首页 > 最新文献

2018 6th International Symposium on Digital Forensic and Security (ISDFS)最新文献

英文 中文
Web application attack detection and forensics: A survey Web应用程序攻击检测和取证:调查
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355378
M. Babiker, Enis Karaarslan, Yasar Hoscan
Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large number of sophisticated attacks. Several attempts have been made to address these attacks using a wide range of technology and one of the greatest challenges is responding to new and unknown attacks in an effective way. This study aims to investigate the techniques and solutions used to detect attacks, such as firewalls, intrusion detection systems, honeypots and forensic techniques. Data mining and machine learning techniques, which attempt to address traditional technology shortcomings and produce more effective solutions, are also investigated. It was aimed to contribute to this growing area of research by exploring more intelligent and convenient techniques for web application attack detection by focusing on the data mining techniques in forensics.
Web应用程序攻击是信息安全和数字取证中一个日益重要的领域。据观察,攻击者正在开发绕过安全控制并发起大量复杂攻击的能力。人们已经尝试使用各种技术来解决这些攻击,最大的挑战之一是以有效的方式响应新的和未知的攻击。本研究旨在研究用于检测攻击的技术和解决方案,如防火墙、入侵检测系统、蜜罐和取证技术。数据挖掘和机器学习技术,试图解决传统技术的缺点,并产生更有效的解决方案,也进行了研究。它旨在通过专注于取证中的数据挖掘技术,探索更智能和方便的web应用程序攻击检测技术,从而为这一不断发展的研究领域做出贡献。
{"title":"Web application attack detection and forensics: A survey","authors":"M. Babiker, Enis Karaarslan, Yasar Hoscan","doi":"10.1109/ISDFS.2018.8355378","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355378","url":null,"abstract":"Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large number of sophisticated attacks. Several attempts have been made to address these attacks using a wide range of technology and one of the greatest challenges is responding to new and unknown attacks in an effective way. This study aims to investigate the techniques and solutions used to detect attacks, such as firewalls, intrusion detection systems, honeypots and forensic techniques. Data mining and machine learning techniques, which attempt to address traditional technology shortcomings and produce more effective solutions, are also investigated. It was aimed to contribute to this growing area of research by exploring more intelligent and convenient techniques for web application attack detection by focusing on the data mining techniques in forensics.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124736106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
An extend RBAC model for privacy protection in HIS HIS中隐私保护的扩展RBAC模型
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355328
Zili Wu, Xiaoqian Qi, Gang Liu, Lu Fang, Jiayu Liu, Juan Cui
With the continuous development of Healthcare information systems (HIS) [1], malicious and unauthorized access has increased, privacy disclosure issues gradually serious. In order to protect the privacy of HIS, this paper adds context to privacy information access, proposes a new method to realize context constraints, this method rates the context in which the subject is located, determines whether the access is allowed by judging whether the level satisfies the conditions. By adding context constraints to the access, the risk of privacy disclosure is greatly reduced and privacy protection is realized.
随着医疗信息系统(HIS)的不断发展[1],恶意和未经授权的访问越来越多,隐私泄露问题逐渐严重。为了保护HIS的隐私,本文在隐私信息访问中加入了上下文,提出了一种实现上下文约束的新方法,该方法对主体所在的上下文进行评级,通过判断层次是否满足条件来确定是否允许访问。通过在访问中加入上下文约束,大大降低了隐私泄露的风险,实现了隐私保护。
{"title":"An extend RBAC model for privacy protection in HIS","authors":"Zili Wu, Xiaoqian Qi, Gang Liu, Lu Fang, Jiayu Liu, Juan Cui","doi":"10.1109/ISDFS.2018.8355328","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355328","url":null,"abstract":"With the continuous development of Healthcare information systems (HIS) [1], malicious and unauthorized access has increased, privacy disclosure issues gradually serious. In order to protect the privacy of HIS, this paper adds context to privacy information access, proposes a new method to realize context constraints, this method rates the context in which the subject is located, determines whether the access is allowed by judging whether the level satisfies the conditions. By adding context constraints to the access, the risk of privacy disclosure is greatly reduced and privacy protection is realized.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"49 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Analysis of speaker's gender effects in voice onset time of Turkish stop consonants 说话者性别对土耳其顿音起音时间的影响分析
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355341
Yunus Korkmaz, Aytug Boyaci
In speech processing, identification of speaker's gender has been considered as a topic of interest by many studies so far. Although various methods and approaches have been proposed to detect gender of a speaker, Voice Onset Time (VOT) values of stop consonants of a language can also contain cues about the speaker's gender. In this study, VOT values of six stop consonants (/p/, /b/, /t/, /d/, /k/, /g/) in Turkish language have been analyzed to find gender evidences by using classification algorithms like SVM, KNN, Logistic Regression etc. 10 males and 10 females speakers have uttered 48 isolated meaningful (number of combinations of all stop consonants and all vowels) Turkish syllables in this work. As a result of this study, VOT values of unvoiced stop consonants (/p/, /t/, /k/) together as one parameter have been found to be gender-related with a success rate of 90% via Ensemble algorithm. Also, stop consonant /t/ has been marked as most gender-related cue in a syllable, on the other hand /b/ has been detected as the least gender-related stop. These findings proved that acoustic VOT parameters of Turkish stop consonants, especially unvoiced stops, can be seen as gender distinctive feature for Turkish speakers.
在语音处理中,说话人的性别识别一直是许多研究感兴趣的课题。虽然人们提出了各种方法和方法来检测说话者的性别,但语言中顿音的起音时间(VOT)值也可以包含说话者性别的线索。本研究采用SVM、KNN、Logistic回归等分类算法,对土耳其语中六个顿音(/p/、/b/、/t/、/d/、/k/、/g/)的VOT值进行分析,寻找性别证据。在本研究中,10名男性和10名女性分别说出了48个独立的有意义的(所有顿音和所有元音的组合数量)土耳其语音节。本研究通过Ensemble算法发现,作为一个参数的不发音顿音(/p/, /t/, /k/)的VOT值与性别相关,成功率为90%。此外,顿音/t/被标记为音节中与性别相关最多的线索,而/b/被检测为与性别相关最少的顿音。这些发现证明,土耳其顿音辅音的声学VOT参数,特别是不发音的顿音,可以被视为土耳其语使用者的性别特征。
{"title":"Analysis of speaker's gender effects in voice onset time of Turkish stop consonants","authors":"Yunus Korkmaz, Aytug Boyaci","doi":"10.1109/ISDFS.2018.8355341","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355341","url":null,"abstract":"In speech processing, identification of speaker's gender has been considered as a topic of interest by many studies so far. Although various methods and approaches have been proposed to detect gender of a speaker, Voice Onset Time (VOT) values of stop consonants of a language can also contain cues about the speaker's gender. In this study, VOT values of six stop consonants (/p/, /b/, /t/, /d/, /k/, /g/) in Turkish language have been analyzed to find gender evidences by using classification algorithms like SVM, KNN, Logistic Regression etc. 10 males and 10 females speakers have uttered 48 isolated meaningful (number of combinations of all stop consonants and all vowels) Turkish syllables in this work. As a result of this study, VOT values of unvoiced stop consonants (/p/, /t/, /k/) together as one parameter have been found to be gender-related with a success rate of 90% via Ensemble algorithm. Also, stop consonant /t/ has been marked as most gender-related cue in a syllable, on the other hand /b/ has been detected as the least gender-related stop. These findings proved that acoustic VOT parameters of Turkish stop consonants, especially unvoiced stops, can be seen as gender distinctive feature for Turkish speakers.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A proposed approach for preventing cross-site scripting 防止跨站点脚本的建议方法
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355356
Twana Assad Taha, M. Karabatak
In this paper, the great threat Cross-Site Scripting (XSS) is introduced that faced with the web pages. Because of the impacts of such web threats during design and developing web pages, web developers must be aware and have adequate knowledge about varies type of web attacks and how to prevent or mitigate them. Web developers should have knowledge about how attackers attack websites and exploit weak points on websites during filling forms, registering and opening suspicious links or attachments in emails. The important of this subject is to provide great details and information about identifying impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them. In this paper use PHP's functions to evaluate the efficiency of web pages for implementing it and to prevent XSS attack.
本文介绍了跨站脚本(XSS)在web页面中所面临的巨大威胁。由于这些网络威胁在设计和开发网页期间的影响,web开发人员必须意识到并对各种类型的网络攻击以及如何预防或减轻它们有足够的知识。Web开发人员应该了解攻击者如何在填写表单、注册和打开可疑链接或电子邮件附件时攻击网站并利用网站的弱点。本主题的重要之处在于提供有关识别影响和保护这些类型的web威胁的详细信息。它旨在为web开发人员和用户提供足够的知识,同时开发和使用网站,以防止此类攻击,减少它们的影响和保护这些类型的web威胁。它旨在为web开发人员和用户在开发和使用网站时提供足够的知识,以防止和减少此类攻击。本文利用PHP的函数来评估网页实现的效率,防止跨站攻击。
{"title":"A proposed approach for preventing cross-site scripting","authors":"Twana Assad Taha, M. Karabatak","doi":"10.1109/ISDFS.2018.8355356","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355356","url":null,"abstract":"In this paper, the great threat Cross-Site Scripting (XSS) is introduced that faced with the web pages. Because of the impacts of such web threats during design and developing web pages, web developers must be aware and have adequate knowledge about varies type of web attacks and how to prevent or mitigate them. Web developers should have knowledge about how attackers attack websites and exploit weak points on websites during filling forms, registering and opening suspicious links or attachments in emails. The important of this subject is to provide great details and information about identifying impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them. In this paper use PHP's functions to evaluate the efficiency of web pages for implementing it and to prevent XSS attack.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130400412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
A review of cloned mobile malware applications for android devices 针对android设备的克隆移动恶意软件应用回顾
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355388
M. Baykara, Eren Çolak
With the increased mobile applications popularity, fraud methods have become a big problem in this area. Every smartphone definitely has at least one mobile application. These applications, which are constantly connected to the Internet, can threaten our security. Unfortunately, mobile applications still have a lot of vulnerabilities. It has been determined that 96% of the security tests on mobile released applications fail at least one test. This paper focuses on the threat of malware cloned applications and the damage caused to the affected Android users. An explanation of how the cloned malware applications affecting Android users is provided. In addition, a presentation of the awareness steps that users can take to notice these applications is given.
随着移动应用的日益普及,欺诈手段已成为这一领域的大问题。每个智能手机肯定至少有一个移动应用程序。这些不断连接到互联网的应用程序会威胁到我们的安全。不幸的是,移动应用程序仍然存在许多漏洞。已经确定,96%的移动发布应用程序的安全测试至少失败了一个测试。本文重点研究了恶意软件克隆应用程序的威胁以及对受影响的Android用户造成的损害。提供了克隆恶意软件应用程序如何影响Android用户的解释。此外,还介绍了用户可以采取哪些步骤来注意到这些应用程序。
{"title":"A review of cloned mobile malware applications for android devices","authors":"M. Baykara, Eren Çolak","doi":"10.1109/ISDFS.2018.8355388","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355388","url":null,"abstract":"With the increased mobile applications popularity, fraud methods have become a big problem in this area. Every smartphone definitely has at least one mobile application. These applications, which are constantly connected to the Internet, can threaten our security. Unfortunately, mobile applications still have a lot of vulnerabilities. It has been determined that 96% of the security tests on mobile released applications fail at least one test. This paper focuses on the threat of malware cloned applications and the damage caused to the affected Android users. An explanation of how the cloned malware applications affecting Android users is provided. In addition, a presentation of the awareness steps that users can take to notice these applications is given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Can erase montage traces permanently in audio files 可以抹去蒙太奇痕迹永久在音频文件
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355347
Mehmet Karakoc, A. Varol
Sound montage is used not only for the music and film industry, but also for criminal cases. The goal is sometimes to hide the crime and sometimes to blame the innocent. The montage always leaves some marks behind. In this study, the methods used to detect these traces are summarized and it is debated whether these traces can be completely erased. Since the sound signals can be considered periodically, they can be expressed by the Fourier series. Since the continuity of the cutting process will be deteriorated, a Gibss effect occurs and can be detected in a visual analysis. Background noise and acoustics are also used to detect the mounting in auditory analysis. The detection success rate is close to 100%. But sometimes the expert's fatigue, inexperience or carelessness and some montage tracks may not be detected.
声音蒙太奇不仅用于音乐和电影行业,也用于刑事案件。目的有时是掩盖罪行,有时是指责无辜者。蒙太奇总是会留下一些痕迹。在本研究中,总结了用于检测这些痕迹的方法,并讨论了这些痕迹是否可以完全消除。由于声音信号可以被认为是周期性的,它们可以用傅立叶级数来表示。由于切割过程的连续性将会恶化,因此会出现吉布斯效应,并且可以在视觉分析中检测到。在听觉分析中,背景噪声和声学也被用来检测安装。检测成功率接近100%。但有时专家的疲劳,缺乏经验或粗心大意和一些蒙太奇轨迹可能不会被发现。
{"title":"Can erase montage traces permanently in audio files","authors":"Mehmet Karakoc, A. Varol","doi":"10.1109/ISDFS.2018.8355347","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355347","url":null,"abstract":"Sound montage is used not only for the music and film industry, but also for criminal cases. The goal is sometimes to hide the crime and sometimes to blame the innocent. The montage always leaves some marks behind. In this study, the methods used to detect these traces are summarized and it is debated whether these traces can be completely erased. Since the sound signals can be considered periodically, they can be expressed by the Fourier series. Since the continuity of the cutting process will be deteriorated, a Gibss effect occurs and can be detected in a visual analysis. Background noise and acoustics are also used to detect the mounting in auditory analysis. The detection success rate is close to 100%. But sometimes the expert's fatigue, inexperience or carelessness and some montage tracks may not be detected.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quality lignite coal detection with discrete wavelet transform, discrete fourier transform, and ANN based on k-means clustering method 基于离散小波变换、离散傅立叶变换和基于k-means聚类方法的人工神经网络的优质褐煤检测
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355326
S. A. Korkmaz, Furkan Esmeray
In this article, the lignite coal datas in the Kalburçayı area of the Sivas-Kangal Basin have been used. This original data obtained from Kalburçayı area of the Sivas-Kangal Basin consists of 66 observations in the lignite coal area, including lignite quality parameters such as moisture content, ash, sulfur content and calorific value. These lignite coal datas have been clustered in two group with k-means method according to calori values. This clustering lignite coal data is classified by the Artifical Neural Network (ANN) classifier. In addition, Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) have been applied to coal data for ANN classifiers. DFT_ANN, DWT_ANN, and ANN classification success results are compared. The highest classification success rate was found by DWT_ANN method.
本文利用了西瓦斯—康加尔盆地卡尔布尔帕拉扎耶尔地区的褐煤资料。该原始数据来自Sivas-Kangal盆地kalburayayya地区,由褐煤区66个观测数据组成,包括褐煤质量参数,如水分含量、灰分、硫含量和热值。根据热量值,用k-means方法将这些褐煤数据聚为两组。该聚类方法采用人工神经网络分类器对褐煤数据进行分类。此外,将离散傅立叶变换(DFT)和离散小波变换(DWT)应用于煤数据的人工神经网络分类。比较DFT_ANN、DWT_ANN和ANN分类成功结果。DWT_ANN方法分类成功率最高。
{"title":"Quality lignite coal detection with discrete wavelet transform, discrete fourier transform, and ANN based on k-means clustering method","authors":"S. A. Korkmaz, Furkan Esmeray","doi":"10.1109/ISDFS.2018.8355326","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355326","url":null,"abstract":"In this article, the lignite coal datas in the Kalburçayı area of the Sivas-Kangal Basin have been used. This original data obtained from Kalburçayı area of the Sivas-Kangal Basin consists of 66 observations in the lignite coal area, including lignite quality parameters such as moisture content, ash, sulfur content and calorific value. These lignite coal datas have been clustered in two group with k-means method according to calori values. This clustering lignite coal data is classified by the Artifical Neural Network (ANN) classifier. In addition, Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) have been applied to coal data for ANN classifiers. DFT_ANN, DWT_ANN, and ANN classification success results are compared. The highest classification success rate was found by DWT_ANN method.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
TRCyberLab: An infrastructure for future internet and security studies TRCyberLab:未来互联网和安全研究的基础设施
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355396
Ilker Ozcelik, Ibrahim Ozcelik, S. Akleylek
The digital world is continuously changing, and new technologies affecting every aspect of our life. In order to keep up with these changes and have some impact and/or control over it; we must conduct advanced research on information technologies, future networks and security. In addition, we must educate the necessary human resource for the field. Today, developed countries are establishing large-scale research and education testbeds to support their researchers. Using these testbeds, they seek to increase their impact in the technology and security fields. In this paper, we propose a national information and communication technologies and security testbed, TRCyberLab. We also propose a road-map for the establishment and sustainment of this testbed. We believe, this testbed will help researchers in Turkey to conduct advanced research and develop new technologies also have an impact in the field.
数字世界在不断变化,新技术影响着我们生活的方方面面。为了跟上这些变化并对其产生影响和/或控制;我们要开展信息技术、未来网络、安全等前沿研究。此外,我们必须为这一领域培养必要的人力资源。今天,发达国家正在建立大规模的研究和教育试验台,以支持其研究人员。使用这些测试平台,他们寻求增加他们在技术和安全领域的影响。在本文中,我们提出了一个国家信息通信技术与安全测试平台,TRCyberLab。我们还提出了建立和维护该试验台的路线图。我们相信,这一试验台将有助于土耳其研究人员在该领域进行先进的研究和开发新技术。
{"title":"TRCyberLab: An infrastructure for future internet and security studies","authors":"Ilker Ozcelik, Ibrahim Ozcelik, S. Akleylek","doi":"10.1109/ISDFS.2018.8355396","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355396","url":null,"abstract":"The digital world is continuously changing, and new technologies affecting every aspect of our life. In order to keep up with these changes and have some impact and/or control over it; we must conduct advanced research on information technologies, future networks and security. In addition, we must educate the necessary human resource for the field. Today, developed countries are establishing large-scale research and education testbeds to support their researchers. Using these testbeds, they seek to increase their impact in the technology and security fields. In this paper, we propose a national information and communication technologies and security testbed, TRCyberLab. We also propose a road-map for the establishment and sustainment of this testbed. We believe, this testbed will help researchers in Turkey to conduct advanced research and develop new technologies also have an impact in the field.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129478078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Teachers' knowledge levels about virtual information security 教师虚拟信息安全知识水平
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355330
Songül Karabatak, M. Karabatak
In this study, it was aimed to determine the level of knowledge about the threats of teachers' virtual information security and the precautions to be taken against these elements. The sample of the study carried out in the survey model was composed of 135 teachers who were selected by the method of unstructured element sampling among the teachers working in the high school in Elazığ province center. The Information Security Achievement Scale was used as a data collection tool. Mean, percentage and frequency techniques and t test were used to analyze the data. It has emerged that most teachers in the study are not aware of the threats to the information in the virtual environment and do not know the precautions to be taken against to the attacks or threats to information security. Teachers' knowledge levels regarding threats and precautions related to information security differed significantly according to gender variables. At the end of the study, some suggestions were made about the security of virtual information.
在本研究中,旨在确定教师虚拟信息安全威胁的知识水平以及针对这些因素应采取的预防措施。调查模型的研究样本由135名教师组成,这些教师采用非结构化元素抽样的方法从Elazığ省中心一所高中的在职教师中抽取。采用信息安全成就量表作为数据收集工具。采用均值、百分比和频率技术及t检验对数据进行分析。研究发现,大多数教师对虚拟环境中信息所面临的威胁意识不足,不知道对信息安全的攻击或威胁应采取何种防范措施。教师对信息安全相关威胁和防范的知识水平在性别变量上存在显著差异。在研究的最后,对虚拟信息的安全提出了一些建议。
{"title":"Teachers' knowledge levels about virtual information security","authors":"Songül Karabatak, M. Karabatak","doi":"10.1109/ISDFS.2018.8355330","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355330","url":null,"abstract":"In this study, it was aimed to determine the level of knowledge about the threats of teachers' virtual information security and the precautions to be taken against these elements. The sample of the study carried out in the survey model was composed of 135 teachers who were selected by the method of unstructured element sampling among the teachers working in the high school in Elazığ province center. The Information Security Achievement Scale was used as a data collection tool. Mean, percentage and frequency techniques and t test were used to analyze the data. It has emerged that most teachers in the study are not aware of the threats to the information in the virtual environment and do not know the precautions to be taken against to the attacks or threats to information security. Teachers' knowledge levels regarding threats and precautions related to information security differed significantly according to gender variables. At the end of the study, some suggestions were made about the security of virtual information.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Developing LSB method using mask in colored images 在彩色图像中利用掩模开发LSB方法
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355385
M. Karabatak, Yıldıray Yiğit
The steganography word is derived from the combination of the steganos (στεγανός), which means “covered, hidden or protected”, and the graphein (γράφειν), which means “writing”. The main purpose of steganography studies is to prevent the hidden data from being to obtained by unauthorized persons. In order to realize the basic purpose of the steganography methods, there should be minimal change in the pattern file. In this study, LSB method which is one of the methods of concealing digital image information is examined. In this study, a new method of data hiding is proposed in order to minimize the changes occurring in the cover file while hiding the data with LSB method and to create the most appropriate mask to make it difficult to obtain hidden data.
隐写术这个词是steganos (στεγαν ν ς)和graphein (γρ φειν)的合成词,前者意为“覆盖、隐藏或保护”,后者意为“书写”。隐写术研究的主要目的是防止隐藏的数据被未经授权的人获取。为了实现隐写方法的基本目的,应该对模式文件进行最小的更改。本文研究了一种隐藏数字图像信息的方法——LSB方法。本研究提出了一种新的数据隐藏方法,以最大限度地减少使用LSB方法隐藏数据时覆盖文件中发生的变化,并创建最合适的掩码,使隐藏数据难以获取。
{"title":"Developing LSB method using mask in colored images","authors":"M. Karabatak, Yıldıray Yiğit","doi":"10.1109/ISDFS.2018.8355385","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355385","url":null,"abstract":"The steganography word is derived from the combination of the steganos (στεγανός), which means “covered, hidden or protected”, and the graphein (γράφειν), which means “writing”. The main purpose of steganography studies is to prevent the hidden data from being to obtained by unauthorized persons. In order to realize the basic purpose of the steganography methods, there should be minimal change in the pattern file. In this study, LSB method which is one of the methods of concealing digital image information is examined. In this study, a new method of data hiding is proposed in order to minimize the changes occurring in the cover file while hiding the data with LSB method and to create the most appropriate mask to make it difficult to obtain hidden data.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
期刊
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1