A list of books, book chapters, academic paper and research contributions is provided below.
Books and contributing chapters
Book: 'Applications of machine Learning in Cybersecurity'
Author: Tony Kenyon | Published: ~2020 | ~450 pages
This is a work in progress. It covers hybrid machine learning techniques in improving threat detection in cyber security. Also covers behavioural profiling, reviews public intrusion datasets and the use of discrete event simulation and live flow traces. Includes in depth material on new applications of deep learning, as well as best practice for optimising feature extraction, identifying sensitivities, and training techniques. The accompanying code is written in Go and Python.
Chapter 5: 'Privacy & Cyberecurity', in 'Transportation Cyber-Physical Systems'. 1st Ed
Author: Tony Kenyon | Published: Jul 2018 | Elsevier | pages 115-151.
Paperback ISBN: 9780128142950 | 348 pages
Editors: Lipika Deka | Mashrur Chowdhury
Contributing chapter on cybersecurity and privacy as part of a larger engineering & research text on Transportation Cyber Physical Systems (TCPS). This covers the current state of research, threats & vulnerabilities, and challenges in securing transportation cyber physical systems. A collaboration between the Faculty of Technology at De Montfort University (UK) and Clemson University, South Carolina (USA). Aimed at researchers, graduate students, and practitioners. You can find more details on the book here and the chapter is available on Science Direct here
Chapter: 'Messaging Standards', in 'MSDN Architecture 101' Author: Tony Kenyon | Published: Feb 2008 | Microsoft MSDN | 10 pages
Authored the chapter on messaging standards. Provides a high level introduction to messaging standards, history, standards bodies, and guidance on how to approach architectural design decisions when there are multiple open and de-facto standards to choose from. Available here
Book: 'Data Networks, Routing, Security and Performance Optimisation' Author: Tony Kenyon | Published: Jan 2002 | Elsevier | 806 pages
Covers where 'High Performance Data Network Design' left off; describes higher layer protocols such MPLS, and covers security concerns such as PKI and VPNs, as well as performance techniques such as queueing and caching. Aimed at researchers, graduate students, and practitioners. For details see here
Book: 'High Performance Data Network Design' Author: Tony Kenyon | Published: Jan 2002 | Elsevier | 480 pages
Covers large-scale network design from project planning, requirements gathering through to traffic profiling, topology modelling, wide area service cost modelling, and network optimisation techniques. Aimed at researchers, graduate students, and practitioners. For details see here.
'TCP/IP - The Ultimate Protocol Guide' (2009)
'LAN Technologies Explained' (2000)
'TCP/IP Explained' (1997)
Author: Philip Miller | Digital Press
In these excellent books Phil used the MicroScope multi-protocol analysis tool I developed to decode packet trace details and protocol state for a wide range of LAN and WAN protocols (including TCP/IP, ARP, BOOTP, SMTP, SNMP, FTP, OSPF, EGP, BGP, PPP, X25, Frame Relay etc.). You can find more details on Amazon.
Papers and research study contributions
Kenyon, Deka, L., T., Elizondo, D., 2019. "Are Public Intrusion Datasets fit for Purpose?" Reviews the state of the art in public datasets and their utility for anomaly detection and intrusion detection analysis. Includes summary details and analysis of over 24 public datasets. Awaiting publication
EOS Study Group, Contributor, Jan 2015. "EOS Strategic Initiative on “Cybersecurity for a trusted EU Digital Single Market” : extended public summary of an EOS Market Study for an EU Cybersecurity Flagship Programme. Analyses national strategies and competences of major industrial and research actors across Europe. Examines cybersecurity, cybercrime and cyberterrorism, covering issues linked to Privacy, Trust, Risk Management and Information Sharing in cyberspace. Analyses security & privacy challenges in the global and European market, together with opportunities for Europe to move towards an increasingly digital autonomy. Available as a PDF file here.
Kenyon, T., Khuman, A., Carter, J., 2014. "DDoS Threat Detection and Modelling: Trends and Challenges in Detecting and Simulating DDoS Attacks" Reviews the state of research in protocol anomaly detection and the results from a simulation framework I designed using feedforward NNs and SOMs as classifiers. Based on initial feedback from conferences the plan was to extend this for publication (I doubt I will get around to this as I extended this work significantly for my master's thesis, nevertheless it's a useful reference point).
Kenyon, T., 2013. "The role of ADCs within secure application delivery". Network Security, 2013(9), pp.8-12. Elsevier. Describes how Application Delivery Controllers (ADCs) are today being used to improve the performance and security posture of high availability web clusters, through deep packet inspection (DPI), web application firewall (WAF), and DDOS mitigation. Available here.