2019 7th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
Experience of Incorporating NIST Standards in a Digital Forensics Curricula* 在数字取证课程中纳入NIST标准的经验*
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757533
Sankardas Roy, Yan Wu, Kristina N. LaVenia
{"title":"Experience of Incorporating NIST Standards in a Digital Forensics Curricula*","authors":"Sankardas Roy, Yan Wu, Kristina N. LaVenia","doi":"10.1109/ISDFS.2019.8757533","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757533","url":null,"abstract":"Recently, Bowling Green State University (BGSU) has started to offer a Digital Forensics specialization program for Computer Science undergraduate students. We (the authors of this paper) actively took part in developing and evaluating the curricula for this program. The overarching goal of the specialization program is to build a digital forensics workforce for the state and the nation. Realizing the importance of standards of digital forensics tools in real-life forensic examinations, we made an effort to incorporate lessons on standardization in the curricula. In particular, so far we incorporated National Institute of Standards and Technology (NIST) standards for three digital forensics topics (Hardware Write Blocker, Deleted File Recovery, and Mobile Forensics) in the curricula. We faced many challenges over the journey but also attained some success. In this paper we share our experience to the community. We believe this account may be helpful to others who are about to begin such a journey.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131125809","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria 防盗与手机追踪的问题与展望:以尼日利亚为例
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757527
Iliyasu Yahaya Adam, C. Varol, A. Varol
{"title":"Problems and Prospects of Anti-Theft and Mobile Phone Tracking: A case in Nigeria","authors":"Iliyasu Yahaya Adam, C. Varol, A. Varol","doi":"10.1109/ISDFS.2019.8757527","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757527","url":null,"abstract":"The study addresses some security challenges and opportunities brought by mobile phone tracking technologies, especially in the business of selling and buying used handsets. Cases, for instant, arise on the issue of stolen or missing phones. Some of the cases may involve the police, who make digital investigations to apprehend the culprits. However, as a result of some complainants' inability to provide details that will aid the police in making successful investigation, an innocent person or persons may be mistakenly apprehended as the culprit of a phone-theft related crime. The paper reviews literature on Anti-Theft and mobile tracking technologies, with the aim of providing guidance and awareness for phone owners and the potential buyers/sellers of used mobile phones who want to protect their handsets against any other GSM related issues.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121266905","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Trust Management Model for IoT 物联网信任管理模型
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757505
Ahmed Abdlrazaq, Serkan Varol
{"title":"A Trust Management Model for IoT","authors":"Ahmed Abdlrazaq, Serkan Varol","doi":"10.1109/ISDFS.2019.8757505","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757505","url":null,"abstract":"The Internet of Things (IoT) is profoundly influencing our daily lives in many areas, covering small devices to large network systems. An IoT system may be a set of directing rules that rearranges the usage of IoT applications. This paper details a trust management model and security of IoT systems. Trust management models and security play a critical part in IoT to protect information and devices from attacks since it supplies security for all layers and networks. This review focuses on how a trust management model has a significant function in IoT in enhancing reliability, privacy, and security. In this survey, we explained the challenges along with the solutions in terms of IoT security and privacy and recognized the main security problem in the IoT framework. In addition, this paper explored the characteristics of trust and pointed out some IoT security challenges, explaining how middleware can affect the security of IoT.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"64 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134194078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
Digital Forensics: Focusing on Image Forensics 数字取证:专注于图像取证
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757557
Rayan Sulaiman Khalaf, A. Varol
{"title":"Digital Forensics: Focusing on Image Forensics","authors":"Rayan Sulaiman Khalaf, A. Varol","doi":"10.1109/ISDFS.2019.8757557","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757557","url":null,"abstract":"The world is continuously developing, and people's needs are increasing as well; so too are the number of thieves increasing, especially electronic thieves. For that reason, companies and individuals are always searching for experts who will protect them from thieves, and these experts are called digital investigators. Digital forensics has a number of branches and different parts, and image forensics is one of them. The budget for the images branch goes up every day in response to the need. In this paper we offer some information about images and image forensics, image components and how they are stored in digital devices and how they can be deleted and recovered. We offer general information about digital forensics, focusing on image forensics.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"297 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116520230","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks 车载Ad-hoc网络现实攻击场景分析
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757500
J. Lastinec, Mario Keszeli
{"title":"Analysis of Realistic Attack Scenarios in Vehicle Ad-hoc Networks","authors":"J. Lastinec, Mario Keszeli","doi":"10.1109/ISDFS.2019.8757500","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757500","url":null,"abstract":"The pace of technological development in automotive and transportation has been accelerating rapidly in recent years. Automation of driver assistance systems, autonomous driving, increasing vehicle connectivity and emerging inter-vehicular communication (V2V) are among the most disruptive innovations, the latter of which also raises numerous unprecedented security concerns. This paper is focused on the security of V2V communication in vehicle ad-hoc networks (VANET) with the main goal of identifying realistic attack scenarios and evaluating their impact, as well as possible security countermeasures to thwart the attacks. The evaluation has been done in OMNeT++ simulation environment and the results indicate that common attacks, such as replay attack or message falsification, can be eliminated by utilizing digital signatures and message validation. However, detection and mitigation of advanced attacks such as Sybil attack requires more complex approach. The paper also presents a simple detection method of Sybil nodes based on measuring the signal strength of received messages and maintaining reputation of sending nodes. The evaluation results suggest that the presented method is able to detect Sybil nodes in VANET and contributes to the improvement of traffic flow.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"278 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122836762","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 13
Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation Zigbee、Z-Wave、Wi-Fi和蓝牙无线技术在家庭自动化中的应用比较
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757472
Salim Jibrin Danbatta, A. Varol
{"title":"Comparison of Zigbee, Z-Wave, Wi-Fi, and Bluetooth Wireless Technologies Used in Home Automation","authors":"Salim Jibrin Danbatta, A. Varol","doi":"10.1109/ISDFS.2019.8757472","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757472","url":null,"abstract":"Most of the home automation wireless technologies on the internet of things are based on ZigBee, Z-Wave, Wi-Fi, and Bluetooth wireless technologies. While these solutions are good enough, users of smart homes are facing challenges of selecting the best technology. This paper compares the performance of ZigBee, Z-Wave Wi-Fi and Bluetooth technologies from the user's perspective. Power consumption, range, cost, ease of use, scalability, and interoperability are the six indices developed as guidelines to potential users, and hence, the results of this study. With this knowledge, the users can make the appropriate choice of wireless technology solution to use in their home automation systems.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"115 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124410570","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
A New Model for Creating Layer Planes Using Steganography for Text Hiding 基于隐写术的文本隐藏层平面创建新模型
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757498
Shalaw Mshir, A. Varol
{"title":"A New Model for Creating Layer Planes Using Steganography for Text Hiding","authors":"Shalaw Mshir, A. Varol","doi":"10.1109/ISDFS.2019.8757498","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757498","url":null,"abstract":"Steganography is the art and science of hiding messages in a secret way such that only the sender and receiver know. This allows one party to communicate with another without a third party knowing that the connection is taking place. Here, the data is hidden inside a safe “cover”, where even if a third party can capture the cover, there will be nothing to show what data is hidden inside. Meanwhile, the cover can be an image, sound, video or document. Steganography has two primary aspects: security - whether the hidden data is perceptible by either a person or a computer; and capacity - how much data can be hidden in a given cover file. Because the system works within a spatial domain, it can hide a large amount of information, while embedding and extraction processes require less time in terms of execution than methods using transform domains. This paper explains how to use steganography through a modern technique with a practical understanding.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129642092","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A Research on Security Vulnerabilities in Online and Mobile Banking Systems 网络银行和移动银行系统安全漏洞研究
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757495
N. Yildirim, A. Varol
{"title":"A Research on Security Vulnerabilities in Online and Mobile Banking Systems","authors":"N. Yildirim, A. Varol","doi":"10.1109/ISDFS.2019.8757495","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757495","url":null,"abstract":"Mobil and online banking becomes one of the most important technologies that will not lose its popularity with new technology features added every day for the convenience of the user. Most of the financial companies offer mobile and online banking applications to their customers. Security, privacy and customer privacy in online and mobile banking have become important. Security risks in mobile and online banking, especially in mobile banking is a major problem for the banks and the users because of the innovations brought by the technology and security gaps in every innovation. The banking system offers various security solutions for mobile and online banking security. In this research paper, security threats and security measures in mobile and online banking systems are examined.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"116 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132849962","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Feature Extraction of ECG Signal by using Deep Feature 基于深度特征的心电信号特征提取
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757522
A. Diker, E. Avci
{"title":"Feature Extraction of ECG Signal by using Deep Feature","authors":"A. Diker, E. Avci","doi":"10.1109/ISDFS.2019.8757522","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757522","url":null,"abstract":"The analysis and classification of Electrocardiogram (ECG) signals have become very important tool to diagnose of heart disorders. Computer-aided techniques are generally used to classify biomedical application areas. In this paper, we aim to feature extraction and classification of ECG signals. Accordingly, an open access ECG database in Physionet was employed in order to separate normal and abnormal of ECG records. Deep feature approach which is based on Convolutional Neural Network (CNN) was applied to taking out important features of heart recordings. Afterward, Extreme Learning Machine (ELM) was applied to the ECG records. The average precision value metric was used to the performance of the classification performed. In this content, it was noticed classification success values were achieved to accuracy % 88.33, sensitivity %89.47 and specificity % 87.80 with ELM.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134362159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
A Survey on Backbone Attack 骨干攻击研究综述
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757546
Ebu Yusuf Guven, Mehmet Yavuz Yağci, A. Boyacı, Serhan Yarkan, M. Aydin
{"title":"A Survey on Backbone Attack","authors":"Ebu Yusuf Guven, Mehmet Yavuz Yağci, A. Boyacı, Serhan Yarkan, M. Aydin","doi":"10.1109/ISDFS.2019.8757546","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757546","url":null,"abstract":"The Internet is the universal network infrastructure that surrounds the Earth with thousands of devices and connections that make up it. The communication of various technologies from data centers to personal smartphones is provided through this infrastructure. While end devices are renewed as technology and product in short periods, network devices such as switches and routers, where communication is provided, can work for many years and work with out-of-date software and protocols. Therefore, it is clear how important the weaknesses are. Internet communication protocols are designed with security concerns in mind instead of communication speed and bandwidth. Even though researchers work intensively on wireless networks, the security of the infrastructure that connects wireless networks is ignored. In this study, we examined the attacks on OSI layer 2 and layer 3 layers made to the devices that constitute the backbone of the Internet infrastructure. Although several security measures and updates have been published for some of these attacks, the vulnerabilities that may occur in outdated devices are revealed.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131331555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信