Figure 1

33 pages, 3265 KiB  
Review
Cyber Security in the Maritime Industry: A Systematic Survey of Recent Advances and Future Trends
by Mohamed Amine Ben Farah, Elochukwu Ukwandu, Hanan Hindy, David Brosset, Miroslav Bures, Ivan Andonovic and Xavier Bellekens
Information 2022, 13(1), 22; https://doi.org/10.3390/info13010022 - 6 Jan 2022
Cited by 92 | Viewed by 33601
Abstract
The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ports. The vulnerabilities of [...] Read more.
The paper presents a classification of cyber attacks within the context of the state of the art in the maritime industry. A systematic categorization of vessel components has been conducted, complemented by an analysis of key services delivered within ports. The vulnerabilities of the Global Navigation Satellite System (GNSS) have been given particular consideration since it is a critical subcategory of many maritime infrastructures and, consequently, a target for cyber attacks. Recent research confirms that the dramatic proliferation of cyber crimes is fueled by increased levels of integration of new enabling technologies, such as IoT and Big Data. The trend to greater systems integration is, however, compelling, yielding significant business value by facilitating the operation of autonomous vessels, greater exploitation of smart ports, a reduction in the level of manpower and a marked improvement in fuel consumption and efficiency of services. Finally, practical challenges and future research trends have been highlighted. Full article
(This article belongs to the Special Issue Cyber-Security for the Maritime Industry)
Show Figures

Figure 1

18 pages, 1526 KiB  
Article
Classification of Cattle Behaviours Using Neck-Mounted Accelerometer-Equipped Collars and Convolutional Neural Networks
by Dejan Pavlovic, Christopher Davison, Andrew Hamilton, Oskar Marko, Robert Atkinson, Craig Michie, Vladimir Crnojević, Ivan Andonovic, Xavier Bellekens and Christos Tachtatzis
Sensors 2021, 21(12), 4050; https://doi.org/10.3390/s21124050 - 12 Jun 2021
Cited by 46 | Viewed by 6451
Abstract
Monitoring cattle behaviour is core to the early detection of health and welfare issues and to optimise the fertility of large herds. Accelerometer-based sensor systems that provide activity profiles are now used extensively on commercial farms and have evolved to identify behaviours such [...] Read more.
Monitoring cattle behaviour is core to the early detection of health and welfare issues and to optimise the fertility of large herds. Accelerometer-based sensor systems that provide activity profiles are now used extensively on commercial farms and have evolved to identify behaviours such as the time spent ruminating and eating at an individual animal level. Acquiring this information at scale is central to informing on-farm management decisions. The paper presents the development of a Convolutional Neural Network (CNN) that classifies cattle behavioural states (‘rumination’, ‘eating’ and ‘other’) using data generated from neck-mounted accelerometer collars. During three farm trials in the United Kingdom (Easter Howgate Farm, Edinburgh, UK), 18 steers were monitored to provide raw acceleration measurements, with ground truth data provided by muzzle-mounted pressure sensor halters. A range of neural network architectures are explored and rigorous hyper-parameter searches are performed to optimise the network. The computational complexity and memory footprint of CNN models are not readily compatible with deployment on low-power processors which are both memory and energy constrained. Thus, progressive reductions of the CNN were executed with minimal loss of performance in order to address the practical implementation challenges, defining the trade-off between model performance versus computation complexity and memory footprint to permit deployment on micro-controller architectures. The proposed methodology achieves a compression of 14.30 compared to the unpruned architecture but is nevertheless able to accurately classify cattle behaviours with an overall F1 score of 0.82 for both FP32 and FP16 precision while achieving a reasonable battery lifetime in excess of 5.7 years. Full article
(This article belongs to the Section Internet of Things)
Show Figures

Figure 1

17 pages, 3658 KiB  
Article
Utilising Flow Aggregation to Classify Benign Imitating Attacks
by Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures and Xavier Bellekens
Sensors 2021, 21(5), 1761; https://doi.org/10.3390/s21051761 - 4 Mar 2021
Cited by 2 | Viewed by 3584
Abstract
Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend [...] Read more.
Cyber-attacks continue to grow, both in terms of volume and sophistication. This is aided by an increase in available computational power, expanding attack surfaces, and advancements in the human understanding of how to make attacks undetectable. Unsurprisingly, machine learning is utilised to defend against these attacks. In many applications, the choice of features is more important than the choice of model. A range of studies have, with varying degrees of success, attempted to discriminate between benign traffic and well-known cyber-attacks. The features used in these studies are broadly similar and have demonstrated their effectiveness in situations where cyber-attacks do not imitate benign behaviour. To overcome this barrier, in this manuscript, we introduce new features based on a higher level of abstraction of network traffic. Specifically, we perform flow aggregation by grouping flows with similarities. This additional level of feature abstraction benefits from cumulative information, thus qualifying the models to classify cyber-attacks that mimic benign traffic. The performance of the new features is evaluated using the benchmark CICIDS2017 dataset, and the results demonstrate their validity and effectiveness. This novel proposal will improve the detection accuracy of cyber-attacks and also build towards a new direction of feature extraction for complex ones. Full article
(This article belongs to the Special Issue Security and Privacy in the Internet of Things (IoT))
Show Figures

Figure 1

19 pages, 3788 KiB  
Article
Composite Laminate Delamination Detection Using Transient Thermal Conduction Profiles and Machine Learning Based Data Analysis
by David I. Gillespie, Andrew W. Hamilton, Robert C. Atkinson, Xavier Bellekens, Craig Michie, Ivan Andonovic and Christos Tachtatzis
Sensors 2020, 20(24), 7227; https://doi.org/10.3390/s20247227 - 17 Dec 2020
Cited by 6 | Viewed by 3228
Abstract
Delaminations within aerospace composites are of particular concern, presenting within composite laminate structures without visible surface indications. Transmission based thermography techniques using contact temperature sensors and surface mounted heat sources are able to detect reductions in thermal conductivity and in turn impact damage [...] Read more.
Delaminations within aerospace composites are of particular concern, presenting within composite laminate structures without visible surface indications. Transmission based thermography techniques using contact temperature sensors and surface mounted heat sources are able to detect reductions in thermal conductivity and in turn impact damage and large disbonds can be detected. However delaminations between Carbon Fibre Reinforced Polymer (CFRP) plies are not immediately discoverable using the technique. The use of transient thermal conduction profiles induced from zonal heating of a CFRP laminate to ascertain inter-laminate differences has been demonstrated and the paper builds on this method further by investigating the impact of inter laminate inclusions, in the form of delaminations, to the transient thermal conduction profile of multi-ply bi-axial CFRP laminates. Results demonstrate that as the distance between centre of the heat source and delamination increase, whilst maintaining the delamination within the heated area, the resultant transient thermal conduction profile is measurably different to that of a homogeneous region at the same distance. The method utilises a supervised Support Vector Classification (SVC) algorithm to detect delaminations using temperature data from either the edge of the defect or the centre during a 140 s ramped heating period to 80 °C. An F1 score in the classification of delaminations or no delamination at an overall accuracy of over 99% in both training and with test data separate from the training process has been achieved using data points effected by transient thermal conduction due to structural dissipation at 56.25 mm. Full article
(This article belongs to the Special Issue Damage Detection Systems for Aerospace Applications)
Show Figures

Figure 1

35 pages, 864 KiB  
Review
A Review of Cyber-Ranges and Test-Beds: Current and Future Trends
by Elochukwu Ukwandu, Mohamed Amine Ben Farah, Hanan Hindy, David Brosset, Dimitris Kavallieros, Robert Atkinson, Christos Tachtatzis, Miroslav Bures, Ivan Andonovic and Xavier Bellekens
Sensors 2020, 20(24), 7148; https://doi.org/10.3390/s20247148 - 13 Dec 2020
Cited by 77 | Viewed by 13967
Abstract
Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the [...] Read more.
Cyber situational awareness has been proven to be of value in forming a comprehensive understanding of threats and vulnerabilities within organisations, as the degree of exposure is governed by the prevailing levels of cyber-hygiene and established processes. A more accurate assessment of the security provision informs on the most vulnerable environments that necessitate more diligent management. The rapid proliferation in the automation of cyber-attacks is reducing the gap between information and operational technologies and the need to review the current levels of robustness against new sophisticated cyber-attacks, trends, technologies and mitigation countermeasures has become pressing. A deeper characterisation is also the basis with which to predict future vulnerabilities in turn guiding the most appropriate deployment technologies. Thus, refreshing established practices and the scope of the training to support the decision making of users and operators. The foundation of the training provision is the use of Cyber-Ranges (CRs) and Test-Beds (TBs), platforms/tools that help inculcate a deeper understanding of the evolution of an attack and the methodology to deploy the most impactful countermeasures to arrest breaches. In this paper, an evaluation of documented CRs and TBs platforms is evaluated. CRs and TBs are segmented by type, technology, threat scenarios, applications and the scope of attainable training. To enrich the analysis of documented CRs and TBs research and cap the study, a taxonomy is developed to provide a broader comprehension of the future of CRs and TBs. The taxonomy elaborates on the CRs/TBs dimensions, as well as, highlighting a diminishing differentiation between application areas. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

13 pages, 596 KiB  
Letter
Defect Detection in Aerospace Sandwich Composite Panels Using Conductive Thermography and Contact Sensors
by David I. Gillespie, Andrew W. Hamilton, Robert C. Atkinson, Xavier Bellekens, Craig Michie, Ivan Andonovic and Christos Tachtatzis
Sensors 2020, 20(22), 6689; https://doi.org/10.3390/s20226689 - 23 Nov 2020
Cited by 12 | Viewed by 3587
Abstract
Sandwich panels consisting of two Carbon Fibre Reinforced Polymer (CFRP) outer skins and an aluminium honeycomb core are a common structure of surfaces on commercial aircraft due to the beneficial strength–weight ratio. Mechanical defects such as a crushed honeycomb core, dis-bonds and delaminations [...] Read more.
Sandwich panels consisting of two Carbon Fibre Reinforced Polymer (CFRP) outer skins and an aluminium honeycomb core are a common structure of surfaces on commercial aircraft due to the beneficial strength–weight ratio. Mechanical defects such as a crushed honeycomb core, dis-bonds and delaminations in the outer skins and in the core occur routinely under normal use and are repaired during aerospace Maintenance, Repair and Overhaul (MRO) processes. Current practices rely heavily on manual inspection where it is possible minor defects are not identified prior to primary repair and are only addressed after initial repairs intensify the defects due to thermal expansion during high temperature curing. This paper reports on the development and characterisation of a technique based on conductive thermography implemented using an array of single point temperature sensors mounted on one surface of the panel and the concomitant induced thermal profile generated by a thermal stimulus on the opposing surface to identify such defects. Defects are classified by analysing the differential conduction of thermal energy profiles across the surface of the panel. Results indicate that crushed core and impact damage are detectable using a stepped temperature profile of 80 C The method is amenable to integration within the existing drying cycle stage and reduces the costs of executing the overall process in terms of time-to-repair and manual effort. Full article
(This article belongs to the Special Issue Damage Detection Systems for Aerospace Applications)
Show Figures

Figure 1

16 pages, 519 KiB  
Article
Utilising Deep Learning Techniques for Effective Zero-Day Attack Detection
by Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Jean-Noël Colin, Ethan Bayne and Xavier Bellekens
Electronics 2020, 9(10), 1684; https://doi.org/10.3390/electronics9101684 - 14 Oct 2020
Cited by 145 | Viewed by 14954
Abstract
Machine Learning (ML) and Deep Learning (DL) have been used for building Intrusion Detection Systems (IDS). The increase in both the number and sheer variety of new cyber-attacks poses a tremendous challenge for IDS solutions that rely on a database of historical attack [...] Read more.
Machine Learning (ML) and Deep Learning (DL) have been used for building Intrusion Detection Systems (IDS). The increase in both the number and sheer variety of new cyber-attacks poses a tremendous challenge for IDS solutions that rely on a database of historical attack signatures. Therefore, the industrial pull for robust IDSs that are capable of flagging zero-day attacks is growing. Current outlier-based zero-day detection research suffers from high false-negative rates, thus limiting their practical use and performance. This paper proposes an autoencoder implementation for detecting zero-day attacks. The aim is to build an IDS model with high recall while keeping the miss rate (false-negatives) to an acceptable minimum. Two well-known IDS datasets are used for evaluation—CICIDS2017 and NSL-KDD. In order to demonstrate the efficacy of our model, we compare its results against a One-Class Support Vector Machine (SVM). The manuscript highlights the performance of a One-Class SVM when zero-day attacks are distinctive from normal behaviour. The proposed model benefits greatly from autoencoders encoding-decoding capabilities. The results show that autoencoders are well-suited at detecting complex zero-day attacks. The results demonstrate a zero-day detection accuracy of 89–99% for the NSL-KDD dataset and 75–98% for the CICIDS2017 dataset. Finally, the paper outlines the observed trade-off between recall and fallout. Full article
(This article belongs to the Special Issue Advanced Cybersecurity Services Design)
Show Figures

Figure 1

15 pages, 7830 KiB  
Article
Automatic Annotation of Subsea Pipelines Using Deep Learning
by Anastasios Stamoulakatos, Javier Cardona, Chris McCaig, David Murray, Hein Filius, Robert Atkinson, Xavier Bellekens, Craig Michie, Ivan Andonovic, Pavlos Lazaridis, Andrew Hamilton, Md Moinul Hossain, Gaetano Di Caterina and Christos Tachtatzis
Sensors 2020, 20(3), 674; https://doi.org/10.3390/s20030674 - 26 Jan 2020
Cited by 20 | Viewed by 6627
Abstract
Regulatory requirements for sub-sea oil and gas operators mandates the frequent inspection of pipeline assets to ensure that their degradation and damage are maintained at acceptable levels. The inspection process is usually sub-contracted to surveyors who utilize sub-sea Remotely Operated Vehicles (ROVs), launched [...] Read more.
Regulatory requirements for sub-sea oil and gas operators mandates the frequent inspection of pipeline assets to ensure that their degradation and damage are maintained at acceptable levels. The inspection process is usually sub-contracted to surveyors who utilize sub-sea Remotely Operated Vehicles (ROVs), launched from a surface vessel and piloted over the pipeline. ROVs capture data from various sensors/instruments which are subsequently reviewed and interpreted by human operators, creating a log of event annotations; a slow, labor-intensive and costly process. The paper presents an automatic image annotation framework that identifies/classifies key events of interest in the video footage viz. exposure, burial, field joints, anodes, and free spans. The reported methodology utilizes transfer learning with a Deep Convolutional Neural Network (ResNet-50), fine-tuned on real-life, representative data from challenging sub-sea environments with low lighting conditions, sand agitation, sea-life and vegetation. The network outputs are configured to perform multi-label image classifications for critical events. The annotation performance varies between 95.1% and 99.7% in terms of accuracy and 90.4% and 99.4% in terms of F1-Score depending on event type. The performance results are on a per-frame basis and corroborate the potential of the algorithm to be the foundation for an intelligent decision support framework that automates the annotation process. The solution can execute annotations in real-time and is significantly more cost-effective than human-only approaches. Full article
(This article belongs to the Special Issue Imaging Sensor Systems for Analyzing Subsea Environment and Life)
Show Figures

Figure 1

20 pages, 515 KiB  
Article
Mayall: A Framework for Desktop JavaScript Auditing and Post-Exploitation Analysis
by Adam Rapley, Xavier Bellekens, Lynsay A. Shepherd and Colin McLean
Informatics 2018, 5(4), 46; https://doi.org/10.3390/informatics5040046 - 17 Dec 2018
Cited by 1 | Viewed by 9940
Abstract
Writing desktop applications in JavaScript offers developers the opportunity to create cross-platform applications with cutting-edge capabilities. However, in doing so, they are potentially submitting their code to a number of unsanctioned modifications from malicious actors. Electron is one such JavaScript application framework which [...] Read more.
Writing desktop applications in JavaScript offers developers the opportunity to create cross-platform applications with cutting-edge capabilities. However, in doing so, they are potentially submitting their code to a number of unsanctioned modifications from malicious actors. Electron is one such JavaScript application framework which facilitates this multi-platform out-the-box paradigm and is based upon the Node.js JavaScript runtime—an increasingly popular server-side technology. By bringing this technology to the client-side environment, previously unrealized risks are exposed to users due to the powerful system programming interface that Node.js exposes. In a concerted effort to highlight previously unexposed risks in these rapidly expanding frameworks, this paper presents the Mayall Framework, an extensible toolkit aimed at JavaScript security auditing and post-exploitation analysis. This paper also exposes fifteen highly popular Electron applications and demonstrates that two-thirds of applications were found to be using known vulnerable elements with high CVSS (Common Vulnerability Scoring System) scores. Moreover, this paper discloses a wide-reaching and overlooked vulnerability within the Electron Framework which is a direct byproduct of shipping the runtime unaltered with each application, allowing malicious actors to modify source code and inject covert malware inside verified and signed applications without restriction. Finally, a number of injection vectors are explored and appropriate remediations are proposed. Full article
Show Figures

Figure 1

15 pages, 411 KiB  
Article
CryptoKnight: Generating and Modelling Compiled Cryptographic Primitives
by Gregory Hill and Xavier Bellekens
Information 2018, 9(9), 231; https://doi.org/10.3390/info9090231 - 10 Sep 2018
Cited by 9 | Viewed by 8668
Abstract
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased. Reverse engineering potentially malicious software is a [...] Read more.
Cryptovirological augmentations present an immediate, incomparable threat. Over the last decade, the substantial proliferation of crypto-ransomware has had widespread consequences for consumers and organisations alike. Established preventive measures perform well, however, the problem has not ceased. Reverse engineering potentially malicious software is a cumbersome task due to platform eccentricities and obfuscated transmutation mechanisms, hence requiring smarter, more efficient detection strategies. The following manuscript presents a novel approach for the classification of cryptographic primitives in compiled binary executables using deep learning. The model blueprint, a Dynamic Convolutional Neural Network (DCNN), is fittingly configured to learn from variable-length control flow diagnostics output from a dynamic trace. To rival the size and variability of equivalent datasets, and to adequately train our model without risking adverse exposure, a methodology for the procedural generation of synthetic cryptographic binaries is defined, using core primitives from OpenSSL with multivariate obfuscation, to draw a vastly scalable distribution. The library, CryptoKnight, rendered an algorithmic pool of AES, RC4, Blowfish, MD5 and RSA to synthesise combinable variants which automatically fed into its core model. Converging at 96% accuracy, CryptoKnight was successfully able to classify the sample pool with minimal loss and correctly identified the algorithm in a real-world crypto-ransomware application. Full article
Show Figures

Figure 1

21 pages, 1810 KiB  
Article
Creation and Detection of Hardware Trojans Using Non-Invasive Off-The-Shelf Technologies
by Catherine Rooney, Amar Seeam and Xavier Bellekens
Electronics 2018, 7(7), 124; https://doi.org/10.3390/electronics7070124 - 22 Jul 2018
Cited by 26 | Viewed by 8209
Abstract
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of [...] Read more.
As a result of the globalisation of the semiconductor design and fabrication processes, integrated circuits are becoming increasingly vulnerable to malicious attacks. The most concerning threats are hardware trojans. A hardware trojan is a malicious inclusion or alteration to the existing design of an integrated circuit, with the possible effects ranging from leakage of sensitive information to the complete destruction of the integrated circuit itself. While the majority of existing detection schemes focus on test-time, they all require expensive methodologies to detect hardware trojans. Off-the-shelf approaches have often been overlooked due to limited hardware resources and detection accuracy. With the advances in technologies and the democratisation of open-source hardware, however, these tools enable the detection of hardware trojans at reduced costs during or after production. In this manuscript, a hardware trojan is created and emulated on a consumer FPGA board. The experiments to detect the trojan in a dormant and active state are made using off-the-shelf technologies taking advantage of different techniques such as Power Analysis Reports, Side Channel Analysis and Thermal Measurements. Furthermore, multiple attempts to detect the trojan are demonstrated and benchmarked. Our simulations result in a state-of-the-art methodology to accurately detect the trojan in both dormant and active states using off-the-shelf hardware. Full article
(This article belongs to the Special Issue Open-Source Electronics Platforms: Development and Applications)
Show Figures

Figure 1

Back to TopTop