Imperial College London

Professor Christopher Hankin Director, Institute for Security Science and Technology

Faculty of EngineeringDepartment of Computing

Director, Institute for Security Science & Techn
 
 
 
//

Contact

 

+44 (0)20 7594 7619c.hankin Website

 
 
//

Assistant

 

Ms Denise McGurk +44 (0)20 7594 8864

 
//

Location

 

Sherfield BuildingSouth Kensington Campus

//

Summary

 

Publications

Publication Type
Year
to

118 results found

Fielder A, Li T, Hankin C, Defense-in-depth vs. Critical Component Defense for Industrial Control Systems, International Symposium for ICS & SCADA Cyber Security

Originally designed as self-contained and isolated networks, Industrial Control Systems (ICS) have evolved tobecome increasingly interconnected with IT systems and other wider networks and services, which enablescyber attacks to sabotage the normal operation of ICS. This paper proposes a simulation of attackers anddefenders, who have limited resources that must be applied to either advancing the technology they haveavailable to them or attempting to attack (defend) the system. The objective is to identify the appropriatedeployment of specific defensive strategy, such as Defense-in-depth and Critical Component Defense.The problem is represented as a strategic competitive optimisation problem, which is solved using a coevolutionaryParticle Swarm Optimisation problem. Through the development of optimal defense strategies,it is possible to identify when each specific defensive strategies is most appropriate; where the optimaldefensive strategy depends on the kind of attacker the system is expecting and the structure of the network.

CONFERENCE PAPER

Li T, Hankin C, Effective Defence Against Zero-Day Exploits Using Bayesian Networks, The 11th International Conference on Critical Information Infrastructures Security

CONFERENCE PAPER

Kodagoda N, Pontis S, Simmie D, Attfield S, Wong BLW, Blandford A, Hankin Cet al., 2017, Using Machine Learning to Infer Reasoning Provenance from User Interaction Log Data, Journal of Cognitive Engineering and Decision Making, Vol: 11, Pages: 23-41, ISSN: 1555-3434

JOURNAL ARTICLE

Martin G, Kinross J, Hankin C, 2017, Effective cybersecurity is fundamental to patient safety, BMJ-BRITISH MEDICAL JOURNAL, Vol: 357, ISSN: 1756-1833

JOURNAL ARTICLE

Martin G, Martin P, Hankin C, Darzi A, Kinross Jet al., 2017, Cybersecurity and healthcare: how safe are we?, BMJ, Vol: 358

JOURNAL ARTICLE

Fielder A, Li T, Hankin C, 2016, Modelling cost-effectiveness of defenses in industrial control systems, Pages: 187-200, ISSN: 0302-9743

© Springer International Publishing Switzerland 2016. Industrial Control Systems (ICS) play a critical role in controlling industrial processes. Wide use of modern IT technologies enables cyber attacks to disrupt the operation of ICS. Advanced Persistent Threats (APT) are the most threatening attacks to ICS due to their long persistence and destructive cyber-physical effects to ICS. This paper considers a simulation of attackers and defenders of an ICS, where the defender must consider the cost-effectiveness of implementing defensive measures within the system in order to create an optimal defense. The aim is to identify the appropriate deployment of a specific defensive strategy, such as defense-in-depth or critical component defense. The problem is represented as a strategic competitive optimisation problem, which is solved using a co-evolutionary particle swarm optimisation algorithm. Through the development of optimal defense strategy, it is possible to identify when each specific defensive strategies is most appropriate; where the optimal defensive strategy depends on the resources available and the relative effectiveness of those resources.

CONFERENCE PAPER

Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi Fet al., 2016, Decision support approaches for cyber security investment, DECISION SUPPORT SYSTEMS, Vol: 86, Pages: 13-23, ISSN: 0167-9236

JOURNAL ARTICLE

Hankin C, 2016, Game Theory and Industrial Control Systems, Editors: Probst, Hankin, Hansen, Publisher: SPRINGER INT PUBLISHING AG, Pages: 178-190, ISBN: 978-3-319-27809-4

BOOK CHAPTER

Khouzani MHR, Malacaria P, Hankin C, Fielder A, Smeraldi Fet al., 2016, Efficient Numerical Frameworks for Multi-objective Cyber Security Planning, 21st European Symposium on Research in Computer Security (ESORICS), Publisher: SPRINGER INT PUBLISHING AG, Pages: 179-197, ISSN: 0302-9743

CONFERENCE PAPER

Thapen N, Simmie D, Hankin C, 2016, The early bird catches the term: combining twitter and news data for event detection and situational awareness, JOURNAL OF BIOMEDICAL SEMANTICS, Vol: 7, ISSN: 2041-1480

JOURNAL ARTICLE

Thapen N, Simmie D, Hankin C, Gillard Jet al., 2016, DEFENDER: Detecting and Forecasting Epidemics Using Novel Data-Analytics for Enhanced Response, PLOS ONE, Vol: 11, ISSN: 1932-6203

JOURNAL ARTICLE

Fielder A, Panaousis EA, Malacaria P, Hankin C, Smeraldi Fet al., 2015, Comparing Decision Support Approaches for Cyber Security Investment., CoRR, Vol: abs/1502.05532

JOURNAL ARTICLE

Li T, Hankin C, 2015, A Model-based Approach to Interdependency between Safety and Security in ICS., Publisher: BCS

CONFERENCE PAPER

Vigliotti MG, Hankin C, 2015, Discovery of anomalous behaviour in temporal networks, SOCIAL NETWORKS, Vol: 41, Pages: 18-25, ISSN: 0378-8733

JOURNAL ARTICLE

Fielder A, Panaousis E, Malacaria P, Hankin C, Smeraldi Fet al., 2014, Game Theory Meets Information Security Management, ICT SYSTEMS SECURITY AND PRIVACY PROTECTION, IFIP TC 11 INTERNATIONAL CONFERENCE, SEC 2014, Vol: 428, Pages: 15-29, ISSN: 1868-4238

JOURNAL ARTICLE

Le Martelot E, Hankin C, 2014, Fast multi-scale detection of overlapping communities using local criteria, COMPUTING, Vol: 96, Pages: 1011-1027, ISSN: 0010-485X

JOURNAL ARTICLE

Panaousis E, Fielder A, Malacaria P, Hankin C, Smeraldi Fet al., 2014, Cybersecurity Games and Investments: A Decision Support Approach, DECISION AND GAME THEORY FOR SECURITY, GAMESEC 2014, Vol: 8840, Pages: 266-286, ISSN: 0302-9743

JOURNAL ARTICLE

Simmie D, Vigliotti MG, Hankin C, 2014, Ranking twitter influence by combining network centrality and influence observables in an evolutionary model, Journal of Complex Networks, Vol: 2, Pages: 495-517, ISSN: 2051-1310

JOURNAL ARTICLE

Hankin C, 2013, A short note on Simulation and Abstraction, Electronic Proceedings in Theoretical Computer Science, EPTCS, Vol: 129, Pages: 337-340, ISSN: 2075-2180

JOURNAL ARTICLE

Hankin C, Malacaria P, 2013, Payoffs, intensionality and abstraction in games, Pages: 69-82, ISSN: 0302-9743

CONFERENCE PAPER

Le Martelot E, Hankin C, 2013, Multi-scale community detection using stability optimisation, International Journal of Web Based Communities, Vol: 9, Pages: 323-348, ISSN: 1477-8394

JOURNAL ARTICLE

Le Martelot E, Hankin C, 2013, Fast Multi-Scale Detection of Relevant Communities in Large-Scale Networks, COMPUTER JOURNAL, Vol: 56, Pages: 1136-1150, ISSN: 0010-4620

JOURNAL ARTICLE

Martelot EL, Hankin C, 2013, Fast Multi-Scale Community Detection based on Local Criteria within a Multi-Threaded Algorithm, CoRR, Vol: abs/1301.0955

JOURNAL ARTICLE

Simmie D, Vigliotti MG, Hankin C, 2013, Ranking Twitter Influence by Combining Network Centrality and Influence Observables in an Evolutionary Model, 2013 INTERNATIONAL CONFERENCE ON SIGNAL-IMAGE TECHNOLOGY & INTERNET-BASED SYSTEMS (SITIS), Pages: 486-493

JOURNAL ARTICLE

Yang F, Hankin C, Nielson F, Nielson HRet al., 2013, Predictive access control for distributed computation, SCIENCE OF COMPUTER PROGRAMMING, Vol: 78, Pages: 1264-1277, ISSN: 0167-6423

JOURNAL ARTICLE

Martelot EL, Hankin C, 2012, Fast Multi-Scale Detection of Relevant Communities, CoRR, Vol: abs/1204.1002

JOURNAL ARTICLE

Yang F, Hankin C, Nielson F, Nielson HRet al., 2012, Secondary use of data in EHR systems, CoRR, Vol: abs/1201.4262

JOURNAL ARTICLE

Di Pierro A, Hankin C, Wiklicky H, 2011, Probabilistic timing covert channels: to close or not to close?, INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol: 10, Pages: 83-106, ISSN: 1615-5262

JOURNAL ARTICLE

Di Pierro A, Hankin CL, Wiklicky H, 2011, Probabilistic timing covert channels: To close or not to close, International Journal of Information Security, Vol: 10, Pages: 83-106

JOURNAL ARTICLE

This data is extracted from the Web of Science and reproduced under a licence from Thomson Reuters. You may not copy or re-distribute this data in whole or in part without the written consent of the Science business of Thomson Reuters.

Request URL: http://wlsprd.imperial.ac.uk:80/respub/WEB-INF/jsp/search-html.jsp Request URI: /respub/WEB-INF/jsp/search-html.jsp Query String: respub-action=search.html&id=00002556&limit=30&person=true