Back to Top

Whitepapers

CUDA & GPU FOR SECURITY & FORENSICS - pdf

This article must hold the world record for the longest time taken to write. Let me explain, in 2008, flushed with success; I had just designed/innovated a cyber security probe that had been incredibly successful. It had out performed anything on the market at that time because it used special custom hardware in conjunction with a normal Intel based CPU, the special sauce in this combination was a cooperative processing model where the Pentium CPU worked in parallel with the FPGA custom hardware. The CPU instructed the FPGA to make certain calculations and apply certain filters not statically according to some arcane policy but dynamically as processing continued. I won’t be as bold to suggest it was AI, it certainly wasn’t but it could do very necessary things that other products still struggle to do.

IDS - Are they catching hackers or just script-kiddies?? - pdf

"Instead of moaning about it, why don't you do something about it?" snapped one of my penetration testers, as he sprinted out of the office with a handful of bizarrely configured Linux laptops. The conflict, as ever, had been born out of good intentions. He and his team of nearly house broken pentesters, of which I had been a founding member (before hair loss followed by a related credibility loss forced me to re-spe- cialise), had broken into another organisation. That should be good news. Unfortunately, the client had spent lots of money on an Intrusion Detection System (IDS) which had dutifully alerted them to every attack we launched, excepted the one that actually worked and got us in. The manager at our client was furious - with us, which was a real case of shooting the messenger.

SETTING STORE ON NEW DATA RULES - pdf

EU Directives always cause debate. Think of the problems caused by the working-hours directive or the data protection directive. But the EU data retention directive has caused more than most. But there are reasons for transposing the Directive into UK law. As network complexity increases through such as BT 21CN it becomes harder to monitor communications traffic in the reasonably practicable manner allowed by the Regulation of Investigatory Powers Act 2000. ‘Traditional’ PSTN calls admit taping anywhere along the line but Next Generation Network packets travel myriad, frequently impenetrable paths. The Directive, in accordance with the Home Office’s Interception Modernisation Programme, ensures lawful interception on demand, even in complex environments.

SIFTER10 PROBES - pdf

This article describes the current strategies for performing Deep Packet Inspection functions for security and network management on high-speed networks; it illustrates the significant drawbacks of these methods. The paper introduces CyberSifts’ HANAC architecture and the patented massively parallel search technology Dynamic Parallel Inspection. You don’t need to be a technologist to realise that network usage is escalating rapidly. Smart phones, mobile broadband, WiFi and high-speed, even fibre-optic broadband in every home is the cause of this network phenomenon. This massive demand for cheap network capacity has caused a technology convergence away from expensive, legacy technology so that most large backbone networks within network providers, telecoms companies or large corporate and utilities use TCP/
IP on high-speed 10 Gigabit Ethernet (Gbe).