2022 10th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
Real-time Bitcoin price tendency awareness via social media content tracking 通过社交媒体内容跟踪实时比特币价格趋势
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800793
Housam Moustafa, M. Malli, Hussein Hazimeh
{"title":"Real-time Bitcoin price tendency awareness via social media content tracking","authors":"Housam Moustafa, M. Malli, Hussein Hazimeh","doi":"10.1109/ISDFS55398.2022.9800793","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800793","url":null,"abstract":"Cryptocurrency has been introduced as a relatively new financial system that is widely spread among traders and investors all over the globe. This type of digital currency is hugely attracting social media attention; Social media community along with investors and traders interact to share knowledge or to predict the price tendency of the market. Bitcoin, the leading cryptocurrency nowadays, has the highest market capitalization among other currencies. Which means that any major change in its price tendency will definitely affect the whole market and therefore other coins’ prices will surely rise or fall accordingly. We can assume that the greatest concern ever of all the traders around the world is to be alerted or aware of such major price tendency shifts in real time, in which may help them gain more profit or cut losses before it is late, or in either way predict the potential market movement of other digital currencies. It is reported that emotional interactions of the social media users especially on Twitter (one of the most globally used micro-blogging social networks especially related to cryptocurrency topics) have a great influence on the trend of the Bitcoin price. The huge number of daily active Twitter users with the enormous volume of tweets related to Bitcoin price tendency makes it remarkable regarding its impact on Bitcoin market interaction. In this paper, we will implement Apache Spark logistic regression model to process the large-scale data after having a sentimental analysis of Twitter tweets regarding Bitcoin, to predict the upcoming price tendency and classify an awareness level to alert potential traders and investors in real time about such potential market changes.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131081016","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Serverless Service Architectures and Security Minimals 无服务器服务架构和最低安全要求
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800779
N. Coelho, Manuela Cruz-Cunha
{"title":"Serverless Service Architectures and Security Minimals","authors":"N. Coelho, Manuela Cruz-Cunha","doi":"10.1109/ISDFS55398.2022.9800779","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800779","url":null,"abstract":"The Serverless subject is an emerging new world within technology scope. Although it seems to be by name a specific and a circumscriptive topic, it is a vast and complex subject that has an ongoing study and not a standardized use to be promoted as a technology standard. There are a variety of complex offers, platforms, products, applications, and ways to use, but, like other emerging and essential technologies, it has not yet been broadly accepted as architecture, and for cybersecurity, it’s complex to configure. This doesn't mean it is not usable or defective; it is only an anticipated conclusion and analysis of the factual and present panorama. This research has the objective of demonstrating the pontification of the use of Serverless architectures and the base security measures and risks to consider. This research reviewed prominent research articles from IEEE Journals and interviews with developers that are in contact with this technology, clarifying the central aspect of Serverless, its overall architecture as secure technology-usable-results cross platforms. This research aimed at the principal types of usage, security aspects within the mobile, its applications and networks parts and within the Cloud, the applications, filesystems, and possible other main uses. The study scope of these systems is circumscribed to the technology, tendencies, best and worst of its model, and lastly, its usage.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133591906","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools 使用比较工具对Windows 11 Shellbag进行数字取证分析
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800788
Ashar Neyaz, N. Shashidhar, C. Varol, A. Rasheed
{"title":"Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools","authors":"Ashar Neyaz, N. Shashidhar, C. Varol, A. Rasheed","doi":"10.1109/ISDFS55398.2022.9800788","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800788","url":null,"abstract":"Operating systems have various components that produce artifacts. These artifacts are the outcome of a user’s interaction with an application or program and the operating system’s logging capabilities. Thus, these artifacts have great importance in digital forensics investigations. For example, these artifacts can be utilized in a court of law to prove the existence of compromising computer system behaviors. One such component of the Microsoft Windows operating system is Shellbag, which is an enticing source of digital evidence of high forensics interest. The presence of a Shellbag entry means a specific user has visited a particular folder and done some customizations such as accessing, sorting, resizing the window, etc. In this work, we forensically analyze Shellbag as we talk about its purpose, types, and specificity with the latest version of the Windows 11 operating system and uncover the registry hives that contain Shellbag customization information. We also conduct in-depth forensics examinations on Shellbag entries using three tools of three different types, i.e., open-source, freeware, and proprietary tools. Lastly, we compared the capabilities of tools utilized in Shellbag forensics investigations.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"107 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132480340","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Machine Learning-Based Security Solutions for Critical Cyber-Physical Systems 关键网络物理系统基于机器学习的安全解决方案
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800811
Asad Raza, S. Memon, M. A. Nizamani, M. Shah
{"title":"Machine Learning-Based Security Solutions for Critical Cyber-Physical Systems","authors":"Asad Raza, S. Memon, M. A. Nizamani, M. Shah","doi":"10.1109/ISDFS55398.2022.9800811","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800811","url":null,"abstract":"Cyber-Physical Systems(CPS) are complex critical infrastructure that assists society and provides efficient services to the people and governments. CPS uses many technologies including industrial control systems, smart grid, smart metering systems and the Industrial Internet of Things(IIoT). Extensive usage of ICT, giant physical components, and interconnected nature makes them extremely vulnerable to physical and cyber threats. A cyber-attack on a smart manufacturing system may halt the overall manufacturing process of the industry and reason to stop/reduce the production extensive time. Traditional security systems such as signature-based intrusion detection systems, firewalls and blacklisting are not effective due to high false alarm rates. Cyber-attacks such as DoS, DDoS, zero-day attacks and advanced persistent threats are advanced threats to CPS complex infrastructures. This paper discusses the current and future security challenges associated with CPS, datasets, and the impact of Machine Learning (ML) techniques proposed/used to detect and protect CPS from cyber-attacks. Numerous ML techniques such as unsupervised anomaly detection, Support Vector Machines (SVM), deep belief networks, recurrent neural networks and convolutional neural networks (CNN) have been proposed in the literature to mitigate risks for the critical CPS.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"67 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125108021","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis 无监督机器学习无人机取证通过飞行路径分析
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800808
N. Syed, M. Khan, Nazeeruddin Mohammad, G. B. Brahim, Zubair A. Baig
{"title":"Unsupervised Machine Learning for Drone Forensics through Flight Path Analysis","authors":"N. Syed, M. Khan, Nazeeruddin Mohammad, G. B. Brahim, Zubair A. Baig","doi":"10.1109/ISDFS55398.2022.9800808","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800808","url":null,"abstract":"Drones have become prevalent for the sustenance of routine services including the delivery of goods, premise surveillance and for carrying out observation and reporting of phenomena, such as weather patterns. The vulnerability of a drone to a cyber attack is significant. The compromise of a drone in flight may cause flight path alteration, a crash and sabotage of sensitive captured data. In the event of such compromise, the process of investigating a captured and/or crashed drone as part of a digital forensic investigation could be tedious, due to data type, volume and availability. We propose an unsupervised machine learning-based approach for extracting forensically sound evidence from such drones and test its efficacy for a specific drone type, namely, DJI Phantom P4.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"44 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130772649","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Threat Modeling and Threat Intelligence System for Cloud using Splunk 基于Splunk的云威胁建模和威胁情报系统
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800787
Ananthapadmanabhan A, K. Achuthan
{"title":"Threat Modeling and Threat Intelligence System for Cloud using Splunk","authors":"Ananthapadmanabhan A, K. Achuthan","doi":"10.1109/ISDFS55398.2022.9800787","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800787","url":null,"abstract":"Threat modeling is one of the traditional mechanisms used for finding the potential threats in a system. Majority of the existing threat models rely on the possible ways of modeling attacks. This work proposes a combination of both threat modeling and threat intelligence for cloud systems using Splunk towards developing a comprehensive model. The existing cloud threat models rely on the types of attacks that are possible at certain phases of the system. The combined system proposed here is a granular model, that helps in capturing the potential threats based on the attacker's behavior after a data breach. The threat intelligence module existing in the system will help identify live threats. The integrated plugin which combines both the adversarial threat model and threat monitoring dashboard were able to categorise and monitor the activities happening in the cloud using Splunk.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126848679","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Detection of Network Anomalies with Machine Learning Methods 用机器学习方法检测网络异常
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800814
İhsan Rıza Kara, A. Varol
{"title":"Detection of Network Anomalies with Machine Learning Methods","authors":"İhsan Rıza Kara, A. Varol","doi":"10.1109/ISDFS55398.2022.9800814","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800814","url":null,"abstract":"The present study, aimed to detect cyber-attacks, and unexpected access requests on devices in the telecommunication networks, enabling the necessary measures to be taken early. With K-Nearest Neighbors (KNN) and Naive Bayes machine learning methods, predicted whether the raw data packets contain cyber-attack according to different properties of these packets using the UNSW-NB15 dataset. KNN algorithms with different K values and the Naive Bayes method were compared according to accuracy rates and the results were given in the table. As a result, changes in accuracy rates were observed according to different k neighbor values in the KNN algorithm. Higher accuracy rates than Naive Bayes were achieved in the models created with the KNN algorithm.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124266568","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
On the Digital Forensics of Social Networking Web-based Applications 基于web的社交网络应用的数字取证研究
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800839
Basheer Al-Duwairi, Ahmed S. Shatnawi, Hala Jaradat, Afnan Al-Musa, Hamzah Al-Awadat
{"title":"On the Digital Forensics of Social Networking Web-based Applications","authors":"Basheer Al-Duwairi, Ahmed S. Shatnawi, Hala Jaradat, Afnan Al-Musa, Hamzah Al-Awadat","doi":"10.1109/ISDFS55398.2022.9800839","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800839","url":null,"abstract":"The popularity and increased adoption of social networking applications have opened Internet users’ doors to conduct different malicious activities. This includes invasion of personal privacy, identity theft, blackmailing, harassment, bullying, fraud, etc. In this context, collecting evidence from social media applications offers invaluable information about users and their activities and interactions with each other. This paper illustrates the forensic procedure used to analyze and retrieve data from a web browser-based Tiktok application as one of the mainstream social networking applications. We mainly considered a scenario of logging into Tiktok from the Google Chrome web browser. The collected digital evidence includes essential information such as chat messages, shared links, uploaded videos, deleted videos, browsing history, etc.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"108 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115071845","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Swarm Intelligence Approach for Feature Selection Problem 特征选择问题的群体智能方法
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800815
Eva Tuba, Adis Alihodžić, Una Tuba, Romana Capor-Hrosik, M. Tuba
{"title":"Swarm Intelligence Approach for Feature Selection Problem","authors":"Eva Tuba, Adis Alihodžić, Una Tuba, Romana Capor-Hrosik, M. Tuba","doi":"10.1109/ISDFS55398.2022.9800815","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800815","url":null,"abstract":"Classification problems have been part of numerous real-life applications in fields of security, medicine, agriculture, and more. Due to the wide range of applications, there is a constant need for more accurate and efficient methods. Besides more efficient and better classification algorithms, the optimal feature set is a significant factor for better classification accuracy. In general, more features can better describe instances, but besides showing differences between instances of different classes, it can also capture many similarities that lead to wrong classification. Determining the optimal feature set can be considered a hard optimization problem for which different metaheuristics, like swarm intelligence algorithms can be used. In this paper, we propose an adaptation of hybridized swarm intelligence (SI) algorithm for feature selection problem. To test the quality of the proposed method, classification was done by k-means algorithm and it was tested on 17 benchmark datasets from the UCI repository. The results are compared to similar approaches from the literature where SI algorithms were used for feature selection, which proves the quality of the proposed hybridized SI method. The proposed method achieved better classification accuracy for 16 datasets. Higher classification accuracy was achieved while simultaneously reducing the number of used features.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"85 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130242963","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The Digital Forensics of Cyber-Attacks at Electrical Power Grid Substation 电网变电站网络攻击的数字取证
2022 10th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2022-06-06 DOI: 10.1109/ISDFS55398.2022.9800831
J. Pärssinen, P. Raussi, S. Noponen, Mikael Opas, J. Salonen
{"title":"The Digital Forensics of Cyber-Attacks at Electrical Power Grid Substation","authors":"J. Pärssinen, P. Raussi, S. Noponen, Mikael Opas, J. Salonen","doi":"10.1109/ISDFS55398.2022.9800831","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800831","url":null,"abstract":"Our research presented in this article comprises of network based cyber-attacks in a laboratory setup consisting of a power grid substation implemented as a hardware-in-the-loop simulation with hardware (Intelligent Electronic Devices a.k.a. IEDs), and the analysis on how these cyber-attacks can be detected using network forensics. The investigated cyber-attacks exploit the IEC 61850 MMS and GOOSE protocols, and one of the attacks has been already implemented in an existing malware. Additionally we organized a cybersecurity themed workshop for energy sector companies in Finland. The workshop participants were given a task to search for the aforementioned cyber-attacks from network traffic captures. The key finding from the workshop is that for the domain expert it is crucial to know different kind of cyber-attack scenarios in order to detect and mitigate them in a timely manner.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126779696","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信