{"title":"Big Data Architecture: Designing the Right Solution for Social Network Analysis","authors":"I. Agbo, A. Kupriyanov, I. Rytsarev","doi":"10.1109/ISDFS49300.2020.9116274","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116274","url":null,"abstract":"This paper highlights the link between social networks and Big Data, which is generated by its users and how the generated data is used by businesses to improve their products and services as well as to increase their profits. It goes on to give a concise overview of Big Data architecture, the various components involved, challenges faced when developing solutions, the process of retrieving, storing and processing datasets as well as recommendations to follow when designing architectures geared towards social network analysis.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116939470","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review of Image Segmentation Using MATLAB Environment","authors":"Awf Abdulrahman, Serkan Varol","doi":"10.1109/ISDFS49300.2020.9116191","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116191","url":null,"abstract":"Image segmentation is of great importance in understanding and analysing objects within images. The process involves dividing vague images into meaningful and useful ones by segmenting them and subsequently evaluating them based on colour density. This process is used in the medical, cultural and industrial fields, among others. There are many functions used in image segmentation, including edge and threshold functions. This paper will review these techniques, provide examples, and illustrate the types of applicable images.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"8 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123914553","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mirai Botnet In Lebanon","authors":"H. Idriss","doi":"10.1109/ISDFS49300.2020.9116456","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116456","url":null,"abstract":"The growth of the Internet of things (IoT) in the market of smart home and surveillance security raises the flag of new security risks, after the presence of new malware targeting IoT devices for creating a botnet. Mirai is one of the famous malware that used IoT bots to perform the most massive DDoS attack in botnet history. This paper will discuss the Mirai malware’s leading events and provide a brief of the famous variants created based on the Mirai source code. Finally, propose a detection and mitigation method to protect the system, taking into consideration the Lebanese industry and offering a methodology to make it Mirai Botnet resilient.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117037184","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Filtering Turkish Spam Using LSTM From Deep Learning Techniques","authors":"Ersin Enes Eryılmaz, Durmuş Özkan Şahin, E. Kılıç","doi":"10.1109/ISDFS49300.2020.9116440","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116440","url":null,"abstract":"E-mails are used effectively by people or communities who want to do propaganda, advertisement, and phishing because of their ease of use and low cost. People or communities who want to achieve their goals send unnecessary and spam to the e-mail accounts they never knew. These mails cause serious financial and moral damages to internet users and also engage in internet traffic. Unsolicited e-mails (spam) are a method sent to the recipient without their consent and generally for malicious or promotional purposes. In this study, spam was detected with Keras deep learning library on the Turkish dataset. Turkish email dataset contains 800 e-mails, half of which are spam e-mails. With the deep learning algorithm long short term memory (LSTM), a 100% accuracy rate has been achieved in the Turkish e-mail dataset.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"281 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Robust Copy-Move Forgery Detection In Digital Image Forensics Using SURF","authors":"Abdelhalim Badr, A. Youssif, Maged Wafi","doi":"10.1109/ISDFS49300.2020.9116433","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116433","url":null,"abstract":"In recent years, due to the technological revolution in editing digital images, various advanced image manipulating software has been used to build new unrealistic images without leaving traces of what happens, therefore tampering will be hard to detect visually. Digital image forgeries have many forms but still recognizing copy-move forgery is very challenging. Hence, this paper introduces a new robust algorithm to detect copy-move forgery based on Speeded Up Robust Feature (SURF) descriptor, Approximate Nearest Neighbor (ANN) as a feature matching, Simple Linear Iterative Clustering (SLIC) used as a clustering algorithm to divide the whole image into superpixel blocks. The doubted regions are determined by replacing the matched feature points with corresponding superpixel blocks then the neighboring blocks have been merged based on similar Local Color Features (LCF). Finally, morphological close operation applied to elicit the doubted forged regions. Proposed algorithm recorded a running time of 3.84 seconds with 91.95% localization accuracy applied on various datasets such as CoMoFoD, MICC-F2000, MICC-F220, and MICC-F600 for detecting tampered plain copy-move, duplicate regions, post-processing and pre-processing attacks like color reduction, blurring, brightness modifications, noise addition, geometric attacks, and JPEG compression as an evaluation of robustness.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122201888","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using ITIL 4 in Security Management","authors":"Derrick Berger, N. Shashidhar, C. Varol","doi":"10.1109/ISDFS49300.2020.9116257","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116257","url":null,"abstract":"Organizations of any size are tasked with managing security and risks of varying degrees of impact and complexity. Managing security can be one of the most intricate yet pervasive aspects of Information Technology Management. The service management philosophy that many organizations use is Information Technology Service Management (ITSM). Within ITSM, Information Technology Infrastructure Library (ITIL) is a set of best practices that can be used to manage security. The unique aspect of security incidents can be their sensitive nature. This sensitivity can complicate the management of security but does not preclude it from being managed in a way that is appropriate and effective for the organization. Due to the novelty of ITIL 4, there is a lack of research for effectively managing security incidents within an ITIL 4 framework. ITIL 4 represents a change in some of the core components of ITIL. This paper will examine how ITIL 4 can provide a framework for managing security.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"52 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124611471","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"An efficient IP core of Consultative Committee for Space Data Systems (CCSDS) Recommended Authenticated Cryptographic Algorithm","authors":"Deepa Muraleedharan, Sanil. K. Daniel","doi":"10.1109/ISDFS49300.2020.9116306","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116306","url":null,"abstract":"Mission planners are continuously striving to ensure that spacecraft, associated ground systems, communication equipment and all transmitted data are adequately protected against attacks. In this paper, we present an Intellectual Property (IP) Core of Advanced Encryption Standard/ Galois Counter Mode (AES/GCM) with 256-bit key in FPGA suited for space data systems. This is the algorithm recommended by Consultative Committee for Space Data Systems (CCSDS) in order to ensure confidentiality, authenticity and integrity of data. Since space missions are vulnerable to anomalies caused by Single Event Effects (SEE), our implementation does not use memory blocks in FPGA. Sub-field arithmetic is used in the implementation of Substitution Box (S-box) module. Efficient architectures are used in the design of the MixColumn with embedded ShiftRows and Key generation modules using XOR operations and avoiding conditional shifts. Shift and Add method is used to implement the Galois Field (GF) (2128) Multiplier in the GCM authentication function. The design is ported to the Xilinx Space Grade Virtex-4 device XQR4VLX200. The functionality of AES/GCM implementation is verified using standard test vectors from National Institute of Standards and Technology (NIST). An implementation of AES/GCM using one each of AES-256 and GF(2128) multiplication cores achieves a high resource efficiency of 18% slices and a maximum frequency of 139.725 MHz","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116590107","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review of the Internet of Things for Healthcare Monitoring","authors":"Twana Mustafa, A. Varol","doi":"10.1109/ISDFS49300.2020.9116305","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116305","url":null,"abstract":"These days, individuals are increasingly bound by indoor living, investing less energy outside. As a result, the importance of monitoring air quality inside to make indoor living progressively appropriate has risen immensely. The advancement of the Internet of Things (IoT) will significantly encourage patient analysis and monitoring procedures, as small IP-based wireless sensors can be placed on the patient’s body. For example, one’s blood pressure and coronary heart rate can be observed remotely and regularly using physiological parameters. Over the past few years, the IoT has experienced one of the most significant developments of the 21st century. The IoT describes a network of physical items, or “things,” that are embedded with sensors, software, and other technologies that are able to connect and exchange data with other devices and systems over the internet. These devices range from ordinary household objects to sophisticated industrial tools. There are more than seven billion connected IoT devices today, and experts are expecting this number to grow to 10 billion by 2020 and 22 billion by 2025. This paper attempts to review and understand the utilization of the IoT in customized healthcare and how excellent healthcare can be acquired at a low cost. We will clarify, in brief, how the IoT functions and how wireless and sensing systems are utilized in order to carry out efficient healthcare applications.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116632839","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multi-Key Homomorphic Encryption Create new Multiple Logic Gates and Arithmetic Circuit","authors":"Kok Seen Chong, C. Yap, Zheng Hong Tew","doi":"10.1109/ISDFS49300.2020.9116271","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116271","url":null,"abstract":"This is a feasibility study on homomorphic encryption using the MK-TFHE library in daily computing using cloud services. Logic gates OR, AND, XOR, XNOR, NOR were created. A basic set of arithmetic operations namely - addition, subtraction, multiplication and division were also created. This research is a continuation of a previous work and this peeks into the newly created logic gates on these arithmetic operations.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"114 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116451832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Database Security Threats and Challenges","authors":"Abdulazeez Mousa, M. Karabatak, Twana Mustafa","doi":"10.1109/ISDFS49300.2020.9116436","DOIUrl":"https://doi.org/10.1109/ISDFS49300.2020.9116436","url":null,"abstract":"with the growth and increasing sophistication of the Internet and the increasing dependence, it appeared more and more services over the Internet-based database, so it increases the risks facing databases. The number of attacks against these repositories has also increased. A database danger refers to an item, individual or other entity that poses a risk of misuse or manipulation of confidential data to an asset. Databases and computer properties are improperly secured in many business organizations. Databases should be protected rather than any system (device) in the enterprise. Most database security features have to be developed to secure the database environment. The aim of the paper is to underline the types of threats and challenges and their impact on sensitive data and to present different safety models. The assumption underpinning this study is that it understands the weaknesses, threats and challenges faced by databases, Database administrators will then work on developing a security strategy to help secure their databases.","PeriodicalId":221494,"journal":{"name":"2020 8th International Symposium on Digital Forensics and Security (ISDFS)","volume":"39 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128230905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}