Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jonghyun Kim, Ikkyun Kim
{"title":"Transmitted file extraction and reconstruction from network packets","authors":"Yangseo Choi, Jooyoung Lee, Sunoh Choi, Jonghyun Kim, Ikkyun Kim","doi":"10.1109/WorldCIS.2015.7359436","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359436","url":null,"abstract":"When hackers try to attack a target system, their first goal is to install a malware to the target system. It is because hackers can do anything what they want if a malware is installed. In the past, most of the malwares were Microsoft PE files, however they have been changed to various file formats such as pdf, jpg, doc, jar and so on. Under this circumstances some network security systems such as network forensics systems have to reconstruct those malwares from network packets to analyze the malwares. For that, we propose a file type signature and network protocol analysis based transmitted file reconstruction technique which can reconstruct various file types from network packets. In this paper, we show the implementation and file reconstruction results.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129523881","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Multiagent trust management of web services: the “asynchronous computing environment profile unification methodology” (acepum)","authors":"Khalil A. Abuosba","doi":"10.1109/WorldCIS.2015.7359413","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359413","url":null,"abstract":"Web services are considered as a major challenge for the information technology industry as they emerge from integration of several technologies adaptable within different architectures and platforms. Web Services are deployed within heterogeneous distributed environments; specifically B-2-B interactions are considered as critical-mission processes and services, the main goal for these processes is to provide a secured inter-organizational computing environment. Ion the web, we deploy web services on the web for the purpose of achieving reusability, interoperability, and standards utilization. Web services are based on interactions of peers where loosely coupled systems interact in anonymous computing environments. The environments of web services are considered more vulnerable to faults and incidents than tightly coupled services. In this paper; I introduce a token-based methodology which is utilized for the purpose of achieving trust between end points of communication. I introduce the Asynchronous Computing Environment Profile Unification Methodology (ACEPUM) as a vulnerability reduction methodology which audits the environment profile variables; this approach introduces several levels of trust management routines that addresses different aspects of security requirements.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131049283","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Forensic investigation and analysis on digital evidence discovery through physical acquisition on smartphone","authors":"T. Tajuddin, A. A. Manaf","doi":"10.1109/WorldCIS.2015.7359429","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359429","url":null,"abstract":"Cybercriminals are changing their strategies as users are less concerns on the smartphone and social networks security risks such as spams, that will threaten them as they are more dependent on the smartphone [1]. Thus, there's a need to perform the smartphone forensics analysis to retrieve and analysed the potentially great amounts and extremely valuable information on these devices. This paper investigates a wealth of personal and sensitive data by types of digital information as evidence and conducted forensic analysis on a popular smartphone Samsung Galaxy Note III. The standard approach applied to extract information from smartphone through physical acquisition and analysis using Cellebrite UFED. The results are presented to demonstrate the smartphone as a goldmine for investigators and as sources of digital evidence. Furthermore this research also presents the forensic tool and techniques for acquiring and examining digital evidence on this device. The evidence discovered include files, contacts, events of smartphone and social network data storage and location. The smartphone examined produced abundant user information and in total 98,127 artefacts were recovered. Performing the extraction and analysis of digital evidence over smartphone activities show the possibility of identifying potential suspects that could assist the forensic investigators in crime investigations.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123098510","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A cascaded feature selection approach in network intrusion detection","authors":"Yong Sun, Feng Liu","doi":"10.1109/WorldCIS.2015.7359426","DOIUrl":"https://doi.org/10.1109/WorldCIS.2015.7359426","url":null,"abstract":"Network intrusion detection research work that employed KDDCup 99 dataset often encounters challenges in creating classifiers that could handle unequal distributed attack categories. In such cases, classifier could not effectively learn the characteristics of rare categories, which will lead to a poor detection rate of rare categories. The efficiency of intrusion detection is mainly determined by the dimension of data features. According to the feature optimization selection problems of the rare attack categories detection, this paper proposes using the cascaded SVM classifiers to classify the non-rare attack categories and using BN classifiers to classify rare attack categories, combining with cascaded GFR feature selection method (CGFR). It selects feature subset for the rare attack categories and non rare attack categories respectively. The experimental results show that the CGFR method proposed in this paper can increase the detection rate of U2R and R2L to 89.4% and 49.2% respectively.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2015-10-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125556962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"PhD and doctorate consortium","authors":"C. Shoniregun","doi":"10.20533/wcsne.2015.0007","DOIUrl":"https://doi.org/10.20533/wcsne.2015.0007","url":null,"abstract":"The idea of writing a research paper or developing a topic of research interest that can lead to a PhD/Doctorate degree or proposal is always an endless thinking of where, when, why, what and who. Therefore, becoming an experienced researcher and writer in any field or discipline takes a great deal of practice. The Consortium has the following objectives: • Provide a supportive setting for feedback on current research that will stimulate exchange of ideas; • Guide on the future research directions; • Promote the development of a supportive community of scholars and a spirit of collaborative research; • Contribute to the conference goals through interaction with other researchers and conference events. The PhD and Doctorate Consortium highlights possible solutions in response to the lack of competence demonstrated by young researchers and PhD and Doctorate students, and the understanding of what contributes to knowledge gap.","PeriodicalId":234497,"journal":{"name":"2015 World Congress on Internet Security (WorldCIS)","volume":"76 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116730627","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}