2019 7th International Symposium on Digital Forensics and Security (ISDFS)最新文献

筛选
英文 中文
Determining the Effectiveness of Data Remanence Prevention in the AWS Cloud 确定AWS云中数据残留防护的有效性
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757506
B. Snyder, James H. Jones
{"title":"Determining the Effectiveness of Data Remanence Prevention in the AWS Cloud","authors":"B. Snyder, James H. Jones","doi":"10.1109/ISDFS.2019.8757506","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757506","url":null,"abstract":"Previous efforts to detect cross-instance cloud remanence have consisted of searching current instance unallocated space for fragments easily attributable to a prior user or instance, and results were necessarily dependent on the specific instances tested and the search terms employed by the investigator. In contrast, this work developed, tested, and applied a general method to detect potential cross-instance cloud remanence that does not depend on specific instances or search terms. This method collects unallocated space from multiple cloud virtual machine instances based on the same cloud provider template. Empty sectors and sectors which also appear in the allocated space of that instance are removed from the candidate remanence list, and the remaining sectors are compared to sectors from instances based on other templates from that same provider; a matching sector indicate potential cross-instance remanence. Matching sectors are further evaluated by considering contiguous sectors and mapping back to the source file from the other instance template, providing additional evidence that the recovered fragments may in fact be content from another instance. This work first found that unallocated space from multiple cloud instances based on the same template is not empty, random, nor identical - in itself an indicator of possible cross-instance remanence. This work also found sectors in unallocated space of multiple instances that matched contiguous portions of files from instances created from other templates, providing a focused area for determining whether cross-instance data remanence exists. This work contributes a general method to indicate potential cross-instance cloud data remanence which is not dependent on a specific provider or infrastructure, instance details, or the presence of specific user-attributable remnant fragments. A tool to implement the method was developed, validated, and then run on Amazon's AWS cloud service.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129773995","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
A four-step method for investigating network worm propagation 研究网络蠕虫传播的四步法
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757544
Tala Tafazzoli, B. Sadeghiyan
{"title":"A four-step method for investigating network worm propagation","authors":"Tala Tafazzoli, B. Sadeghiyan","doi":"10.1109/ISDFS.2019.8757544","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757544","url":null,"abstract":"Worm origin identification and propagation path reconstruction are important topics in information security and digital forensics. This information helps forensic investigators to guess initial suspects and do further investigations on the suspicious computers. Network and system administrators also use the information to identify security weaknesses of their systems and networks. The goal of this paper is to identify the origins and to reconstruct the propagation path of preferential scanning worm back-in-time. The main idea of this paper is to use back-to-origin modeling and a step-by-step improvement, to identify the origins and to reconstruct the propagation path after the worm outbreak using information gathered over the network. We construct a probabilistic model to receive features over the network and estimate infection status of nodes. We also developed an algorithm that identifies the origins and reconstructs the propagation path, back-in-time using the learned model. In order to achieve this, we used a 4-step method. The proposed method has acceptable accuracy.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125577309","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation 基于头脑风暴优化的聚类算法用于数字图像分割
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757552
Eva Tuba, R. Jovanovic, Dejan Zivkovic, M. Beko, M. Tuba
{"title":"Clustering Algorithm Optimized by Brain Storm Optimization for Digital Image Segmentation","authors":"Eva Tuba, R. Jovanovic, Dejan Zivkovic, M. Beko, M. Tuba","doi":"10.1109/ISDFS.2019.8757552","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757552","url":null,"abstract":"In the last several decades digital images were extend their usage in numerous areas. Due to various digital image processing methods they became part areas such as astronomy, agriculture and more. One of the main task in image processing application is segmentation. Since segmentation represents rather important problem, various methods were proposed in the past. One of the methods is to use clustering algorithms which is explored in this paper. We propose k-means algorithm for digital image segmentation. K-means algorithm's well known drawback is the high possibility of getting trapped into local optima. In this paper we proposed brain storm optimization algorithm for optimizing k-means algorithm used for digital image segmentation. Our proposed algorithm is tested on several benchmark images and the results are compared with other stat-of-the-art algorithms. The proposed method outperformed the existing methods.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133108139","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms 一种基于数据压缩和混沌密钥规划算法的混合图像加密算法
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757530
Yucel Burhan, Fırat Artuğer, F. Özkaynak
{"title":"A Novel Hybrid Image Encryption Algorithm Based on Data Compression and Chaotic Key Planning Algorithms","authors":"Yucel Burhan, Fırat Artuğer, F. Özkaynak","doi":"10.1109/ISDFS.2019.8757530","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757530","url":null,"abstract":"In this study, a hybrid image encryption algorithm which provides data compression and encryption requirements is proposed. Both JPEG and fractal compression algorithms can be used in the data compression process of the proposed new algorithm. In the encryption process, a chaotic key planning algorithm has been used. Chaotic systems are used as an entropy source. This approach, based on the one time pad principle, is unconditionally secure because it uses different secret keys in each encryption process. Successful analysis results show that the proposed new method can be used in many practical applications in the field of information security.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127483214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
A Target Tracking Application On Mobese Videos Mobese视频的目标跟踪应用
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757531
Sevinç Ay, M. Karabatak
{"title":"A Target Tracking Application On Mobese Videos","authors":"Sevinç Ay, M. Karabatak","doi":"10.1109/ISDFS.2019.8757531","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757531","url":null,"abstract":"The development of digital communication and image technologies is becoming increasingly widespread. The high resolution rates used in image technologies increased the quality of the recordings. These developments reveal the necessity of interpretation studies on digital images. Image processing applications were first created by the interpretation of still images. In order to achieve better image processing after the stages of obtaining, improving and decontamination of the image, certain features have been determined and highlighted. Nowadays, it continues with the processing and interpretation of moving images or videos. In recent studies, object tracking has gained importance in order to interpret visual inspection systems.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"110 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132102124","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study JPEG图像认证中半脆弱水印的比较研究
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757535
A. Egorova, V. Fedoseev
{"title":"Semi-Fragile Watermarking for JPEG Image Authentication: A Comparative Study","authors":"A. Egorova, V. Fedoseev","doi":"10.1109/ISDFS.2019.8757535","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757535","url":null,"abstract":"One of the ways to protect images from tampering is embedding digital watermarks destroyed by unauthorized changes. The development of digital watermarking methods that are robust against allowable transformations, whose most typical example is lossy compression, presents a challenging task. Such methods and watermarks embedded by them are called semi-fragile. The paper considers different semi-fragile watermarking techniques that resisting JPEG. We focus on the analysis of the effect of watermark capacity, positions of spectral coefficients selected for embedding, and specific algorithms of coefficients modification on the quality of the resulting (secure) image and the authentication accuracy. In the paper, we also provide recommendations on the choice of the best combinations of these parameters depending on the terms of use of a protected image.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"61 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131693485","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated Channel Inversion 利用截断信道反演自适应自由空间光传输马拉加湍流中指向误差的容量
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757499
Dejan N. Milic, Marko Smilic, Boiana Nikolic, M. Tuba, P. Spalevic
{"title":"Capacity of Adaptive Free Space Optical Transmission over Malaga Turbulence with Pointing Error using Truncated Channel Inversion","authors":"Dejan N. Milic, Marko Smilic, Boiana Nikolic, M. Tuba, P. Spalevic","doi":"10.1109/ISDFS.2019.8757499","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757499","url":null,"abstract":"In this paper we consider channel capacity based on Truncated Channel Inversion with Fixed Rate (TIFR) adaptive transmission over Malaga model of atmospheric turbulence with pointing error. Analytical expressions in closed form are derived for capacity based on TIFR adaptive transmission. The impact of cut-off SNR level on channel capacity based on TIFR adaptive transmission is investigated. Also, value of cut-off SNR level for different regimes of transmitter power is considered. Analytical results are numerically evaluated and graphically presented depending on cut-off SNR level and signal to noise ratio (SNR).","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"184 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124913954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Continuous Authentication Based on User Interaction Behavior 基于用户交互行为的持续认证
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757539
Long Chen, Yi Zhong, Weidong Ai, Difang Zhang
{"title":"Continuous Authentication Based on User Interaction Behavior","authors":"Long Chen, Yi Zhong, Weidong Ai, Difang Zhang","doi":"10.1109/ISDFS.2019.8757539","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757539","url":null,"abstract":"Continuous authentication (CA) is the process which continuously verifying a user based on their on-going interaction with a computer system. In this paper, we propose an adaptive continuous authentication method based on the changes of context, in which providing protection for the user's on-going interaction with computer in different contexts. In order to prevent a situation where an attacker tries to avoid detection by limiting to one input device, we considered both keystroke and mouse usage behavior patterns. In this research, collecting 30 users' data in an uncontrolled environment, extracting the user behavior feature from data by a new feature extraction method, using fusion technology to identify users, and then, according to the recognition result we can judge whether the current user is a real user or not. The experiment result shows that our scheme has a false acceptance rate (FAR) of 0%, a false rejection rate (FRR) of 2.04%, and the authentication time that between 10 seconds and 60 seconds for authentication.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"75 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129188656","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
A Security-Enhanced Interoperability Middleware for the Internet of Things 一种安全增强的物联网互操作性中间件
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757550
Hunor Sándor, B. Genge, P. Haller, Andrei-Gabriel Bica
{"title":"A Security-Enhanced Interoperability Middleware for the Internet of Things","authors":"Hunor Sándor, B. Genge, P. Haller, Andrei-Gabriel Bica","doi":"10.1109/ISDFS.2019.8757550","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757550","url":null,"abstract":"This paper documents an Internet of Things (IoT) middleware specially tailored to address the security, and operational requirements expected from an effective IoT platform. In essence, the middleware exposes a diverse palette of features, including authentication, authorization, auditing, confidentiality and integrity of data. Besides these aspects, the middleware encapsulates an IoT object abstraction layer that builds a generic object model that is independent from the device type (i.e., hardware, software, vendor). Furthermore, it builds on standards and specifications to accomplish a highly resilient and scalable solution. The approach is tested on several hardware platforms. A use case scenario is presented to demonstrate its main features. The middleware represents a key component in the context of the “GHOST - Safe-Guarding Home IoT Environments with Personalised Real-time Risk Control” project.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"127 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123223298","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Android Mobile Device Forensics: A Review Android Mobile Device Forensics: A Review
2019 7th International Symposium on Digital Forensics and Security (ISDFS) Pub Date : 2019-06-01 DOI: 10.1109/ISDFS.2019.8757493
Hussein Farooq Tayeb, C. Varol
{"title":"Android Mobile Device Forensics: A Review","authors":"Hussein Farooq Tayeb, C. Varol","doi":"10.1109/ISDFS.2019.8757493","DOIUrl":"https://doi.org/10.1109/ISDFS.2019.8757493","url":null,"abstract":"Mobile device forensics is an up-to-date multidisciplinary methodology aims at preserving, extracting, analyzing, and presenting digital evidence from mobile devices. The technique encompasses various phases, which require both deep insights into mobile devices' organization and structure as well as digital analysis and examination approaches. Modern mobile devices enable multitask computing ability that requires a suitable Operating System (OS). Nowadays, both proprietary and open source operating mobile OSs are available. The progressive growth of Android operated devices makes them a potential target for cyber-attacks. In this paper, a review of the Android mobile device forensics is presented. The study is not an exhaustive review, rather it only offers a discussion of the most influential papers in the field.","PeriodicalId":247412,"journal":{"name":"2019 7th International Symposium on Digital Forensics and Security (ISDFS)","volume":"68 s278","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-06-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113953504","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信