Welcome to

John's Web Site

Dr John Haggerty is a Senior Lecturer in Cyber Security at Sheffield Hallam University. His main research interests include network and Web application security, security software development and visual analytics. Whilst primarily quite techie, he appreciates the importance of information security management practices and the role of frameworks such as ISO 27001 and NIST.

EMAIL ME

Expertise

Dr John Haggerty is an experienced cyber security academic and practitioner. His main interests are within network and Web application security. However, he has also conducted extensive work in digital investigations and incident response.

John is a keen programmer and enjoys developing security software particularly dealing with 'messy' data. For example, methodologies and resulting software he has developed focus on large-scale data mining within tight temporal constraints, such as forensic triage tools to identify relevant evidence during digital investigations and security-focused routing algorithms to detect cyber attacks.

Other software that he has developed focuses on visual analytics; visualising mathematical models of complex data sets to elucidate new knowledge. This enables security professionals to make sense of large-scale, complex patterns within their data and improve the ability of the analyst to make sense of information.

Whilst he enjoys and is experienced in the technical elements of cyber security, John recognises the importance of information security management good practices and the role that this plays in enabling holistic security. He has a wide range of experience in providing cyber security advice to businesses and government agencies.


Research

Dr Haggerty is actively engaged in cyber security research, which is informed by his academic and practitioner activities.  Given the number of security incidents that are widely reported, research is fundamental in order to provide a more secure environment for users and organisations alike. John's research interests include network and Web application security, security software development and visual analytics.

Building on his background in network security, John's current research in cyber security and digital forensics is twofold: the development of methodologies and resulting software for cyber security; and a project focusing on ‘extrusion detection’, particularly for complex environments. Methodologies and resulting software he has developed for this research focus on large-scale data mining within tight temporal constraints, such as searches of hard drives or Web data repositories for relevant evidence during digital investigations. This research resulted in two patents and received significant funding for commercialisation through a university spin-out company.

The research investigating ‘extrusion detection’ has led to new approaches and software for the detection of, and response to, sensitive data leakage in networked environments. This aspect of security is particularly problematic in current and future network architectures, such as IoT and the cloud. He is currently working on various aspects of this project, such as the identification of issues surrounding security in mobile devices which typically use poorly-designed access control countermeasures to safeguard user privacy. He is also investigating new methodologies for the identification of data being maliciously uploaded or downloaded from cloud platforms.

John's work in inter-disciplinary studies applies research in computer science to arts and humanities disciplines. In particular, this work develops data mining and visual analytic methodologies and software for the study of historical (and current) actor networks. This collaborative research with senior researchers in Economic History has resulted in publications in prestigious history journals.


Publications

Details of Dr Haggerty's research are published in cyber security peer-reviewed books, journal and conference papers, and these are listed below. In addition to publishing in his research area, he also reviews papers submitted to a number of international conferences and journals.


Hegarty, R. and Haggerty, J., “Presence Metadata in the Internet of Things: Challenges and Opportunities”, Proceedings of the 6th International Conference on Information Systems Security and Privacy, Valetta, Malta, 25-27 February, 2020.

Alsumayt, A., Haggerty, J. and Lotfi, A., “Evaluation of detection method to mitigate DoS attacks in MANETs”, Proceedings of the International Conference on Computer Applications & Information Security (ICCAIS), Riyadh, Saudi Arabia, 4-6 April, 2018.

Haggerty, J. and Haggerty, S., "Avoiding Musty Mutton Chops: The Network Narrative of an American Merchant in London, 1771-1774", Essays in Economic and Business History, Vol. 37, 2018.

Alsumayt, A., Haggerty, J. & Lotfi, A., "Using Trust to Detect Denial of Service Attacks in the Internet of Things over MANETs", International Journal of Space-Based and Situated Computing, 7 (1), pp.43-56, 2017.

Haggerty, J. & Haggerty, S., "Networking with a Network: The Liverpool African Committee 1750-1810", Enterprise & Society, 18 (3), pp. 566-590, 2017.

Taylor, M., Haggerty, J., Gresty, D., Wren, C. & Berry, T., "Avoiding the misuse of social media by employees", Network Security, May 2016, pp. 8-11

Alsumayt, A., Haggerty, J. & Lotfi, A., "Detect DoS Attack Using MrDR Method in Merging Two MANETs", Proceedings of the 30th IEEE International Conference on Advanced Information Networking and Applications (AINA-2016), Crans-Montana, Switzerland, March 23-25, 2016.

Taylor, M., Haggerty, J., Gresty, D., Criado Pacheco, N., Berry, T. & Almond, P., "Investigating employee harassment via social media", Journal of Systems and Information Technology, 17 (4), 2015.

Alsumayt, A., Haggerty, J. & Lotfi, A., "Comparison of the MrDR Method Against Different DoS Attacks in MANETs", Proceedings of the Fifth International Conference on Digital Information Processing and Communications (ICDIPC2015), Sierre/Siders, Switzerland, October 7-9, 2015.

Hegarty, R. & Haggerty, J., "Extrusion Detection of Illegal Files in Cloud-Based Systems", International Journal of Space-Based and Situated Computing, 5 (3), pp. 150-158, 2015.

Hegarty, R. & Haggerty, J., "Slackstick: Signature-Based File Identification for Live Digital Forensics Examinations", Proceedings of the 2015 European Intelligence and Security Informatics Conference (EISIC 2015), Manchester, UK, 7-9 September, 2015.

Alsumayt, A., Haggerty, J. & Lotfi, A., "Performance, Analysis, and Comparison of MrDR Method to Detect DoS Attacks in MANETs", Proceedings of the 2015 European Intelligence and Security Informatics Conference (EISIC 2015), Manchester, UK, 7-9 September, 2015.

Haggerty, J., Hughes-Roberts, T. & Hegarty, R., "Hobson's Choice: Security and Privacy Permissions in Android and iOS Devices", LNCS 9190 Human Aspects of Information Security, Privacy and Trust, Springer, London, pp. 506-516, 2014. [Proceedings of the 3rd International Conference on Human Aspects of Information Security, Privacy, and Trust, held as part of HCI International 2015, Los Angeles, CA, USA, 2-7 August, 2015].

Thurlby, C., Langensiepen, C., Haggerty, J. & Ranson, R., "Understanding User Knowledge of Computer Security and Risk: A Comparative Study", Proceedings of the 9th International Symposium on Human Aspects of Information Security & Assurance, Lesvos, Greece, 1-3 July, 2015.

Haggerty, J., Haggerty, S. & Taylor, M., “Forensic Triage of Email Network Narratives through Visualisation”, Journal of Information Management and Computer Security, 22 (4), doi http://dx.doi.org/10.1108/IMCS-11-2013-0080, 2014.

Alsumayt, A. & Haggerty, J., “A Survey of the Mitigation Methods against DDoS Attacks on MANETs”, Proceedings of the Science and Information Conference, London, UK, 27-29 August, 2014, pp. 538-544, 2014.

Haggerty, J. & Taylor, M.J., “Retrieval and Analysis of Web Search Narratives for Digital Investigations”, Proceedings of the 10th International Network Conference, Plymouth, UK, 8-10 July, 2014, pp. 153-162, 2014.

Alsumayt, A. & Haggerty, J., “A Taxonomy of Defence Mechanisms to Mitigate DoS Attacks in MANETs”, Proceedings of the 10th International Network Conference, Plymouth, UK, 8-10 July, 2014, pp. 3-12, 2014.

Alsumayt, A. & Haggerty, J., “Using Trust Based Method to Detect DoS Attack in MANETs”, Proceedings of PGNet 2014, Liverpool, UK, 23-24 June, 2014.

Haggerty, J. & Hughes-Roberts, T., “Visualization of System Log Files for Post-Incident Analysis”, in Tryfonas, T. & Askoxylakis, I. (eds.), LNCS 8533 Human Aspects of Information Security, Privacy and Trust, Springer, London, pp. 23-32, 2014. [Proceedings of the 2nd International Conference on Human Aspects of Information Security, Privacy, and Trust, Held as Part of HCI International 2014, Heraklion, Greece, 22-27 June, 2014].

Haggerty, J. & Haggerty, S., “Visual Analytics for Large-Scale Actor Networks: A Case Study of Liverpool, 1750-1810”, in Casson. M. & Hashimzade, N. (eds.), Large Databases in Economic History Research Methods and Case Studies, Routledge, pp. 146-164, 2013..

Haggerty, J., Casson, M.C., Haggerty, S. & Taylor, M.J., "A Framework for the Forensic Analysis of User Interaction with Social Media", in Li, C.T. (ed.), Emerging Digital Forensics Applications for Crime Detection, Prevention, and Security, IGI-Global, pp. 195-210, 2013.

Haggerty, J., Haggerty, S. & Taylor, M.J., "Visual Triage of Email Network Narratives for Digital Investigations", Proceedings of the European Information Security Multi-Conference, Lisbon, Portugal, 8-9 May, pp. 102-111, 2013.

Roberts, M.P. & Haggerty, J., "MetaFor: Metadata Signatures for Automated Remote File Identification in Forensic Investigations", Proceedings of the European Information Security Multi-Conference, Lisbon, Portugal, 8-9 May, pp. 123-132, 2013.

Haggerty, J., Casson, M.C., Haggerty, S. & Taylor, M.J., "A Framework for the Forensic Analysis of User Interaction with Social Media", International Journal of Digital Crime and Forensics, 4 (4), pp. 15-30, 2012.

Taylor, M., Hughes, G., Haggerty, J., Gresty, D. & Almond, P., "Digital Evidence from Mobile Telephone Applications", Computer Law and Security Review, 28 (3), pp. 335-339, 2012.

Haggerty, J., Casson, M.C., Haggerty, S. & Taylor, M.J., "Forensic Analysis of User Interaction with Social Media: A Methodology", Proceedings of the 7th Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 12), Crete, Greece, 6 - 8 June, pp. 66 - 75, 2012.

Taylor, M., Haggerty, J., Gresty, D. & Berry, T., "Digital Evidence from Peer-to-Peer Networks", Computer Law and Security Review, 27 (6), pp. 647-652, 2011.

Haggerty, J., Karran, A.J., Lamb, D.J. & Taylor, M.J., "A Framework for the Forensic Investigation of Unstructured Email Relationship Data", International Journal of Digital Crime and Forensics, 3 (3), pp. 1-18, 2011.

Karran, A., Haggerty, J., Lamb, D., Taylor, M. & Llewellyn-Jones, D., "A Social Network Discovery Model for Digital Forensics Investigations", Proceedings of the 6th Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 11), Kingston, UK, 7 - 8 July, pp. 160-170, 2011.

Haggerty, J. & Haggerty, S., "The Life Cycle of a Metropolitan Business Network: Liverpool 1750-1810", Explorations in Economic History, 48 (2), pp. 189 - 206, 2011.

Haggerty, J. & Haggerty, S., "Temporal Social Network Analysis for Historians: A Case Study", Proceedings of the International Conference on Visualization Theory and Applications (IVAPP 2011), Algarve, Portugal, 5 - 7 March, pp. 207 - 217, 2011.

Fergus, P., Taylor, M., Haggerty, J., Bracegirdle, L. & Merabti, M., "Next Generation Body Area Networks and Smart Environments for Healthcare", in Smart Healthcare Applications and Services: Developments and Practices, Rocker, C. & Ziefle, M. (eds.), IGI Global, pp. 46 - 74, 2011.

Indrasinghe, S., Pereira, R. & Haggerty, J., "Efficient Address Management for Mobile Ad Hoc Networks", Proceedings of the 5th International Conference on Broadband and Wireless Computing (BWCCA 2010), Fukoka, Japan, 4 - 6 November, pp. 1 - 8, 2010.

Taylor, M., Haggerty, J., Gresty, D. & Fergus, P., "Forensic Investigation of Peer-to-Peer Networks", Network Security, pp. 12 - 15, September, 2010.

Taylor, M., Haggerty, J., Gresty, D. & Hegarty, R., "Digital Evidence in Cloud Computing Systems", Computer Law and Security Review, 26 (3), pp. 304 - 308, 2010.

Haggerty, J. & Haggerty, S., "Visual Analytics of an Eighteenth-Century Business Network", Enterprise and Society, 11 (1), pp. 1 - 25, 2010.

Taylor, M., Haggerty, J. & Gresty, D., "The Legal Aspects of Corporate Computer Usage Policies", Computer Law and Security Review, 26 (1), pp. 72 - 76, 2010.

Taylor, M., Jones, R., Haggerty, J. & Gresty, D., "Teaching Information Technology Law", Journal of Further and Higher Education, 33 (4), pp. 473 - 481, 2009.

Taylor, M., Haggerty, J. & Gresty, D., "The Legal Aspects of Corporate Email Investigations", Computer Law and Security Review, 25 (4), pp. 372 - 376, 2009.

Indrasinghe, S., Pereira, R. & Haggerty, J., "Disjointed Conflict Free Address Auto-Configuration for Mobile Ad Hoc Networks", Proceedings of the 12th International Conference on Network-Based Information Systems (NBiS 2009), Indiana, USA, 19 - 21 August, 2009.

Haggerty, J., Lamb, D. & Taylor, M., "Social Network Visualization for Forensic Investigation of E-Mail", Proceedings of the 4th Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 09), Athens, Greece, 25 - 26 June, 2009, pp. 81 - 92.

Haggerty, J., Taylor, M. & Gresty, D., "Determining Culpability in Investigations of Malicious E-Mail Dissemination Within the Organisation", Proceedings of the 3rd Annual Workshop on Digital Forensics and Incident Analysis (WDFIA 08), Malaga, Spain, 9 October, 2008, pp. 12 - 20.

Haggerty, J. & Merabti, M. (eds.), Proceedings of the 3rd Conference on Advances in Computer Security and Forensics, Liverpool John Moores University, UK, 10 - 11 July, 2008.

Wren, C., Haggerty, J. & Taylor, M., "An Evaluation of Signature-Based Forensic Searches for Malicious Digital Pictures", Proceedings of the 3rd Conference on Advances in Computer Security and Forensics, Liverpool John Moores University, UK, 10 - 11 July, 2008, pp. 15 - 20.

Taylor, M.J., Haggerty, J., Gresty, D. & Lisboa, P., "A Corporate Computer Forensic Investigation Scoping Model", Proceedings of the 3rd Conference on Advances in Computer Security and Forensics, Liverpool John Moores University, UK, 10 - 11 July, 2008, pp. 60 - 66.

Indrasinghe, S., Pereira, R. & Haggerty, J., "Protocol Specification for Conflict-Free MANET Address Allocation Mechanisms", Proceedings of IEEE Advanced Information Networking Applications (AINA-08) 2008/TeNAS 2008, Okinawa, Japan, 25 - 28 March 2008, pp. 1434 - 1439.

Haggerty, J., Llewellyn-Jones, D. & Taylor, M., "FORWEB: File Fingerprinting for Automated Network Forensics Investigations", Proceedings of e-Forensics 2008, Adelaide, Australia, 21 - 23 January, 2008.

Taylor M.J., Haggerty, J. & Gresty, D., "The Legal Aspects of Corporate Computer Forensic Investigations", Computer Law and Security Report, 23 (6), 2007, pp. 562 - 566.

Haggerty, J. & Merabti, M. (eds.), Proceedings of the 2nd Conference on Advances in Computer Security and Forensics, Liverpool John Moores University, UK, 12 - 13 July, 2007.

Taylor, M., Haggerty, J. & Gresty, D., "Criminal Offences and Corporate Computer Forensics", Proceedings of the 2nd Conference on Advances in Computer Security and Forensics, Liverpool John Moores University, UK, 12-13 July, 2007, pp. 27 - 31.

Haggerty, J. & Taylor, M., "Improving Performance in Computer Forensics Investigations of Malicious Digital Pictures Resident on the Hard Drive", Proceedings of the 23rd Annual UK Performance Engineering Workshop, Edge Hill University, UK, 9-10 July, 2007, pp. 58 - 65.

Haggerty, J. & Taylor, M., 2007, "FORSIGS: Forensic Signature Analysis of the Hard Drive for Multimedia File Fingerprints", in IFIP International Federation for Information Processing, Volume 232, New Approaches for Security, Privacy and Trust in Complex Environments, Venter, H., Eloff, M., Labuschagne, L., Eloff, J. & von Solms, R. (eds.), (Boston, Springer), pp. 1 - 12. [Presented atIFIP/SEC, Sandton, South Africa, 14 - 16 May, 2007.]

Indrasinghe, S., Pereira, R. & Haggerty, J., "Dynamic Auto-Address Configuration for Mobile Ad-Hoc Networks", Proceedings of IEEE Advanced Information Networking Applications (AINA-07) 2007, Niagra Falls, Canada, 21 - 23 May, 2007, pp. 852 - 857.

Haggerty, J. & Merabti, M. (eds.), Proceedings of the 1st Conference on Advances in Computer Security and Forensics, Liverpool John Moores University, UK, 13-14 July, 2006.

Haggerty, J., Berry, T. & Gresty, D., "Forensic Signature Analysis of Digital Image Files", Proceedings of the 1st Conference on Advances in Computer Security and Forensics, Liverpool, UK, 13-14 July, 2006, pp. 1-10.

Haggerty, J. & Taylor, M., "Managing Corporate Computer Forensics", Computer Fraud and Security, June 2006, pp. 14-16.

Haggerty, J., "Early Detection and Prevention of Denial-of-Service Attacks Within the Routing Infrastructure", Computer Networking and Networks, Shannon S. (ed.), Nova Science Publishers, USA, 2006, pp. 1-39.

Haggerty, J., Shi, Q., Fergus, P. & Merabti, M., "Data Authentication and Trust Within Distributed Intrusion Detection System Inter-Component Communications", Proceedings of EC2ND 2005, Blyth, A. (ed.), pp. 197-206 (Springer-Verlag, London, 2006). [Presented at The 1st European Conference on Computer Network Defence (EC2ND), Glamorgan, UK, 15 - 16 December 2005.]

Haggerty, J., Shi, Q. & Merabti, M., "Early Detection and Prevention of Denial-of-Service Attacks: A Novel Mechanism with Propagated Traced-Back Attack Blocking", IEEE Journal on Selected Areas in Communications, vol. 23, no. 10, October 2005.

Haggerty, J., Shi, Q. & Merabti, M., "Statistical Signatures for Early Detection of Flooding Denial-of-Service Attacks", in Security and Privacy in the Age of Ubiquitous Computing, Sasaki, R., Qing, S., Okamato, E. & Yoshiura, H. (eds.), pp. 327-342, (IFIP/Springer, New York , 2005). [Presented at IFIP/SEC 2005, Chiba , Japan, 30 May - 1 June 2005.]

Haggerty, J. and Taylor, M., "One born every minute", The Computer Bulletin, British Computer Society, January 2005, pp. 26-27.

Haggerty, J., Berry, T., Shi, Q. & Merabti, M., "DiDDeM: A System for Early Detection of TCP SYN Flood Attacks," Proceedings of Globecom 2004, Dallas, Texas USA, 29 November - 3 December 2004.

Haggerty, J., Shi, Q. & Merabti, M., "Beyond the Perimeter: the Need for Early Detection of Denial of Service Attacks," Proceedings of the 18th Annual Computer Security Applications Conference (ACSAC) 2002, Las Vegas USA, 9-13 December 2002, pp. 413-422.

Haggerty, J., Shi, Q. & Merabti, M., "The Threat from Within: An Analysis of Attacks on an Internal Network," in Ghonaimy, M. A., El-Hadidi, M. T., & Aslan, H. K. (eds.) Security in the Information Society - Visions and Perspectives, pp. 133-146 (Kluwer Acadaemic Press/IFIP, 2002). [Presented at IFIP/SEC 2002, Cairo, Egypt, 7 - 9 May 2002]

Haggerty, J., Shi, Q. & Merabti, M., "Defending Against Denial of Service: A Network Filtering Based Approach," 2nd Annual Post-Graduate Symposium on the Convergence of Telecommunications, Networking & Broadcasting, Liverpool, pp. 119-124, 2001.

  

Teaching

Dr John Haggerty is an HEA Fellow. The modules he teaches reflect his broad interest in cyber security, programming, networks and digital investigations. In order to support colleagues across the HE sector, he has been an External Examiner responsible for undergraduate and postgraduate cyber security and computer forensics programmes at other universities. John has also been involved in a number of validation events for various universities as an external academic ensuring the quality of their proposed programmes.

He is currently developing and delivering the following modules at Sheffield Hallam University:


Web Applications and E-Commerce Security
(Level 7)


Advanced Penetration Testing
(Level 6)


Information Security Management
(Level 6)


Keep in touch

I look forward to hearing from you and I will get back to you as soon as I can.