2022 10th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
Text Clustering of COVID-19 Vaccine Tweets COVID-19疫苗推文的文本聚类
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800754
David Okore Ukwen, M. Karabatak
{"title":"Text Clustering of COVID-19 Vaccine Tweets","authors":"David Okore Ukwen, M. Karabatak","doi":"10.1109/ISDFS55398.2022.9800754","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800754","url":null,"abstract":"The advent of the novel coronavirus disease (COVID-19) in late December 2019 led to the dramatic loss of human life worldwide and presented an unprecedented challenge to public health, education, social life, world economics, and the world of work. Equal access to safe and effective vaccines is very vital to ending the coronavirus pandemic. This research paper aims to perform text clustering on COVID-19 vaccine tweets. It investigates the optimal number of clusters prevalent in the COVID-19 vaccine corpus using deep learning techniques and machine learning algorithms. The study also investigates how using word embeddings can improve the accuracy of the proposed models by evaluating unsupervised learning methods. Machine learning clustering algorithms such as k-means and HDBSCAN, deep learning-based clustering techniques, and UMAP a dimensionality reduction algorithm were employed to perform text clustering. The results of this research showed the optimal clusters obtained by using deep learning clustering techniques and machine-learning algorithms for text clustering. HDBSCAN clustering algorithm showed better clustering results based on features learned while k-means performed better clustering based on various evaluation metrics.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"19 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123524479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An Automated Framework for Generating Attack Graphs Using Known Security Threats 使用已知安全威胁生成攻击图的自动框架
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800833
Rami Alnafrani, D. Wijesekera
{"title":"An Automated Framework for Generating Attack Graphs Using Known Security Threats","authors":"Rami Alnafrani, D. Wijesekera","doi":"10.1109/ISDFS55398.2022.9800833","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800833","url":null,"abstract":"As the proliferation of IoT increases, the need for threat modeling and risk assessment becomes more important. This paper presents an automated framework by utilizing publicly known vulnerabilities and the analytical capabilities provided by MulVAL. The goal is to address the problem of immature IoT security and adopt a proactive approach to threat detection and prevention. The proposed solution is based on the creation of a customized search tool that focuses on the components utilized to build IoT devices. The framework was evaluated by applying it to well-known gadgets. Based on the results, there is a link between currently known IoT vulnerabilities and different attack techniques and graphs. The System Usability Scale (SUS) was utilized to examine the usability of the search tool. As a result, a survey was performed to establish the user experience with the tool. The findings show that the proposed solution is functional and usable.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"50 10","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120852211","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Phishing Detection and Prevention using Chrome Extension 网络钓鱼检测和预防使用Chrome扩展
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800826
M. Rose, N. Basir, Nur Fatin Nabila Binti Mohd Rafei Heng, N. J. Zaizi, M. Saudi
{"title":"Phishing Detection and Prevention using Chrome Extension","authors":"M. Rose, N. Basir, Nur Fatin Nabila Binti Mohd Rafei Heng, N. J. Zaizi, M. Saudi","doi":"10.1109/ISDFS55398.2022.9800826","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800826","url":null,"abstract":"During pandemic COVID-19 outbreaks, number of cyber-attacks including phishing activities have increased tremendously. Nowadays many technical solutions on phishing detection were developed, however these approaches were either unsuccessful or unable to identify phishing pages and detect malicious codes efficiently. One of the downside is due to poor detection accuracy and low adaptability to new phishing connections. Another reason behind the unsuccessful anti-phishing solutions is an arbitrary selected URL-based classification features which may produce false results to the detection. Therefore, in this work, an intelligent phishing detection and prevention model is designed. The proposed model employs a self-destruct detection algorithm in which, machine learning, especially supervised learning algorithm was used. All employed rules in algorithm will focus on URL-based web characteristic, which attackers rely upon to redirect the victims to the simulated sites. A dataset from various sources such as Phish Tank and UCI Machine Learning repository were used and the testing was conducted in a controlled lab environment. As a result, a chrome extension phishing detection were developed based on the proposed model to help in preventing phishing attacks with an appropriate countermeasure and keep users aware of phishing while visiting illegitimate websites. It is believed that this smart phishing detection and prevention model able to prevent fraud and spam websites and lessen the cyber-crime and cyber-crisis that arise from year to year.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128485427","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Countering Steganographic Security with CNN 与CNN对抗隐写安全
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800800
Narendrapurapu Surya Chandu, N. Subramanian
{"title":"Countering Steganographic Security with CNN","authors":"Narendrapurapu Surya Chandu, N. Subramanian","doi":"10.1109/ISDFS55398.2022.9800800","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800800","url":null,"abstract":"Accurate steganalysis is required for extracting secret data hidden using different steganographic techniques. A steganalysis technique using the \"Yedroudj\" network is proposed in this work. The common steganalysis process is followed using highlight extractors and classifiers. The suspected images are classified with Convolutional Neural Network(CNN) and tested. The accuracy of detecting a steganography image with the proposed network and strategy was around 86.36%. Extracting data from images that used steganography tools like Xiao and Open puff are tested using the yedroudj network by detecting the steganography information.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"121 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129841813","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A Deep Learning Based Fast Face Detection and Recognition Algorithm for Forensic Analysis 基于深度学习的法医分析快速人脸检测与识别算法
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800785
S. Karakus, M. Kaya, S. Tuncer, M. Bahsi, Merve Açikoğlu
{"title":"A Deep Learning Based Fast Face Detection and Recognition Algorithm for Forensic Analysis","authors":"S. Karakus, M. Kaya, S. Tuncer, M. Bahsi, Merve Açikoğlu","doi":"10.1109/ISDFS55398.2022.9800785","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800785","url":null,"abstract":"Face detection and recognition applications have become an important research issue with the advent of artificial intelligence and deep learning studies, which have drawn much attention to researchers in recent years. The knowledge of retrieving contents from image, video, and audio files is seen as one of the vital influences in the field of digital forensics. In this study, we proposed a software that is supported with deep learning model which can analyze video and image files extracted from forensic evidence for either face detection or object recognition in a folder given as input and file a report of the images and videos that have been realized via this proposed application. The proposed deep learning model trained with YOLOv5 object detection algorithms can easily detect faces that are completely or partially visible under different light levels or in the image. This study shows that deep learning supported solutions can be easily preferred for real-time applications and time-consuming implementations to reduce fatigue and error-prone incurred during forensic investigations.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131338950","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Chaos-Based Lightweight Encryption Mechanism for Microcomputers 一种新的基于混沌的微型计算机轻量级加密机制
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800803
Harun Emre Kiran, A. Akgul, O. Yildiz
{"title":"A New Chaos-Based Lightweight Encryption Mechanism for Microcomputers","authors":"Harun Emre Kiran, A. Akgul, O. Yildiz","doi":"10.1109/ISDFS55398.2022.9800803","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800803","url":null,"abstract":"Many casual objects are now connected to the internet. The objects are managed with micro-computers for cost-effectiveness. Because this computer has limited processing and storage, they usually act as a collection of data. The data are processed by powerful computers. Therefore, data needs to be transferred to the computers. However, since most of the objects are connected to the internet in a wireless environment, they cause significant security weakness. In this study, a new chaos-based lightweight encryption mechanism is proposed to provide a solution to the problem. The aim of the study is to reduce the overhead of microcomputers and to have strong encryption of data. The 3-dimensional Lorenz chaotic system is used to test the performance of the study. According to the experimental results obtained, it has been observed that the proposed working image data is strongly encrypted and with less processing and storage than traditional encryption algorithms. This study will be used for the security of microcomputers to be used in future studies and more detailed performance tests of this method will be carried out.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125576440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A New Method of Automatic Content Analysis in Disaster Management 灾害管理中自动内容分析的新方法
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800778
Ali Burak Can, I. B. Parlak, T. Acarman
{"title":"A New Method of Automatic Content Analysis in Disaster Management","authors":"Ali Burak Can, I. B. Parlak, T. Acarman","doi":"10.1109/ISDFS55398.2022.9800778","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800778","url":null,"abstract":"This study proposes a new approach to investigate the social media for disaster management. Twitter usage during an earthquake becomes a multimodal backbone in order to share the knowledge through the different aspects of the disaster. Planning the emergencies is the bottleneck of the rescue organizations in time-limited rescue intervention. Exploring the general population in the epicenter of earthquake would provide vital knowledge in rescue planning. Social media is considered as a common critical source of human information during the power outage. In this study, we focused on the analysis of rescue and non rescue topics for the 2020 Izmir earthquake. Our method analysis revealed the most important disaster topics that can be derived so that rescue organizations can successfully utilize such data. Our results provide insights into the spatio-temporal distribution of earthquake rescue/non rescue terms to identify Twitter-based discussions related to the 2020 Izmir earthquake.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125962012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A deep learning-enhanced botnet detection system based on Android manifest text mining 基于Android清单文本挖掘的深度学习增强僵尸网络检测系统
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800817
S. Yerima, Yi Min To
{"title":"A deep learning-enhanced botnet detection system based on Android manifest text mining","authors":"S. Yerima, Yi Min To","doi":"10.1109/ISDFS55398.2022.9800817","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800817","url":null,"abstract":"Android botnets remain a significant threat to mobile and IoT systems and networks as they continue to infect millions of devices worldwide. Therefore, there is a need to develop more effective solutions to tackle their spread. Hence, in this paper we propose a system for detecting Android botnets through automated text mining of the manifest files obtained from apps. The proposed method utilizes NLP techniques to extract features from the manifest files and a deep learning-based classification model is used to detect botnet applications. The classification model is implemented using CNN and a traditional machine learning classifier such as SVM, Random Forest or KNN. We performed experiments to evaluate the proposed system with 3858 Android applications consisting of 1929 botnet and 1929 benign samples. The results showed the best overall performance with the CNN-SVM hybrid model which had an average accuracy of 96.9% thus outperforming the singular machine learning classifiers.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121504385","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Network Intrusion Detection Packet Classification with the HIKARI-2021 Dataset: a study on ML Algorithms 基于HIKARI-2021数据集的网络入侵检测数据包分类:ML算法研究
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800807
Rui Fernandes, Nuno Lopes
{"title":"Network Intrusion Detection Packet Classification with the HIKARI-2021 Dataset: a study on ML Algorithms","authors":"Rui Fernandes, Nuno Lopes","doi":"10.1109/ISDFS55398.2022.9800807","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800807","url":null,"abstract":"The Intrusion Detection System is a critical part of a network infrastructure to detect and prevent cyberattacks. The use of Artificial Intelligence has the potential to improve the performance of IDS in achieving cybersecurity. However, one of the challenges nowadays is the lack of good datasets that can improve the results of AI algorithms. In this paper we study the recently published HIKARI-2021 dataset, built from real data in a lab to develop network traffic and classification models. A feature selection method was used to evaluate the relevant features, and different Machine Learning methods were tested with this dataset.The results show that the dataset is suitable for classification and that the feature size of the dataset can be reduced from 83 to 22 entries, while still maintaining an accuracy of 99%, for a faster algorithm execution. When using a balanced sample of this dataset, we obtained an accuracy above 80% on some ML algorithms.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"63 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133438150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System AIFIS:基于人工智能(AI)的法医调查系统
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800801
Rami Alnafrani, D. Wijesekera
{"title":"AIFIS: Artificial Intelligence (AI)-Based Forensic Investigative System","authors":"Rami Alnafrani, D. Wijesekera","doi":"10.1109/ISDFS55398.2022.9800801","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800801","url":null,"abstract":"The scope of forensic investigations has recently expanded. Since most Internet of Things (IoT) devices are plug and play and do not have much memory or storage to pre-process data, it is a challenge for forensic investigators to identify and obtain relevant evidence to reconstruct attacks. As a solution, we propose using artificial intelligence (AI)-inspired techniques to automate the forensic analysis process by emulating attacks in the process of identifying and collecting forensic evidence. We used a differentiable inductive logic programming (∂ILP) system to obtain attack emulation information from different sources, such as device- and subsystem-level vulnerabilities gathered by assessing device components in an enterprise network, and to predict potential attacks from previous attacks on similar configurations. Our experimental results showed that the proposed methodology could successfully generate rules that can assist forensic examiners in identifying evidence to emulate attacks without execution.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"91 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133909104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信