CUEH - Research Areas

We are currently working on extending these pages with more information on current projects, potential studentships and more.

For now, we present a few of the areas in which we are working or have an interest.

Security protocol analysis, modelling and testing protocols using process algebras and symbolic logic, enhancing automated theorem provers, quantum cryptography, low power cryptography, abstract modelling of network management architectures.
IPv6 security issues, issues surrounding IPv6 adoption and assimilation and the use of IPv6 in internet of things (IoT) applications
The forensic capture and analysis of network traffic, log files and data aggregated from multiple sources using data mining techniques.
Security and privacy in systems that aggregate data, particularly recommender systems. For example, eccentric users (users with unusual ratings, preferences as well as purchase and search history) are at a higher risk compared to average users, as they cannot hide in crowds of other users. There is therefore an inherent need to investigate the trade-off between utility and privacy in recommendation algorithms.
Processing in-network traffic of Internet of Things devices to improve efficiency and security. This includes the encoding data to increase security or transmission efficiency, the security of wireless communication (particularly in sensor networks), security issues resulting from networks of abundant embedded systems (IoT) and the construction compromised data-streams from sensing devices.
The trade-off between encryption strength and energy consumption. Stochastic and statistical methods can be used to examine this balance with an aim of developing a framework which can be used to adjust dynamically the level of security or energy consumption, either according to the energy limitations or the severity of the requested service.
Security issues and opportunities in software defined networking, particularly around new ways to model network interaction and enhancing network monitoring; and developing the ability for SDNs to reconfigure in order to protect the network infrastructure and devices.
Methods of generating regular expressions suitable for evolving forensic requirements that allow thorough examination of evidential data.
Mobile Devices Security. While existing Intrusion Detection Systems (IDS) are relatively effective in protecting main frame machines, servers and desktops, they are relatively inadequate when deployed on mobile devices which run in different and changing environments, requiring a fundamentally different approach in security analytics.
Intelligent Intrusion Detection Systems (iIDS). Developing Deep Learning models for adaptive Intrusion Detection/Prevention Systems. iIDS will be capable of learning from normal user behaviour, successful and unsuccessful hacking attacks and security policy violations as well as be able to adapt to new user/hacker behaviour and partially also to new environments.
Open Source Intelligence (OSINT) in Incident Response and Forensic investigation: Applying Artificial Intelligence models in analysing social media and other Internet content in Incident response and forensics, with an emphasis on applying Machine learning models in analysing language and image data in order to identify and collect relevant factual information related to specific incident/location/objects/people.