2019 7th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
Security Enhancement in Storage Area Network 存储区域网络的安全增强
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757492
Souheil Chukry, Hassan Sbeyti
{"title":"Security Enhancement in Storage Area Network","authors":"Souheil Chukry, Hassan Sbeyti","doi":"10.1109/ISDFS.2019.8757492","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757492","url":null,"abstract":"Living in the age of digital transformation, companies and individuals are moving to public and private clouds to store and retrieve information, hence the need to store and retrieve data is exponentially increasing. Existing storage technologies such as DAS are facing a big challenge to deal with these huge amount of data. Hence, newer technologies should be adopted. Storage Area Network (SAN) is a distributed storage technology that aggregates data from several private nodes into a centralized secure place. Looking at SAN from a security perspective, clearly physical security over multiple geographical remote locations is not adequate to ensure a full security solution. A SAN security framework needs to be developed and designed. This work investigates how SAN protocols work (FC, ISCSI, FCOE). It also investigates about other storages technologies such as Network Attached Storage (NAS) and Direct Attached Storage (DAS) including different metrics such as: IOPS (input output per second), Throughput, Bandwidths, latency, cashing technologies. This research work is focusing on the security vulnerabilities in SAN listing different attacks in SAN protocols and compare it to other such as NAS and DAS. Another aspect of this work is to highlight performance factors in SAN in order to find a way to improve the performance focusing security solutions aimed to enhance the security level in SAN.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133067209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Comparative study of COAP and MQTT communication protocols COAP和MQTT通信协议的比较研究
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757486
Samer Hamdani, Hassan Sbeyti
{"title":"A Comparative study of COAP and MQTT communication protocols","authors":"Samer Hamdani, Hassan Sbeyti","doi":"10.1109/ISDFS.2019.8757486","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757486","url":null,"abstract":"Internet of things (IOT) technology consists of nonstop data emitter small devices, sensor nodes and gateways. Structured and unstructured data delivered mainly through internet connection, cause heterogeneous and enormous data transmission. The IOT ecosystem is a composition of heterogeneous smart objects like actuators; sensors having the main purpose of insuring the interconnectivity of all its components that functions in our daily industrial and educational life, as well as our daily security. In addition toIOT devices allowing the monitoring of humans, they also are interacting together like mobile devices, health monitor gadgets, heart beat integrated sensors, fitness bands, Patient Workup and surgical Medical Equipment. This myriad of devices highlights the challenge of how to accomplish all these goals with the tiny capabilities, since all of them are equipped with light resources with affordability limitations, in addition to little power sources availability (devices that might need to function for years with being recharged). Scalability is main purpose for an efficient IOT ecosystem. At devices level this efficiency could be accomplished mainly through three essential factors: energy, resources and network usage to support the large amount of bandwidth transmitted by the overall systems devices. Here appears the important role of communication protocol stack that main ruin these tiny devices resources while transmitting large bandwidth data, insuring data delivery, uncontrollable latency or scattered inefficient iterating processes. In this paper, we have designed and implemented two client applications: first based on Message Queue Telemetry Transport (MQTT) and the second on Constrained Application Protocol (CoAP) in order to monitor and compare the impact of these two communications over IOT eco system functionality, alongside energy consumption, resources usage on devices, latency and data bandwidth produces over network.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"45 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130964415","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Review of Chaotic Based S-Box Structures 基于混沌的s盒结构研究进展
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757513
Ayşe Cenğiz, Derya Avcı
{"title":"Review of Chaotic Based S-Box Structures","authors":"Ayşe Cenğiz, Derya Avcı","doi":"10.1109/ISDFS.2019.8757513","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757513","url":null,"abstract":"The design of the S - box is important to ensure immediate security at the attack. System security increases when s-box systems are formed with a chaotic base. In this paper, the methods used to create chaotic based s-boxes were investigated and a literature study was conducted.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130061770","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Performance Comparison of Classification Algorithms for The Diagnosis of Mastitis Disease in Dairy Animals 奶牛乳腺炎诊断分类算法的性能比较
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757469
E. Tanyildizi, Gökçe Yildirim
{"title":"Performance Comparison of Classification Algorithms for The Diagnosis of Mastitis Disease in Dairy Animals","authors":"E. Tanyildizi, Gökçe Yildirim","doi":"10.1109/ISDFS.2019.8757469","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757469","url":null,"abstract":"Mastitis is a disease that occurs in milk-giving organisms and can reach fatal dimensions especially in dairy animals. This disease, which is usually caused by bacteria, causes significant changes in the physical and chemical structure of milk. Early diagnosis and treatment are very important because the life span of animals is shorter than that of humans. Data mining methods methods are frequently used in early diagnosis systems. Data mining is divided into several sub-branches. Classification is one of these sub-branches. In this study, some classification algorithms like J48, Random Forest, Support Vector Machines, k-nearest Neighbor Algorithm and Naive Bayes Algorithm are used and their performance is compared. These algorithms are applied to the Mastitis data set obtained from the total hundred animals and their performance is given. The results show that J48 algorithm has the best performance with the accuracy rate of 98%.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115625159","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Stenography Application for Hiding Student Information into an Image 一个将学生信息隐藏到图像中的速记应用程序
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-10 DOI: 10.1109/ISDFS.2019.8757516
Yıldıray Yiğit, M. Karabatak
{"title":"A Stenography Application for Hiding Student Information into an Image","authors":"Yıldıray Yiğit, M. Karabatak","doi":"10.1109/ISDFS.2019.8757516","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757516","url":null,"abstract":"Information security is a major problem today. Different approaches and methods are introduced every day for data protection. One of them is steganography. The word steganography combines the Greek words steganos , meaning “covered, concealed, or protected,” and graphein meaning “writing”. The purpose of steganography is to construct the stego object by placing important information invisible into the ordinary cover object (image, sound, video, text, etc.) and to transmit it to the recipient. In this study, it is aimed to strengthen the LSB technique which is one of the steganography methods by suggesting the use of mask which will provide the least change on the image while hiding the data into a digital image. In the proposed method, the data is also compressed by the LZW algorithm, thus allowing more data to be hidden.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129563874","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
Refactoring Code Clone Detection 重构代码克隆检测
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757479
Z. S. Othman, Mehmet Kaya
{"title":"Refactoring Code Clone Detection","authors":"Z. S. Othman, Mehmet Kaya","doi":"10.1109/ISDFS.2019.8757479","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757479","url":null,"abstract":"Refactoring duplicate code is an important issue and is one of the most important smells in software maintenance. There is an important relationship between clones and code quality. Most programmers use clones because they are cheaper and faster than typing the program code. A cloning code is created by copying and pasting the existing code fragments of the source code with or without slight modifications. A major part (5% to 10%) of the source code for large computer programs consists of copy codes. Since cloning is believed to reduce the possibility of software maintenance, many techniques and cloning detection tools have been recommended for this purpose. The basic goal of clone detection is to identify the clone code and replace it with a single call to the function, where the function simulates the behavior of one instance of the clone group. This research provides an overview of the refactoring IDE. The aspects of cloning and detection of cloning are explained. In the copy detection algorithm, the source code is created in XML format.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115644778","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Measuring the effects of emojis on Turkish context in sentiment analysis 情感分析中表情符号对土耳其语语境的影响
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757554
Çağatay Ünal Yurtoz, I. B. Parlak
{"title":"Measuring the effects of emojis on Turkish context in sentiment analysis","authors":"Çağatay Ünal Yurtoz, I. B. Parlak","doi":"10.1109/ISDFS.2019.8757554","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757554","url":null,"abstract":"Automatic detection of sentiments is considered among complex problems in social applications. In information security, emojis are used in several interfaces for user authentication, antropomorphic secure access and remote communication. The use of emojis in multimodal information triggers new challenges in complex networks and mobile security applications. The fast growth of social media, microblogs, floods expands the definition of sentimental analysis where the extraction of emotions from user posts becomes a cutting edge. Therefore, the opinion mining becomes a crucial step for the analysis of social behaviour in individuals or groups for the detection of trends. In current applications, the language of emojis is considered as a common way or an interlingua to express the ideas or intensify feelings. However, there are few studies to reveal its effects on Turkish context for overlapped and separate senses. In this study, emojis have been classified as a parameter of textual descriptions for the emotions in Turkish language. The emotion analysis has been performed by Support Vector Machines (SVM) and multinomial Naive Bayes (NB) using test and train sets derived from Twitter corpus. The preparation and preprocessing of the corpus have been accomplished by generating the classifiers; groups and emotions. The neutral emotion state has been also added to compare the accuracy levels in classification. The use of corpus in a generic domain present a promising field where different emotion states have been measured. The evaluation scores indicate that SVM would perform better and neutral emotional emojis might decrease total accuracy in Turkish language.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114211810","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Parameter space dimension reduction for multidimensional signals differential pulse-code modulation interpolator 多维信号差分脉冲码调制插补器参数空间降维
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757494
A. Maksimov, M. Gashnikov
{"title":"Parameter space dimension reduction for multidimensional signals differential pulse-code modulation interpolator","authors":"A. Maksimov, M. Gashnikov","doi":"10.1109/ISDFS.2019.8757494","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757494","url":null,"abstract":"In this paper, new parameterized differential pulse-code modulation interpolator is proposed. It uses the correspondence of signal samples in the processed sample vicinity to select the interpolation method. Interpolation error of proposed interpolator is minimized during the optimization procedure. Before the optimization, the parameter range dimension is reduced in order to lower the computational complexity. Experimental research shows that proposed interpolator outperforms the non-parameterized one","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"133 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132864315","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Circle Map for Internet of Things Networks 物联网网络圈图
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757541
Peter Szabó, B. Genge
{"title":"Circle Map for Internet of Things Networks","authors":"Peter Szabó, B. Genge","doi":"10.1109/ISDFS.2019.8757541","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757541","url":null,"abstract":"We have reviewed the existing metro network mapping solutions. While none of them are ideal for IoT network mapping, the research on network map usability aspects can be applied to IoT networks. By doing so, we were able to come up with a new map type, tailored to IoT networks. We have created and optimized an algorithm to create and plot this new map type, the circle map. We have used Bézier curves to connect nodes, arranged in recursive circular patterns. Overall, the circle map needs some refinement and real user research before realworld application, but its core concepts seem to work, and our algorithm efficiently creates circle maps.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132889215","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Human vs Bots: Detecting Human Attacks in a Honeypot Environment 人类与机器人:在蜜罐环境中检测人类攻击
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757534
Shreya Udhani, A. Withers, Masooda N. Bashir
{"title":"Human vs Bots: Detecting Human Attacks in a Honeypot Environment","authors":"Shreya Udhani, A. Withers, Masooda N. Bashir","doi":"10.1109/ISDFS.2019.8757534","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757534","url":null,"abstract":"The increase in the automated attacks has motivated security researchers to focus on identifying patterns of attacker to safeguard the system. Humans have some basic behavioral characteristics and limitations, which can be identified and used to distinguish them from automated attackers. The network log data collected from a Honeypot uncovers such traits which are otherwise not noticeable. The paper analyses a SSH-based Honeypot deployed over a period of 423 days to identify human behavior traits which can essentially distinguish an automated attacker and a human attacker.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133736243","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 10
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信