Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355378
M. Babiker, Enis Karaarslan, Yasar Hoscan
Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large number of sophisticated attacks. Several attempts have been made to address these attacks using a wide range of technology and one of the greatest challenges is responding to new and unknown attacks in an effective way. This study aims to investigate the techniques and solutions used to detect attacks, such as firewalls, intrusion detection systems, honeypots and forensic techniques. Data mining and machine learning techniques, which attempt to address traditional technology shortcomings and produce more effective solutions, are also investigated. It was aimed to contribute to this growing area of research by exploring more intelligent and convenient techniques for web application attack detection by focusing on the data mining techniques in forensics.
{"title":"Web application attack detection and forensics: A survey","authors":"M. Babiker, Enis Karaarslan, Yasar Hoscan","doi":"10.1109/ISDFS.2018.8355378","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355378","url":null,"abstract":"Web application attacks are an increasingly important area in information security and digital forensics. It has been observed that attackers are developing the capability to bypass security controls and launch a large number of sophisticated attacks. Several attempts have been made to address these attacks using a wide range of technology and one of the greatest challenges is responding to new and unknown attacks in an effective way. This study aims to investigate the techniques and solutions used to detect attacks, such as firewalls, intrusion detection systems, honeypots and forensic techniques. Data mining and machine learning techniques, which attempt to address traditional technology shortcomings and produce more effective solutions, are also investigated. It was aimed to contribute to this growing area of research by exploring more intelligent and convenient techniques for web application attack detection by focusing on the data mining techniques in forensics.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124736106","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355328
Zili Wu, Xiaoqian Qi, Gang Liu, Lu Fang, Jiayu Liu, Juan Cui
With the continuous development of Healthcare information systems (HIS) [1], malicious and unauthorized access has increased, privacy disclosure issues gradually serious. In order to protect the privacy of HIS, this paper adds context to privacy information access, proposes a new method to realize context constraints, this method rates the context in which the subject is located, determines whether the access is allowed by judging whether the level satisfies the conditions. By adding context constraints to the access, the risk of privacy disclosure is greatly reduced and privacy protection is realized.
{"title":"An extend RBAC model for privacy protection in HIS","authors":"Zili Wu, Xiaoqian Qi, Gang Liu, Lu Fang, Jiayu Liu, Juan Cui","doi":"10.1109/ISDFS.2018.8355328","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355328","url":null,"abstract":"With the continuous development of Healthcare information systems (HIS) [1], malicious and unauthorized access has increased, privacy disclosure issues gradually serious. In order to protect the privacy of HIS, this paper adds context to privacy information access, proposes a new method to realize context constraints, this method rates the context in which the subject is located, determines whether the access is allowed by judging whether the level satisfies the conditions. By adding context constraints to the access, the risk of privacy disclosure is greatly reduced and privacy protection is realized.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"49 3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116820066","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355341
Yunus Korkmaz, Aytug Boyaci
In speech processing, identification of speaker's gender has been considered as a topic of interest by many studies so far. Although various methods and approaches have been proposed to detect gender of a speaker, Voice Onset Time (VOT) values of stop consonants of a language can also contain cues about the speaker's gender. In this study, VOT values of six stop consonants (/p/, /b/, /t/, /d/, /k/, /g/) in Turkish language have been analyzed to find gender evidences by using classification algorithms like SVM, KNN, Logistic Regression etc. 10 males and 10 females speakers have uttered 48 isolated meaningful (number of combinations of all stop consonants and all vowels) Turkish syllables in this work. As a result of this study, VOT values of unvoiced stop consonants (/p/, /t/, /k/) together as one parameter have been found to be gender-related with a success rate of 90% via Ensemble algorithm. Also, stop consonant /t/ has been marked as most gender-related cue in a syllable, on the other hand /b/ has been detected as the least gender-related stop. These findings proved that acoustic VOT parameters of Turkish stop consonants, especially unvoiced stops, can be seen as gender distinctive feature for Turkish speakers.
{"title":"Analysis of speaker's gender effects in voice onset time of Turkish stop consonants","authors":"Yunus Korkmaz, Aytug Boyaci","doi":"10.1109/ISDFS.2018.8355341","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355341","url":null,"abstract":"In speech processing, identification of speaker's gender has been considered as a topic of interest by many studies so far. Although various methods and approaches have been proposed to detect gender of a speaker, Voice Onset Time (VOT) values of stop consonants of a language can also contain cues about the speaker's gender. In this study, VOT values of six stop consonants (/p/, /b/, /t/, /d/, /k/, /g/) in Turkish language have been analyzed to find gender evidences by using classification algorithms like SVM, KNN, Logistic Regression etc. 10 males and 10 females speakers have uttered 48 isolated meaningful (number of combinations of all stop consonants and all vowels) Turkish syllables in this work. As a result of this study, VOT values of unvoiced stop consonants (/p/, /t/, /k/) together as one parameter have been found to be gender-related with a success rate of 90% via Ensemble algorithm. Also, stop consonant /t/ has been marked as most gender-related cue in a syllable, on the other hand /b/ has been detected as the least gender-related stop. These findings proved that acoustic VOT parameters of Turkish stop consonants, especially unvoiced stops, can be seen as gender distinctive feature for Turkish speakers.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702402","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355356
Twana Assad Taha, M. Karabatak
In this paper, the great threat Cross-Site Scripting (XSS) is introduced that faced with the web pages. Because of the impacts of such web threats during design and developing web pages, web developers must be aware and have adequate knowledge about varies type of web attacks and how to prevent or mitigate them. Web developers should have knowledge about how attackers attack websites and exploit weak points on websites during filling forms, registering and opening suspicious links or attachments in emails. The important of this subject is to provide great details and information about identifying impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them. In this paper use PHP's functions to evaluate the efficiency of web pages for implementing it and to prevent XSS attack.
{"title":"A proposed approach for preventing cross-site scripting","authors":"Twana Assad Taha, M. Karabatak","doi":"10.1109/ISDFS.2018.8355356","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355356","url":null,"abstract":"In this paper, the great threat Cross-Site Scripting (XSS) is introduced that faced with the web pages. Because of the impacts of such web threats during design and developing web pages, web developers must be aware and have adequate knowledge about varies type of web attacks and how to prevent or mitigate them. Web developers should have knowledge about how attackers attack websites and exploit weak points on websites during filling forms, registering and opening suspicious links or attachments in emails. The important of this subject is to provide great details and information about identifying impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them impacting and protecting from these types of web threats. It aims to provide both web developers and users with enough knowledge while developing and using websites to prevent from such attacks and reduce them. In this paper use PHP's functions to evaluate the efficiency of web pages for implementing it and to prevent XSS attack.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130400412","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355388
M. Baykara, Eren Çolak
With the increased mobile applications popularity, fraud methods have become a big problem in this area. Every smartphone definitely has at least one mobile application. These applications, which are constantly connected to the Internet, can threaten our security. Unfortunately, mobile applications still have a lot of vulnerabilities. It has been determined that 96% of the security tests on mobile released applications fail at least one test. This paper focuses on the threat of malware cloned applications and the damage caused to the affected Android users. An explanation of how the cloned malware applications affecting Android users is provided. In addition, a presentation of the awareness steps that users can take to notice these applications is given.
{"title":"A review of cloned mobile malware applications for android devices","authors":"M. Baykara, Eren Çolak","doi":"10.1109/ISDFS.2018.8355388","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355388","url":null,"abstract":"With the increased mobile applications popularity, fraud methods have become a big problem in this area. Every smartphone definitely has at least one mobile application. These applications, which are constantly connected to the Internet, can threaten our security. Unfortunately, mobile applications still have a lot of vulnerabilities. It has been determined that 96% of the security tests on mobile released applications fail at least one test. This paper focuses on the threat of malware cloned applications and the damage caused to the affected Android users. An explanation of how the cloned malware applications affecting Android users is provided. In addition, a presentation of the awareness steps that users can take to notice these applications is given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"86 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134091886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355347
Mehmet Karakoc, A. Varol
Sound montage is used not only for the music and film industry, but also for criminal cases. The goal is sometimes to hide the crime and sometimes to blame the innocent. The montage always leaves some marks behind. In this study, the methods used to detect these traces are summarized and it is debated whether these traces can be completely erased. Since the sound signals can be considered periodically, they can be expressed by the Fourier series. Since the continuity of the cutting process will be deteriorated, a Gibss effect occurs and can be detected in a visual analysis. Background noise and acoustics are also used to detect the mounting in auditory analysis. The detection success rate is close to 100%. But sometimes the expert's fatigue, inexperience or carelessness and some montage tracks may not be detected.
{"title":"Can erase montage traces permanently in audio files","authors":"Mehmet Karakoc, A. Varol","doi":"10.1109/ISDFS.2018.8355347","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355347","url":null,"abstract":"Sound montage is used not only for the music and film industry, but also for criminal cases. The goal is sometimes to hide the crime and sometimes to blame the innocent. The montage always leaves some marks behind. In this study, the methods used to detect these traces are summarized and it is debated whether these traces can be completely erased. Since the sound signals can be considered periodically, they can be expressed by the Fourier series. Since the continuity of the cutting process will be deteriorated, a Gibss effect occurs and can be detected in a visual analysis. Background noise and acoustics are also used to detect the mounting in auditory analysis. The detection success rate is close to 100%. But sometimes the expert's fatigue, inexperience or carelessness and some montage tracks may not be detected.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"122 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117316323","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355326
S. A. Korkmaz, Furkan Esmeray
In this article, the lignite coal datas in the Kalburçayı area of the Sivas-Kangal Basin have been used. This original data obtained from Kalburçayı area of the Sivas-Kangal Basin consists of 66 observations in the lignite coal area, including lignite quality parameters such as moisture content, ash, sulfur content and calorific value. These lignite coal datas have been clustered in two group with k-means method according to calori values. This clustering lignite coal data is classified by the Artifical Neural Network (ANN) classifier. In addition, Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) have been applied to coal data for ANN classifiers. DFT_ANN, DWT_ANN, and ANN classification success results are compared. The highest classification success rate was found by DWT_ANN method.
{"title":"Quality lignite coal detection with discrete wavelet transform, discrete fourier transform, and ANN based on k-means clustering method","authors":"S. A. Korkmaz, Furkan Esmeray","doi":"10.1109/ISDFS.2018.8355326","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355326","url":null,"abstract":"In this article, the lignite coal datas in the Kalburçayı area of the Sivas-Kangal Basin have been used. This original data obtained from Kalburçayı area of the Sivas-Kangal Basin consists of 66 observations in the lignite coal area, including lignite quality parameters such as moisture content, ash, sulfur content and calorific value. These lignite coal datas have been clustered in two group with k-means method according to calori values. This clustering lignite coal data is classified by the Artifical Neural Network (ANN) classifier. In addition, Discrete Fourier Transform (DFT) and Discrete Wavelet Transform (DWT) have been applied to coal data for ANN classifiers. DFT_ANN, DWT_ANN, and ANN classification success results are compared. The highest classification success rate was found by DWT_ANN method.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116290621","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355396
Ilker Ozcelik, Ibrahim Ozcelik, S. Akleylek
The digital world is continuously changing, and new technologies affecting every aspect of our life. In order to keep up with these changes and have some impact and/or control over it; we must conduct advanced research on information technologies, future networks and security. In addition, we must educate the necessary human resource for the field. Today, developed countries are establishing large-scale research and education testbeds to support their researchers. Using these testbeds, they seek to increase their impact in the technology and security fields. In this paper, we propose a national information and communication technologies and security testbed, TRCyberLab. We also propose a road-map for the establishment and sustainment of this testbed. We believe, this testbed will help researchers in Turkey to conduct advanced research and develop new technologies also have an impact in the field.
{"title":"TRCyberLab: An infrastructure for future internet and security studies","authors":"Ilker Ozcelik, Ibrahim Ozcelik, S. Akleylek","doi":"10.1109/ISDFS.2018.8355396","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355396","url":null,"abstract":"The digital world is continuously changing, and new technologies affecting every aspect of our life. In order to keep up with these changes and have some impact and/or control over it; we must conduct advanced research on information technologies, future networks and security. In addition, we must educate the necessary human resource for the field. Today, developed countries are establishing large-scale research and education testbeds to support their researchers. Using these testbeds, they seek to increase their impact in the technology and security fields. In this paper, we propose a national information and communication technologies and security testbed, TRCyberLab. We also propose a road-map for the establishment and sustainment of this testbed. We believe, this testbed will help researchers in Turkey to conduct advanced research and develop new technologies also have an impact in the field.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129478078","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355330
Songül Karabatak, M. Karabatak
In this study, it was aimed to determine the level of knowledge about the threats of teachers' virtual information security and the precautions to be taken against these elements. The sample of the study carried out in the survey model was composed of 135 teachers who were selected by the method of unstructured element sampling among the teachers working in the high school in Elazığ province center. The Information Security Achievement Scale was used as a data collection tool. Mean, percentage and frequency techniques and t test were used to analyze the data. It has emerged that most teachers in the study are not aware of the threats to the information in the virtual environment and do not know the precautions to be taken against to the attacks or threats to information security. Teachers' knowledge levels regarding threats and precautions related to information security differed significantly according to gender variables. At the end of the study, some suggestions were made about the security of virtual information.
{"title":"Teachers' knowledge levels about virtual information security","authors":"Songül Karabatak, M. Karabatak","doi":"10.1109/ISDFS.2018.8355330","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355330","url":null,"abstract":"In this study, it was aimed to determine the level of knowledge about the threats of teachers' virtual information security and the precautions to be taken against these elements. The sample of the study carried out in the survey model was composed of 135 teachers who were selected by the method of unstructured element sampling among the teachers working in the high school in Elazığ province center. The Information Security Achievement Scale was used as a data collection tool. Mean, percentage and frequency techniques and t test were used to analyze the data. It has emerged that most teachers in the study are not aware of the threats to the information in the virtual environment and do not know the precautions to be taken against to the attacks or threats to information security. Teachers' knowledge levels regarding threats and precautions related to information security differed significantly according to gender variables. At the end of the study, some suggestions were made about the security of virtual information.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129757362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355385
M. Karabatak, Yıldıray Yiğit
The steganography word is derived from the combination of the steganos (στεγανός), which means “covered, hidden or protected”, and the graphein (γράφειν), which means “writing”. The main purpose of steganography studies is to prevent the hidden data from being to obtained by unauthorized persons. In order to realize the basic purpose of the steganography methods, there should be minimal change in the pattern file. In this study, LSB method which is one of the methods of concealing digital image information is examined. In this study, a new method of data hiding is proposed in order to minimize the changes occurring in the cover file while hiding the data with LSB method and to create the most appropriate mask to make it difficult to obtain hidden data.
{"title":"Developing LSB method using mask in colored images","authors":"M. Karabatak, Yıldıray Yiğit","doi":"10.1109/ISDFS.2018.8355385","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355385","url":null,"abstract":"The steganography word is derived from the combination of the steganos (στεγανός), which means “covered, hidden or protected”, and the graphein (γράφειν), which means “writing”. The main purpose of steganography studies is to prevent the hidden data from being to obtained by unauthorized persons. In order to realize the basic purpose of the steganography methods, there should be minimal change in the pattern file. In this study, LSB method which is one of the methods of concealing digital image information is examined. In this study, a new method of data hiding is proposed in order to minimize the changes occurring in the cover file while hiding the data with LSB method and to create the most appropriate mask to make it difficult to obtain hidden data.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123120545","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}