2019 7th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
A New Approach for Exiting from Parking Lot based on Artificial Neural Network 基于人工神经网络的停车场出站新方法
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757529
H. Ozturk, Sevginur Teke, M. Karabatak
{"title":"A New Approach for Exiting from Parking Lot based on Artificial Neural Network","authors":"H. Ozturk, Sevginur Teke, M. Karabatak","doi":"10.1109/ISDFS.2019.8757529","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757529","url":null,"abstract":"With developing technology, autonomous vehicle systems have become very important. One of the biggest problems of these vehicles is entering to parking lots and exiting from parking lots. As well as parallel parking and vertical parking problems, exiting from a parking lot can also be a problem in some cases. In this paper, it is aimed to find a solution to the problem of exiting the vehicles from the parking lot. Due to the location and structure of the parking lots, it can be difficult to exit from a parking lot for a vehicle. In this study, data such as speed, wheel angle and position of the vehicle were obtained from the vehicle and it is aimed to automatically exit from the parking lot. Artificial Neural Network was used to perform this procedure. The modeling results show that it is possible for a vehicle to exit autonomously from the parking lot.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"70 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130553572","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking 利用进程级DNS流量跟踪阻止基于dga的恶意软件的C2通信
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757555
Anjali Menon
{"title":"Thwarting C2 Communication of DGA-Based Malware using Process-level DNS Traffic Tracking","authors":"Anjali Menon","doi":"10.1109/ISDFS.2019.8757555","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757555","url":null,"abstract":"Many modern botnet malwares use Domain Generation Algorithms (DGAs) to dynamically generate the domain names that resolve to their command and control (C2) centers. This approach allows these malwares to subvert traditional detection systems which rely on blacklists of known domains associated with malicious activities to block malware communications. Since the advent of DGA-based malwares, the efforts to prevent the said malwares from contacting their command and control centers (C2) server have been centered around detecting Algorithmically Generated Domain Names through lexicographic analysis, isolating entire infected devices or both. Recent research has emerged, which more accurately identifies infected devices in a network, by monitoring the volumes of domain resolution failures. While effective, these techniques are slow to identify DGA generated domain names. Even after the delayed identification, the only preliminary mitigation known today is a complete shutdown of a device that is suspected to be infected. In this paper, we present a new method to counter DGA-based malwares by limiting the impact of mitigation. Instead of isolating the entire infected device from the network we limit network activity of the malicious process alone. Our objective is to prevent DGA-based malwares from communicating with their C2 centers while allowing an infected device to maintain its normal functionality. We achieve this by tracking Domain Name Service (DNS) responses of individual processes and blacklisting those processes for which DNS traffic have abnormally large numbers of domain resolution failures. The blacklisting at a process level ensures that non-malicious processes in the infected device can continue functioning.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"225 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126123836","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Multidimensional signal interpolation based on parametric space dimension reduction 基于参数空间降维的多维信号插值
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757491
M. Gashnikov
{"title":"Multidimensional signal interpolation based on parametric space dimension reduction","authors":"M. Gashnikov","doi":"10.1109/ISDFS.2019.8757491","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757491","url":null,"abstract":"we reduce the dimension of a parametric space in the adaptive interpolation of a multidimensional signal. A hybrid adaptive interpolator underlies the dimensionality reduction. The multidimensional hybrid interpolator uses structurally different algorithms to interpolate multidirectional sections of the signal. The approximation of some sections of the signal by other sections underlies the interrelations between signal sections. The adaptive parametric interpolation of intra-sectional samples accounts for intra-sectional interrelations between signal samples. Computational experiments in real multidimensional signals prove the efficiency of the hybrid adaptive interpolator.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121204560","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers 使用基础级和元级分类器预测日常活动的有效性
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757487
Mohammed Akour, Shadi Banitaan, Hiba Alsghaier, Khalid Al Radaideh
{"title":"Predicting Daily Activities Effectiveness Using Base-level and Meta level Classifiers","authors":"Mohammed Akour, Shadi Banitaan, Hiba Alsghaier, Khalid Al Radaideh","doi":"10.1109/ISDFS.2019.8757487","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757487","url":null,"abstract":"Collecting and analyzing Activities of Daily Living (ADL) could supplement elder care and long-term care services with very sensitive information about elder people and what they do during the day and what challenges they face. Providing care for elder people based on their ADL could let them live actively, independently and healthy. In this paper, we studied the effectiveness of base learners against ensemble methods for predicting ADL. The selected base learners are Naïve Bayes, Bayesian Network, Sequential Minimal Optimization, Decision Table and J48 while the selected ensemble learners are boosting, bagging, decorate and random forest. The dataset was gathered from a wearable accelerometer attached on the chest. The data used in this study is collected from fifteen participants conducting seven activities namely standing up, working at the computer, going up downstairs, standing, walking, walking and talking with someone and talking while standing, walking and going up downstairs. For base learners, J48 achieved the best results in terms of F-measure, precision and recall. Results also showed that Boosting using decision table as the base classifier achieved the best improvement over base classifier. In addition, Bagging was the only ensemble approach that improved the results using all classifiers as base learners. Moreover, Bagging was able to predict five activities out of seven more efficiently than the other approaches while the rotation forest approach was able to predict the remaining two activities more efficiently than the rest. The results also indicated that all approaches took a reasonable time to build the model except Decorate.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130770885","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
[Copyright notice] (版权)
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/isdfs.2019.8757518
{"title":"[Copyright notice]","authors":"","doi":"10.1109/isdfs.2019.8757518","DOIUrl":"https://doi.org/10.1109/isdfs.2019.8757518","url":null,"abstract":"","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"80 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128904858","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Face Verification and Recognition for Digital Forensics and Information Security 数字取证和信息安全中的人脸验证和识别
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757511
Giuseppe Amato, F. Falchi, C. Gennaro, F. V. Massoli, N. Passalis, A. Tefas, Alessandro Trivilini, C. Vairo
{"title":"Face Verification and Recognition for Digital Forensics and Information Security","authors":"Giuseppe Amato, F. Falchi, C. Gennaro, F. V. Massoli, N. Passalis, A. Tefas, Alessandro Trivilini, C. Vairo","doi":"10.1109/ISDFS.2019.8757511","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757511","url":null,"abstract":"In this paper, we present an extensive evaluation of face recognition and verification approaches performed by the European COST Action MULTI-modal Imaging of FOREnsic SciEnce Evidence (MULTI-FORESEE). The aim of the study is to evaluate various face recognition and verification methods, ranging from methods based on facial landmarks to state-of-the-art off-the-shelf pre-trained Convolutional Neural Networks (CNN), as well as CNN models directly trained for the task at hand. To fulfill this objective, we carefully designed and implemented a realistic data acquisition process, that corresponds to a typical face verification setup, and collected a challenging dataset to evaluate the real world performance of the aforementioned methods. Apart from verifying the effectiveness of deep learning approaches in a specific scenario, several important limitations are identified and discussed through the paper, providing valuable insight for future research directions in the field.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116456235","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
SmartThings Event Export using SmartApps 使用SmartApps导出SmartThings事件
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757519
Jose Garcia, C. Varol
{"title":"SmartThings Event Export using SmartApps","authors":"Jose Garcia, C. Varol","doi":"10.1109/ISDFS.2019.8757519","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757519","url":null,"abstract":"The field of Digital Forensics must continuously reinvent and develop methods and practices to contend with emerging technologies. Nowhere is this truer than with home automation technology. This paper demonstrates the ability to harness developer tools for individual smart home systems, specifically Samsung SmartThings, and to apply their use to forensically sound data acquisition.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"54 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127239007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Augmenting Gabor-based Face Recognition with Global Soft Biometrics 基于gabor的全局软生物识别增强人脸识别
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757553
E. S. Jaha
{"title":"Augmenting Gabor-based Face Recognition with Global Soft Biometrics","authors":"E. S. Jaha","doi":"10.1109/ISDFS.2019.8757553","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757553","url":null,"abstract":"Though face recognition using traditional (hard) biometrics has attracted massive research interest and received extensive studies, it still confronts degrading variability challenges and notably achieves lower performance compared with other biometric recognition forms like fingerprint and iris. Recently, a number of research studies have been interested in enhancing face recognition performance by all means of supplementary facial biometric traits or other biometric modalities. Thus, soft biometrics have been emerged as a new promising modality of biometrics and highlighted as likely viable and fusible traits for augmenting traditional/hard biometrics. This is due to the expected advantages of soft biometrics over the traditional biometric traits, such as the high collectability and invariance properties. Other than fusing different kinds of traditional traits to augment face recognition, adding soft biometrics to augment various traditional facial traits has yet gained little research attention. Hence, in this research, unlike the majority of existing work, we investigate the viability of global soft face biometrics in supplementing traditional (hard) biometrics and the efficacy of concurrently using absolute and relative descriptions as soft biometrics. We conduct a new soft biometric-based fusion scheme in feature-level for augmenting a traditional Gabor-based face identification/verification in different potential forensic scenarios, considering performance variability evaluation and comparison with the baseline performance of Gabor features in isolation.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127301738","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Defending Against Cyber-Attacks on the Internet of Things 防范物联网网络攻击
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757478
Ghazi Abdalla Abdalrahman, H. Varol
{"title":"Defending Against Cyber-Attacks on the Internet of Things","authors":"Ghazi Abdalla Abdalrahman, H. Varol","doi":"10.1109/ISDFS.2019.8757478","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757478","url":null,"abstract":"IoTis a network of machines that communicate with each other, making smart decisions that help people and corporations to take control of their ventures. In recent years, the prevalence of IoT devices has increased dramatically, a phenomenon that has made users more vulnerable to cyber-attacks. As IoT becomes a staple of modern life, it is now essential to take cyber security seriously if cyber-attacks are to be prevented. It is therefore necessary to enhance the security of connected devices. One of the ways in which this can be achieved is through developing a deeper understanding of the attack types and motivations. Attacks are often traced to a weak link in the security network, meaning that connected devices serve as the chief target for cyber-attackers. Hackers are active in detecting these weak links to take control of these devices' advantages. IoT faces many challenges, but it is the enormous challenges to security that should be considered the most pressing.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"1980 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131339313","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Scientific Committee Members 科学委员会成员
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/isdfs.2019.8757548
L. Ambrosio
{"title":"Scientific Committee Members","authors":"L. Ambrosio","doi":"10.1109/isdfs.2019.8757548","DOIUrl":"https://doi.org/10.1109/isdfs.2019.8757548","url":null,"abstract":"Laser-ultrasonics or laser-ultrasound or laser-based ul trasound has been under study and development in many laboratories around the world for sev eral decades. From the initial generation of ultrasound with lasers in the early 60s an d the first optical detection of small ultrasonic displacement in the MHz range, the field has gone in many different research directions. Laser-ultrasonics has simultaneo usly evolved as a mature technology that is now attracting more and more inter est from industry. Several applications have already been transferred to industry an d instruments are now commercially available. Many of those were featured in the symposium, either in the technical presentations or in the exhibition.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"37 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132284245","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信