Eduardo Martínez, C. Varol, N. Shashidhar, Van Vung Pham
{"title":"Development of a Forensic Toolkit for Small-Medium Size Business (SMB)","authors":"Eduardo Martínez, C. Varol, N. Shashidhar, Van Vung Pham","doi":"10.1109/ISDFS55398.2022.9800828","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800828","url":null,"abstract":"With the increasing rate of digitalization around the world, more and more small-medium size businesses (SMBs) now depend on technology. Sources claim that more than half of SMBs experience cyberattacks, which leave certain artefacts that can be used as information to reveal the cause of the attack, if processed and analyzed correctly. This work proposes a portable toolkit that aims to assist users in the extraction and identification of forensic data for SMBs. Through its graphical interface, users will be able to select which type of information they would like to extract, by selecting the appropriate built-in tool.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126592154","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Towards A Framework for Preprocessing Analysis of Adversarial Windows Malware","authors":"N. D. Schultz, Adam Duby","doi":"10.1109/ISDFS55398.2022.9800812","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800812","url":null,"abstract":"Machine learning for malware detection and classification has shown promising results. However, motivated adversaries can thwart such classifiers by perturbing the classifier’s input features. Feature perturbation can be realized by transforming the malware, inducing an adversarial drift in the problem space. Realizable adversarial malware is constrained by available software transformations that preserve the malware’s original semantics yet perturb its features enough to cross a classifier’s decision boundary. Further, transformations should be plausible and robust to preprocessing. If a defender can identify and filter the adversarial noise, then the utility of the adversarial approach is decreased. In this paper, we examine common adversarial techniques against a set of constraints that expose each technique’s realizability. Our observations indicate that most adversarial perturbations can be reduced through forensic preprocessing of the malware, highlighting the advantage of forensic analysis prior to classification.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133333281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT DDoS Traffic Detection Using Adaptive Heuristics Assisted With Machine Learning","authors":"Rani Al Rahbani, Jawad Khalife","doi":"10.1109/ISDFS55398.2022.9800786","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800786","url":null,"abstract":"DDoS is a major issue in network security and a threat to service providers that renders a service inaccessible for a period of time. The number of Internet of Things (IoT) devices has developed rapidly. Nevertheless, it is proven that security on these devices is frequently disregarded. Many detection methods exist and are mostly focused on Machine Learning. However, the best method has not been defined yet. The aim of this paper is to find the optimal volumetric DDoS attack detection method by first comparing different existing machine learning methods, and second, by building an adaptive lightweight heuristics model relying on few traffic attributes and simple DDoS detection rules. With this new simple model, our goal is to decrease the classification time. Finally, we compare machine learning methods with our adaptive new heuristics method which shows promising results both on the accuracy and performance levels.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"30 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133886484","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Bilyaminu Muhammad, F. Özkaynak, A. Varol, T. Tuncer
{"title":"A Novel Deep Feature Extraction Engineering for Subtypes of Breast Cancer Diagnosis: A Transfer Learning Approach","authors":"Bilyaminu Muhammad, F. Özkaynak, A. Varol, T. Tuncer","doi":"10.1109/ISDFS55398.2022.9800813","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800813","url":null,"abstract":"Feature extraction from histological images is a challenging part of computer-aided detection of breast cancer. For this research, we present a novel technique for deep feature extraction for breast cancer diagnosis subtypes based on a transfer learning approach using the BreaKhis dataset. This approach consists of five phases: feature extraction, concatenation, transformation, selection, and classification. In the first phase, nineteen pre-trained convolutional neural networks were used as feature extractors to extract features from the input images. A Support Vector Machine was used at the feature extraction phase to calculate the misclassification rate of each feature generated by the pre-trained networks used. The feature extraction results showed that the two networks achieved the highest accuracy on the dataset and outperformed the other networks. The two networks considered were selected and connected to create the DRNet model, combining the pre-trained networks ResNet50 and DenseNet201. The extracted features were decomposed into five sub-hand low-level features using a multilevel discrete wavelet transform in the transformation phase. An iterative neighborhood component analyzer was used to select the minimum number of features needed in the classification phase. A cubic support vector machine was used as a classifier in the final phase. Average classification accuracy of 98.61%, 98.04%, 97.68%, and 97.71% for the 40×, 100×, 200×, and 400× magnification levels, respectively, was achieved.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128483315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Outlier detection to Secure Wireless Sensor Networks Based on iForest","authors":"Muhammad R. Ahmed, T. Myo, Badar Al Baroomi","doi":"10.1109/ISDFS55398.2022.9800792","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800792","url":null,"abstract":"Wireless sensor networks (WSN) make use of low-cost and multifunctional nodes with limited at short distances utilizing wireless connectivity. It's an open media platform and it's based on application-driven technology. In addition to military applications, it can be used for environmental monitoring, the health sector, and to respond to emergencies as well. WSN security had attracted a great deal of attention due to its nature and application scenario. Construction of nodes and distributed network infrastructure is prone to a variety of attacks. To ensure its functionality of WSNs, security mechanisms are essential. In the WSN, one of the concerns is provisioning of the security with less powerful nodes and small network. The Isolation Forest algorithm is used in this study to detect the outlier nodes in WSN to secure the network. The research was carried out with a hundred nodes WSNs for temperature data. The result gave a promising result to implement in hardware structure in future.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125587998","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"CyberSoc Implementation Plan","authors":"Mário Saraiva, N. Coelho","doi":"10.1109/ISDFS55398.2022.9800819","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800819","url":null,"abstract":"Cybersecurity operations centers (CyberSoc) should have all they need to defend the ever-changing information technology (IT) company today. This comprises a diverse set of advanced detection and prevention tools, a virtual sea of cyber intelligence reporting, and access to a rapidly growing pool of experienced IT experts. Despite this, most CyberSoc fail to keep the enemy (even the most inexperienced) out of the enterprise. The odds are stacked heavily against the defense. While the attacker only needs to identify one way in, the defenders must protect all entry points, restrict and analyze damage, and locate and eliminate adversary points of presence in business systems. Furthermore, cybersecurity professionals are increasingly aware that capable adversaries may and will get permanent access to company networks. As if the situation wasn’t horrible enough, we are frequently our own worst enemies. Many CyberSocs devote more time and effort to dealing with politics and human concerns than to detecting and responding to cyber threats. All too frequently, CyberSocs are established and run with a sole focus on technology, neglecting to address people and process challenges. The major goal of this work is to provide as a guide for when a CyberSoc implementation is required.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127885810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ISDFS 2022 Cover Page","authors":"","doi":"10.1109/isdfs55398.2022.9800783","DOIUrl":"https://doi.org/10.1109/isdfs55398.2022.9800783","url":null,"abstract":"","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"47 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126049653","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Phishing URL classification using Extra-Tree and DNN","authors":"Habiba Bouijij, A. Berqia, H. Saliah-Hassane","doi":"10.1109/ISDFS55398.2022.9800795","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800795","url":null,"abstract":"Machine Learning (ML) and Deep Learning (DL) methods have become indispensable in cybersecurity. Recently, they are often used to detect and classify phishing websites. Phishing websites are a major problem that has a negative impact on organization and of societies. Statistics report that the number of phishing website is continuously increasing and it is becoming more difficult to detect them. Various works have shown that ML and DL can be efficient to solve this problem. In this work, we adopted lexical analysis and Tiny URL approaches for URL features extraction. The accuracy metric obtained surpasses 98% for Extra Tree algorithm and can achieve 99% for Deep Neural Network model.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115844225","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
A. Antunes, Miguel V. P. R. Meneses, Joaquim Gonçalves, A. C. Braga
{"title":"An Intelligent System to Detect Drowsiness at the Wheel","authors":"A. Antunes, Miguel V. P. R. Meneses, Joaquim Gonçalves, A. C. Braga","doi":"10.1109/ISDFS55398.2022.9800836","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800836","url":null,"abstract":"Drowsiness is one of the causes of road accidents with higher fatality rate and even though it has been studied over the years, there is still no solution that can mitigate this problem from a low cost perspective. Thereby, artificial intelligence will be used to predict drowsiness and develop a non-intrusive and low-cost system using a wearable device that is capable of alerting the driver before they exhibit any signs. The aim of this work is to present the results achieved in the first stage, where driving simulations were conducted and video information, subjective reporting and physiological-based data were collected. Drowsiness levels and eye blinks were extracted from analysis of the participants’ videos, in addition to simulation based information, such as speed variations and road accidents, allowing to classify the driver’s state. Multivariate statistical process control was the method implemented, considering the Heart Rate Variability (HRV) and Electroencephalography (EEG) information. Using this methodology, it was able to detect the transition between the different drowsiness phases. Although the results are promising, there are still missing analyses, such as the application of Machine Learning (ML) techniques to classify the drowsy state and identify the best subset of features capable of detecting this state. Besides this, data analysis must be done to understand how drowsiness can be predicted. Finally, the proposed solution must be implemented in a real environment.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123955273","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Process standardization: the driving factor for bringing artificial intelligence and management analytics to SMEs","authors":"Joaquim P. Silva, Joaquim Gonçalves","doi":"10.1109/ISDFS55398.2022.9800804","DOIUrl":"https://doi.org/10.1109/ISDFS55398.2022.9800804","url":null,"abstract":"Information Technology (IT) use is continuously broadening to new domains and applying to different applications. Today, Artificial Intelligence (AI) and management analytics are two of the most promising technologies that are being embedded into many applications. However, using AI and management analytics to solve specific problems and support decision-making requires custom developments and specialized personnel, which are not easily reachable for SMEs. In this paper, we argue that the standardization of processes will allow the integration of AI and management analytics capabilities into the IT business applications used by SMEs. This paper identifies three relevant drivers that are powering process standardization in SMEs. This thesis is backed by an analysis of IT trends and the discussion of distinct views about the use of AI and management analytics.","PeriodicalId":114335,"journal":{"name":"2022 10th International Symposium on Digital Forensics and Security (ISDFS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-06-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117149025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}