2015 World Congress on Internet Security (WorldCIS)最新文献

筛选
英文 中文
Transmitted file extraction and reconstruction from network packets 传输文件提取和重建从网络数据包
2015 World Congress on Internet Security (WorldCIS) Pub Date : 2015-10-01 DOI: 10.1109/WorldCIS.2015.7359436
Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jonghyun Kim, Ikkyun Kim
{"title":"Transmitted file extraction and reconstruction from network packets","authors":"Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jonghyun Kim, Ikkyun Kim","doi":"10.1109/WorldCIS.2015.7359436","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359436","url":null,"abstract":"When hackers try to attack a target system, their first goal is to install a malware to the target system. It is because hackers can do anything what they want if a malware is installed. In the past, most of the malwares were Microsoft PE files, however they have been changed to various file formats such as pdf, jpg, doc, jar and so on. Under this circumstances some network security systems such as network forensics systems have to reconstruct those malwares from network packets to analyze the malwares. For that, we propose a file type signature and network protocol analysis based transmitted file reconstruction technique which can reconstruct various file types from network packets. In this paper, we show the implementation and file reconstruction results.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129523881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multiagent trust management of web services: the “asynchronous computing environment profile unification methodology” (acepum) web服务的多代理信任管理:“异步计算环境概要统一方法”(acepum)
2015 World Congress on Internet Security (WorldCIS) Pub Date : 2015-10-01 DOI: 10.1109/WorldCIS.2015.7359413
Khalil A. Abuosba
{"title":"Multiagent trust management of web services: the “asynchronous computing environment profile unification methodology” (acepum)","authors":"Khalil A. Abuosba","doi":"10.1109/WorldCIS.2015.7359413","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359413","url":null,"abstract":"Web services are considered as a major challenge for the information technology industry as they emerge from integration of several technologies adaptable within different architectures and platforms. Web Services are deployed within heterogeneous distributed environments; specifically B-2-B interactions are considered as critical-mission processes and services, the main goal for these processes is to provide a secured inter-organizational computing environment. Ion the web, we deploy web services on the web for the purpose of achieving reusability, interoperability, and standards utilization. Web services are based on interactions of peers where loosely coupled systems interact in anonymous computing environments. The environments of web services are considered more vulnerable to faults and incidents than tightly coupled services. In this paper; I introduce a token-based methodology which is utilized for the purpose of achieving trust between end points of communication. I introduce the Asynchronous Computing Environment Profile Unification Methodology (ACEPUM) as a vulnerability reduction methodology which audits the environment profile variables; this approach introduces several levels of trust management routines that addresses different aspects of security requirements.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone 智能手机上实物采集的数字证据发现的司法调查分析
2015 World Congress on Internet Security (WorldCIS) Pub Date : 2015-10-01 DOI: 10.1109/WorldCIS.2015.7359429
T. Tajuddin, A. A. Manaf
{"title":"Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone","authors":"T. Tajuddin, A. A. Manaf","doi":"10.1109/WorldCIS.2015.7359429","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359429","url":null,"abstract":"Cybercriminals are changing their strategies as users are less concerns on the smartphone and social networks security risks such as spams, that will threaten them as they are more dependent on the smartphone [1]. Thus, there's a need to perform the smartphone forensics analysis to retrieve and analysed the potentially great amounts and extremely valuable information on these devices. This paper investigates a wealth of personal and sensitive data by types of digital information as evidence and conducted forensic analysis on a popular smartphone Samsung Galaxy Note III. The standard approach applied to extract information from smartphone through physical acquisition and analysis using Cellebrite UFED. The results are presented to demonstrate the smartphone as a goldmine for investigators and as sources of digital evidence. Furthermore this research also presents the forensic tool and techniques for acquiring and examining digital evidence on this device. The evidence discovered include files, contacts, events of smartphone and social network data storage and location. The smartphone examined produced abundant user information and in total 98,127 artefacts were recovered. Performing the extraction and analysis of digital evidence over smartphone activities show the possibility of identifying potential suspects that could assist the forensic investigators in crime investigations.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
A cascaded feature selection approach in network intrusion detection 网络入侵检测中的级联特征选择方法
2015 World Congress on Internet Security (WorldCIS) Pub Date : 2015-10-01 DOI: 10.1109/WorldCIS.2015.7359426
Yong Sun, Feng Liu
{"title":"A cascaded feature selection approach in network intrusion detection","authors":"Yong Sun, Feng Liu","doi":"10.1109/WorldCIS.2015.7359426","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359426","url":null,"abstract":"Network intrusion detection research work that employed KDDCup 99 dataset often encounters challenges in creating classifiers that could handle unequal distributed attack categories. In such cases, classifier could not effectively learn the characteristics of rare categories, which will lead to a poor detection rate of rare categories. The efficiency of intrusion detection is mainly determined by the dimension of data features. According to the feature optimization selection problems of the rare attack categories detection, this paper proposes using the cascaded SVM classifiers to classify the non-rare attack categories and using BN classifiers to classify rare attack categories, combining with cascaded GFR feature selection method (CGFR). It selects feature subset for the rare attack categories and non rare attack categories respectively. The experimental results show that the CGFR method proposed in this paper can increase the detection rate of U2R and R2L to 89.4% and 49.2% respectively.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
PhD and doctorate consortium 博士及博士联盟
2015 World Congress on Internet Security (WorldCIS) Pub Date : 1900-01-01 DOI: 10.20533/wcsne.2015.0007
C. Shoniregun
{"title":"PhD and doctorate consortium","authors":"C. Shoniregun","doi":"10.20533/wcsne.2015.0007","DOIUrl":"https://doi.org/10.20533/wcsne.2015.0007","url":null,"abstract":"The idea of writing a research paper or developing a topic of research interest that can lead to a PhD/Doctorate degree or proposal is always an endless thinking of where, when, why, what and who. Therefore, becoming an experienced researcher and writer in any field or discipline takes a great deal of practice. The Consortium has the following objectives: • Provide a supportive setting for feedback on current research that will stimulate exchange of ideas; • Guide on the future research directions; • Promote the development of a supportive community of scholars and a spirit of collaborative research; • Contribute to the conference goals through interaction with other researchers and conference events. The PhD and Doctorate Consortium highlights possible solutions in response to the lack of competence demonstrated by young researchers and PhD and Doctorate students, and the understanding of what contributes to knowledge gap.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信