{"title":"SECURE-D:Framework For Detecting and Preventing Attacks in SQL and NoSQL Databases","authors":"O. JithinV., N. Subramanian","doi":"10.1109/ISDFS55398.2022.9800805","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800805","url":null,"abstract":"The advancements in internet technology have attracted more users for web applications over recent years. Users’ confidential data are stored in databases thus heightening the security needs. Lack of secure coding in web application causes data threats. Database security plays an important role in information security. Access to database grants attackers control over sensitive information. The SQL and NoSQL injection attacks are categorized as dangerous attacks by the Open Web Application Security Project (OWASP). This work presents a framework for improving website security by detecting and preventing attacks in SQL and NoSQL databases. The proposed system is tested on vulnerable web applications and its efficacy is compared to that of two other systems. Other systems can detect attacks in either SQL or NoSQL databases but not both together. However, the proposed and implemented system can detect and prevent attacks in both SQL and NoSQL databases.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"214 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117341912","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparing Interservice Communications of Microservices for E-Commerce Industry","authors":"Mustafa Gördesli, A. Varol","doi":"10.1109/ISDFS55398.2022.9800784","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800784","url":null,"abstract":"Most of the e-commerce companies are using microservices rather than monolithic architecture. Using microservices gives the ability of scalability and better fault tolerance. On the other hand, using microservices has some challenges, one of them is that communication between microservices must be efficient and robust. In this work, we focused on this challenge, analyzed the performance of communication techniques, and identified their advantages and disadvantages. We compared synchronous REST architecture and asynchronous event driven architecture.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"2013 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121552466","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Energy-Aware Routing Architecture for Wireless Sensor Networks","authors":"Aytug Boyaci, H. H. Balik, F. Ata","doi":"10.1109/ISDFS55398.2022.9800791","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800791","url":null,"abstract":"The resources used for WSNs are typically limited, and it is essential for these limited resources to be used effectively within scope of the architectural structure. This study suggests an efficient routing architecture. Two environments, consisting of a simulation program and an experimental set, were used in order to demonstrate the performance offered by the suggested routing architecture. The first step to developing applications on WSNs is acquisition of results through implementation of the work on a simulation program. Following a successful outcome from the work carried out on the simulation program, it is essential for the system to be tested on an experimental set in order to confirm the validity of the results. The accuracy of the results yielded by the suggested routing architecture’s design is tested in two stages. The first stage involves acquisition of results through the experimental setup. The second stage consists of acquisition of simulation program results for the same number of nodes, followed by a comparison of both result sets.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129192493","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Khushi Gupta, Ashar Neyaz, N. Shashidhar, C. Varol
{"title":"Digital Forensics Lab Design: A framework","authors":"Khushi Gupta, Ashar Neyaz, N. Shashidhar, C. Varol","doi":"10.1109/ISDFS55398.2022.9800799","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800799","url":null,"abstract":"Internet connectivity and digital technologies have experienced exponential growth in the past few years. This explosion has spurred a significant increase in crime while also creating a new definition of cybercriminals. Digital Forensics plays an important role in crime reconstruction and thus the need for skilled forensics experts has multiplied. As a result, digital forensics education and training has also experienced radical growth. Teaching digital forensics has always been a challenge as the creation of suitable hands-on digital forensics labs has always been the core of these training programs. There are several challenges faced by both the educators and the students when it comes to the creation and implementation of digital forensics labs. This paper aims to address some of these issues by providing a framework that can be used by educators to establish educational hands-on labs for digital forensics. Firstly, we identify all the challenges faced by digital examiners, educators, and training professionals to deliver high-quality forensic labs. Secondly, we identify specific common technical pitfalls that professionals run into when designing digital forensics labs such as the creation of large image files. We thus, offer tips and tricks to make the process of creating digital forensic labs easier. Finally, we also provide a data set of small-sized image files that can be used by educators for the creation of a digital forensic lab infrastructure.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130820382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comparison of Forecasting Algorithms on Retail Data","authors":"Pelin Dinçoğlu, H. Aygün","doi":"10.1109/ISDFS55398.2022.9800809","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800809","url":null,"abstract":"Sales forecasting is of great importance in retail business in terms of reducing the number of stock days, stock cost and cash flow, increasing the availability of products in the stores, increasing sales and preventing customer loss. In this study, sales forecasting will be performed by using regression and time series algorithms on the sales data of two stores of Migros, one of the largest retail stores in Turkey, for a period of two years. The two stores used in the experiments have different sales volumes. The monthly sales data received from Migros was first merged and then regression and time series algorithms were used to do forecasting. The error rates of the applied models were calculated for different scenarios and collected in a single table. By comparing the results of the two algorithms a decision was made for the choice of the better performing sales forecasting algorithm.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133184701","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Performance Analysis of Deep Approaches on Airbnb Sentiment Reviews","authors":"Muhammad Raheel Raza, Walayat Hussain, A. Varol","doi":"10.1109/ISDFS55398.2022.9800816","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800816","url":null,"abstract":"Consumer reviews in the Airbnb marketplace are one of the key attributes to measure the quality of services and the main determinant of consumer rentals decisions. Such feedback can impact both a new and repeated consumer's choice decision. The way to manage poor reviews can help to save or damage the host's reputation. Sentiment analysis enables an Airbnb host to get an insight into the business, pinpoint degradation of the specific component of compound services and assist in managing it proactively. Multiple Deep Learning algorithms have been used for Natural Language Processing (NLP). For optimal sentiment management in the Airbnb marketplace, it is crucial to identify the right algorithm. The paper uses multiple Deep Learning algorithms to identify different aspects of guest reviews and analyze their accuracies. The paper uses four accuracy measurement benchmarks – Precision, Recall, F1-score and Support to analyze results. The analysis shows that the GRU method achieves the best results with the highest classification metrics values as compared to RNN and LSTM.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121317479","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Necessity of Emotion Recognition from Speech Signals for Natural and Effective Human-Robot Interaction in Society 5.0","authors":"Yeşím Ülgen Sönmez, A. Varol","doi":"10.1109/ISDFS55398.2022.9800837","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800837","url":null,"abstract":"The history of humanity has reached Industry 4.0 that aims to the integration of information technologies and especially artificial intelligence with all life-sustaining mechanisms in the 21st century, and consecutively, the transformation of Society 5.0 has begun. Society 5.0 means a smart society in which humans share life with physical robots and software robots as well as smart devices based on augmented reality. Industry 4.0 contains main structures such as the internet of things, big data analytics, digital transformation, cyber-physical systems, artificial intelligence, and business processes optimization. It is impossible to consider the machines to be without emotions and emotional intelligence within the transformation of smart tools and artificial intelligence, in addition, while it is planned to give most of the commands with voice and speaking, it became more important to develop algorithms that can detect emotions. In the smart society, new and rapid methods are needed for speech recognition, emotion recognition, and speech emotion recognition areas to maximize human-computer (HCI) or human-robot interaction (HRI) and collaboration. In this study, speech recognition and speech emotion recognition studies in robot technology are investigated and developments are revealed.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"5 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129167204","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ChevroCrypto – Security & Cryptography Broker","authors":"Filipe Alves, N. Coelho, Manuela Cruz-Cunha","doi":"10.1109/ISDFS55398.2022.9800797","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800797","url":null,"abstract":"The Internet of Things technologies are increasingly incorporated into the various challenges that arise, and it is becoming increasingly important to ensure data protection from these systems. There are several tools available to assist developers in data protection, but understanding the international mandatory rules and a whole set of essential characteristics that should be considered when carrying out projects is required. This project was developed to assist developers who may have less expertise, are unfamiliar with the region, and want a high level of security in their system.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116316862","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Automatic Forensic Imaging of a Virtual USB Device with Emulated User Interaction","authors":"M. Alji, Khalid Chougdali","doi":"10.1109/ISDFS55398.2022.9800838","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800838","url":null,"abstract":"The bird’s-eye view of the digital forensic process is the acquisition and preservation of the evidence, the analysis of the acquired data, and the presentation of the findings. Forensic practitioners need a hands-on approach to investigate with high-quality standards. Among the ways to produce labs and demonstrations, there is forensic imaging of USB devices where the forensic expert has planted, for instance, suspicious files. Such a process is time-consuming. We intend to programmatically write a scenario of user actions rather than manually perform them. It would be much easier if we get rid of the USB device and use a virtual USB-like disk image file. The current study describes how we have automatically generated user digital artifacts on a USB-like disk image file. A host OS script would control a pre-configured VM and a guest agent. That agent would take care of the emulation of a user’s scenario.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116418078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"The Relationship between Teacher Candidates' Technology Usage and Online Learning Readiness","authors":"Sevinç Ay, Songül Karabatak, M. Karabatak","doi":"10.1109/ISDFS55398.2022.9800835","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800835","url":null,"abstract":"The purpose of the research is to determine the relationship between the levels of teacher candidates’ online learning readiness and their technology usage and to examine whether various demographic characteristics (gender, class, and age) differ. This research was designed in the relational screening model within the scope of quantitative research. The population of the research consists of teacher candidates studying at the Faculty of Education of Fırat University. The t-test and one-way analysis of variance was used to compare variables and the level of correlation between variables was tested with the Pearson correlation coefficient. As a result of the study, teacher candidates' online learning readiness and technology usage were at the level of undecided. According to the result, while the online learning readiness status of teacher candidates was similar for female and male teacher candidates, technology usage status was found to be significantly higher in favor of males. There was no significant difference in both online learning readiness and technology usage situations of teacher candidates according to the class variable. According to the last result of the study, it was seen that there was a positive, moderate, and significant relationship between teacher candidates' readiness for online learning and their technology usage. Various suggestions are presented regarding the results obtained from the study.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128886172","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}