Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355382
F. Ertam, M. Kaya
It is very important to analyze the logs on the Firewall devices and control the internet traffic according to these analysis results. In this study, some logs obtained with the Firewall Device used at Firat University are classified using multiclass support vector machine (SVM) classifier. Linear, polynomial, sigmoid and Radial Basis Function (RBF) functions are used as the activation function for SVM classification. In order to measure the performance of the classifier, the comparison was made by finding the measurement values of sensitivity, recall and their harmonic mean F1 Score. In this study, 65532 instances have been examined using 11 features. The feature that characterizes any personal data in the selected data has not been used. The Action attribute is selected as the class from these attributes. The “allow”, “deny”, “drop” and “reset-both” parameters have been implemented for the Action class. Activation functions have been tried and the SVM responses have been evaluated so as to obtain the maximum recall and precision values in the SVM classifier. It was tried to obtain the best activation function for F1 score value. Receiver Operating Characteristic (ROC) curves were also created for each of the classes. At the end of the study, the activation functions from which the desired SVM responses are obtained are given by comparison.
{"title":"Classification of firewall log files with multiclass support vector machine","authors":"F. Ertam, M. Kaya","doi":"10.1109/ISDFS.2018.8355382","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355382","url":null,"abstract":"It is very important to analyze the logs on the Firewall devices and control the internet traffic according to these analysis results. In this study, some logs obtained with the Firewall Device used at Firat University are classified using multiclass support vector machine (SVM) classifier. Linear, polynomial, sigmoid and Radial Basis Function (RBF) functions are used as the activation function for SVM classification. In order to measure the performance of the classifier, the comparison was made by finding the measurement values of sensitivity, recall and their harmonic mean F1 Score. In this study, 65532 instances have been examined using 11 features. The feature that characterizes any personal data in the selected data has not been used. The Action attribute is selected as the class from these attributes. The “allow”, “deny”, “drop” and “reset-both” parameters have been implemented for the Action class. Activation functions have been tried and the SVM responses have been evaluated so as to obtain the maximum recall and precision values in the SVM classifier. It was tried to obtain the best activation function for F1 score value. Receiver Operating Characteristic (ROC) curves were also created for each of the classes. At the end of the study, the activation functions from which the desired SVM responses are obtained are given by comparison.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132825765","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355319
Wisam H. Alobaidi, Israa T. Aziz, Thakwan A. Jawad, Firas M. F. Flaih, Abdulrahman T. Azeez
Face detection and recognition are challenging research topics in the field of robotic vision. Numerous algorithms have been proposed to solve several problems related to changes in environment and lighting conditions. In our research, we introduce a new algorithm for face detection. The proposed method uses the well-known local binary patterns(LBP) algorithm and K-means clustering for face segmentation and maximum likelihood to classify output data. This method can be summarized as a process of detecting and recognizing faces on the basis of the distribution of feature vector amplitudes on six levels, that is, three for positive vector amplitudes and three for negative amplitudes. Detection is conducted by classifying distribution values and deciding whether or not these values compose a face.
{"title":"Face detection based on probability of amplitude distribution of local binary patterns algorithm","authors":"Wisam H. Alobaidi, Israa T. Aziz, Thakwan A. Jawad, Firas M. F. Flaih, Abdulrahman T. Azeez","doi":"10.1109/ISDFS.2018.8355319","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355319","url":null,"abstract":"Face detection and recognition are challenging research topics in the field of robotic vision. Numerous algorithms have been proposed to solve several problems related to changes in environment and lighting conditions. In our research, we introduce a new algorithm for face detection. The proposed method uses the well-known local binary patterns(LBP) algorithm and K-means clustering for face segmentation and maximum likelihood to classify output data. This method can be summarized as a process of detecting and recognizing faces on the basis of the distribution of feature vector amplitudes on six levels, that is, three for positive vector amplitudes and three for negative amplitudes. Detection is conducted by classifying distribution values and deciding whether or not these values compose a face.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"233 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133717453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355345
Troy Lawrence, Umit Karabiyik, N. Shashidhar
Digital forensic laboratory is indispensable in supporting the investigative process and performing forensically sound investigations. In order to perform efficient investigations, the laboratory must be designed properly. Hence, purchase of proper yet expensive the hardware and software equipment is necessary. In this paper, we demonstrate that Law Enforcement agencies can create and maintain a digital forensic lab with a relatively small budget. Computer and mobile device forensic science examinations can be completed utilizing inexpensive hardware and/or software solutions. A suggested list of the essential items is provided for the reader. While this paper is intended to help smaller police departments create digital forensic labs consisting of one or two examiners, agencies of all size can scale their labs to greater size utilizing these options. Enhancing lab capabilities, including advanced forensic techniques, will increase the budget needed to equip such a lab.
{"title":"Equipping a digital forensic lab on a budget","authors":"Troy Lawrence, Umit Karabiyik, N. Shashidhar","doi":"10.1109/ISDFS.2018.8355345","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355345","url":null,"abstract":"Digital forensic laboratory is indispensable in supporting the investigative process and performing forensically sound investigations. In order to perform efficient investigations, the laboratory must be designed properly. Hence, purchase of proper yet expensive the hardware and software equipment is necessary. In this paper, we demonstrate that Law Enforcement agencies can create and maintain a digital forensic lab with a relatively small budget. Computer and mobile device forensic science examinations can be completed utilizing inexpensive hardware and/or software solutions. A suggested list of the essential items is provided for the reader. While this paper is intended to help smaller police departments create digital forensic labs consisting of one or two examiners, agencies of all size can scale their labs to greater size utilizing these options. Enhancing lab capabilities, including advanced forensic techniques, will increase the budget needed to equip such a lab.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123214886","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355367
M. Baykara, Sebahattin Güçlü
Günümüzde, web uygulamasının güvenliğini korumak büyük bir önem taşımaktadır. Siteler Arası Komut Dosyası (XSS), web uygulamalarını etkileyebilecek bir güvenlik hatasıdır. Bu hata bir saldırganın kendi kötü amaçlı kodlarını kullanıcılara gösterilen HTML sayfalarına eklemesine olanak tanır. Kötü amaçlı kodun başarıyla yürütülmesi üzerine, sistem veya web sitesi eylemi, davranışı tamamen değiştirilebilir. XSS güvenlik açıklığı, saldırganlar tarafından kurbanın web uygulamalarına kötü amaçlı Java Script kodunu ekleyerek çerezler, kimlik bilgileri gibi web tarayıcısının kaynaklarını çalmak için kullanılmaktadır. Web tarayıcıları, dinamik web sayfalarını etkinleştirmek için web sayfalarına gömülü komutların yürütülmesini desteklediğinden, saldırganlar bir kullanıcının Web tarayıcısında kötü amaçlı kod çalıştırmayı zorunlu kılmak için bu özelliği kullanabilir. Bu çalışmada web sitelerinde oluşturabilecek manipülasyonu algılayan ve önleyen ve dolayısıyla Siteler Arası Komut Dosyası (XSS) saldırılarını ortadan kaldıran bir teknik önerilmiştir. Ayrıca çalışmada Asp.NET, PHP, PHP ve Ruby dilleri ile XSS açıklarını tespit eden 4 farklı yazılım geliştirilmiş ve bunların farklı programlama dillerinin sağladığı ortamlarda XSS saldırılarını tespitindeki başarıları kıyaslanmıştır.
{"title":"Applications for detecting XSS attacks on different web platforms","authors":"M. Baykara, Sebahattin Güçlü","doi":"10.1109/ISDFS.2018.8355367","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355367","url":null,"abstract":"Günümüzde, web uygulamasının güvenliğini korumak büyük bir önem taşımaktadır. Siteler Arası Komut Dosyası (XSS), web uygulamalarını etkileyebilecek bir güvenlik hatasıdır. Bu hata bir saldırganın kendi kötü amaçlı kodlarını kullanıcılara gösterilen HTML sayfalarına eklemesine olanak tanır. Kötü amaçlı kodun başarıyla yürütülmesi üzerine, sistem veya web sitesi eylemi, davranışı tamamen değiştirilebilir. XSS güvenlik açıklığı, saldırganlar tarafından kurbanın web uygulamalarına kötü amaçlı Java Script kodunu ekleyerek çerezler, kimlik bilgileri gibi web tarayıcısının kaynaklarını çalmak için kullanılmaktadır. Web tarayıcıları, dinamik web sayfalarını etkinleştirmek için web sayfalarına gömülü komutların yürütülmesini desteklediğinden, saldırganlar bir kullanıcının Web tarayıcısında kötü amaçlı kod çalıştırmayı zorunlu kılmak için bu özelliği kullanabilir. Bu çalışmada web sitelerinde oluşturabilecek manipülasyonu algılayan ve önleyen ve dolayısıyla Siteler Arası Komut Dosyası (XSS) saldırılarını ortadan kaldıran bir teknik önerilmiştir. Ayrıca çalışmada Asp.NET, PHP, PHP ve Ruby dilleri ile XSS açıklarını tespit eden 4 farklı yazılım geliştirilmiş ve bunların farklı programlama dillerinin sağladığı ortamlarda XSS saldırılarını tespitindeki başarıları kıyaslanmıştır.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122658933","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355381
Aykut Karakaya, S. Akleylek
Wireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network. These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making data flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non-repudiation have been developed. In this paper, current problems are assessed in the security of wireless sensor networks, and authentication security policies are discussed.
{"title":"A survey on security threats and authentication approaches in wireless sensor networks","authors":"Aykut Karakaya, S. Akleylek","doi":"10.1109/ISDFS.2018.8355381","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355381","url":null,"abstract":"Wireless sensor networks (WSN) are networks in which data obtained by observing the environment by a large number of sensors deployed in a specific area are sent securely to other sensors or centers in the network. These networks have the abilities of being not connected to a central node, self-managing and healing, not being connected to a specific network topology, multi-way routing, preserving the integrity and confidentiality of data, and being robust. Today's ongoing work: designing sensors that are resistant to harsh weather conditions, reducing energy consumption, designing low-cost sensors with high capacities, and making data flow faster and safer. The data obtained from the sensors must be transmitted safely to the target. Wireless sensor networks have a large number of attack types (Sybil, Wormhole, Sinkhole, etc.) that threaten data flow. While designing security policies, a general structure is aimed at eliminating some or all of the attacks. For this reason, policies based on information security principles such as privacy, integrity, availability, authentication and non-repudiation have been developed. In this paper, current problems are assessed in the security of wireless sensor networks, and authentication security policies are discussed.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125972332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355350
Mehmet Kaya, Shannon N. Conley, Z. S. Othman, A. Varol
According to the plan-driven software development processes, software creation is comprised of a sequence of activities which starts with requirement analysis and continues with system design, implementation, testing and deployment and finally ends with maintenance phase. Although each phase contributes to the total development cost, research shows that more than 60% of it comes from maintenance. The quality and clarity of the system design or implementation subsequently is responsible for the cost of maintenance. Therefore, it is of great importance to detect and eliminate any design or implementation flaws to reduce the cost of development especially incurred by maintenance phase. This study discusses the importance of refactoring in software engineering and difficulties one may face with applying refactoring. We also lay out the factors that affect execution of certain refactoring. We present a discussion that takes us to a conceptual solution for more effective refactoring research and we share our observations and personal opinions in how to apply refactoring more effectively.
{"title":"Effective software refactoring process","authors":"Mehmet Kaya, Shannon N. Conley, Z. S. Othman, A. Varol","doi":"10.1109/ISDFS.2018.8355350","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355350","url":null,"abstract":"According to the plan-driven software development processes, software creation is comprised of a sequence of activities which starts with requirement analysis and continues with system design, implementation, testing and deployment and finally ends with maintenance phase. Although each phase contributes to the total development cost, research shows that more than 60% of it comes from maintenance. The quality and clarity of the system design or implementation subsequently is responsible for the cost of maintenance. Therefore, it is of great importance to detect and eliminate any design or implementation flaws to reduce the cost of development especially incurred by maintenance phase. This study discusses the importance of refactoring in software engineering and difficulties one may face with applying refactoring. We also lay out the factors that affect execution of certain refactoring. We present a discussion that takes us to a conceptual solution for more effective refactoring research and we share our observations and personal opinions in how to apply refactoring more effectively.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129187299","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355354
Osman Altay, M. Ulaş
Autism Spectrum Disorder (ASD) negatively affects the whole life of people. The main indications of ASD are seen as lack of social interaction and communication, repetitive patterns of behavior, fixed interests and activities. It is very important that ASD is diagnosed at an early age. In this study, the classification method for ASD diagnosis was used in children aged 4–11 years. The Linear Discriminant Analysis (LDA) and The K-Nearest Neighbor (KNN) algorithms are used for classification. To test the algorithms, 30 percent of the data set was selected as test data and 70 percent as training data. As a result of the work done; In the LDA algorithm, the accuracy is 90.8%, whereas the accuracy of the KNN algorithm is 88.5%. For the LDA algorithm, sensitivity and specificity values are calculated as 0.9524 and .08667, respectively. For KNN algorithm, these values are calculated as 0.9762 and 0.80. F-measure values are calculated as 0.9091 for the LDA algorithm and 0.8913 for the KNN algorithm.
{"title":"Prediction of the autism spectrum disorder diagnosis with linear discriminant analysis classifier and K-nearest neighbor in children","authors":"Osman Altay, M. Ulaş","doi":"10.1109/ISDFS.2018.8355354","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355354","url":null,"abstract":"Autism Spectrum Disorder (ASD) negatively affects the whole life of people. The main indications of ASD are seen as lack of social interaction and communication, repetitive patterns of behavior, fixed interests and activities. It is very important that ASD is diagnosed at an early age. In this study, the classification method for ASD diagnosis was used in children aged 4–11 years. The Linear Discriminant Analysis (LDA) and The K-Nearest Neighbor (KNN) algorithms are used for classification. To test the algorithms, 30 percent of the data set was selected as test data and 70 percent as training data. As a result of the work done; In the LDA algorithm, the accuracy is 90.8%, whereas the accuracy of the KNN algorithm is 88.5%. For the LDA algorithm, sensitivity and specificity values are calculated as 0.9524 and .08667, respectively. For KNN algorithm, these values are calculated as 0.9762 and 0.80. F-measure values are calculated as 0.9091 for the LDA algorithm and 0.8913 for the KNN algorithm.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128410581","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355379
E. Irmak, Ísmail Erkek
Most of the countries evaluate their energy networks in terms of national security and define as critical infrastructure. Monitoring and controlling of these systems are generally provided by Industrial Control Systems (ICSs) and/or Supervisory Control and Data Acquisition (SCADA) systems. Therefore, this study focuses on the cyber-attack vectors on SCADA systems to research the threats and risks targeting them. For this purpose, TCP/IP based protocols used in SCADA systems have been determined and analyzed at first. Then, the most common cyber-attacks are handled systematically considering hardware-side threats, software-side ones and the threats for communication infrastructures. Finally, some suggestions are given.
{"title":"An overview of cyber-attack vectors on SCADA systems","authors":"E. Irmak, Ísmail Erkek","doi":"10.1109/ISDFS.2018.8355379","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355379","url":null,"abstract":"Most of the countries evaluate their energy networks in terms of national security and define as critical infrastructure. Monitoring and controlling of these systems are generally provided by Industrial Control Systems (ICSs) and/or Supervisory Control and Data Acquisition (SCADA) systems. Therefore, this study focuses on the cyber-attack vectors on SCADA systems to research the threats and risks targeting them. For this purpose, TCP/IP based protocols used in SCADA systems have been determined and analyzed at first. Then, the most common cyber-attacks are handled systematically considering hardware-side threats, software-side ones and the threats for communication infrastructures. Finally, some suggestions are given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115484578","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355346
Gürol Canbek, Ş. Sağiroğlu
Conventional energy grids growing in time have become complex, inefficient and expensive to operate and use. They are critical because of providing the whole energy needs of the technologies required for our modern life but also cumbersome entities. “Smarting” the grids by automating, facilitating the troubleshooting and productivity analysis with the help of information technologies infrastructure, reinforcing the controls, charging the services in details makes it possible to administrate efficiently and provide high level quality services. But, evolving cyber threats against the grids has addressed the security aspect again. This paper summarizes the inevitable strategic cyber security approach to be demonstrated against cyber threats and attacks exploiting the vulnerabilities of the smart grids that are one of the cyber-physical systems in critical infrastructures of many national cyber security strategies.
{"title":"Strategic cyber-security perspective in smart grids","authors":"Gürol Canbek, Ş. Sağiroğlu","doi":"10.1109/ISDFS.2018.8355346","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355346","url":null,"abstract":"Conventional energy grids growing in time have become complex, inefficient and expensive to operate and use. They are critical because of providing the whole energy needs of the technologies required for our modern life but also cumbersome entities. “Smarting” the grids by automating, facilitating the troubleshooting and productivity analysis with the help of information technologies infrastructure, reinforcing the controls, charging the services in details makes it possible to administrate efficiently and provide high level quality services. But, evolving cyber threats against the grids has addressed the security aspect again. This paper summarizes the inevitable strategic cyber security approach to be demonstrated against cyber threats and attacks exploiting the vulnerabilities of the smart grids that are one of the cyber-physical systems in critical infrastructures of many national cyber security strategies.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"102 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114480970","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355340
Emre Yavuz, Ali Koc, Umut Can Çabuk, G. Dalkılıç
There is no doubt that the revolutionary concept of the blockchain, which is the underlying technology behind the famous cryptocurrency Bitcoin and its successors, is triggering the start of a new era in the Internet and the online services. While most people focus only at cryptocurrencies; in fact, many administrative operations, fintech procedures, and everyday services that can only be done offline and/or in person, can now safely be moved to the Internet as online services. What makes it a powerful tool for digitalizing everyday services is the introduction of smart contracts, as in the Ethereum platform. Smart contracts are meaningful pieces of codes, to be integrated in the blockchain and executed as scheduled in every step of blockchain updates. E-voting on the other hand, is another trending, yet critical, topic related to the online services. The blockchain with the smart contracts, emerges as a good candidate to use in developments of safer, cheaper, more secure, more transparent, and easier-to-use e-voting systems. Ethereum and its network is one of the most suitable ones, due to its consistency, widespread use, and provision of smart contracts logic. An e-voting system must be secure, as it should not allow duplicated votes and be fully transparent, while protecting the privacy of the attendees. In this work, we have implemented and tested a sample e-voting application as a smart contract for the Ethereum network using the Ethereum wallets and the Solidity language. Android platform is also considered to allow voting for people who do not have an Ethereum wallet. After an election is held, eventually, the Ethereum blockchain will hold the records of ballots and votes. Users can submit their votes via an Android device or directly from their Ethereum wallets, and these transaction requests are handled with the consensus of every single Ethereum node. This consensus creates a transparent environment for e-voting. In addition to a broad discussion about reliability and efficiency of the blockchain-based e-voting systems, our application and its test results are presented in this paper, too.
{"title":"Towards secure e-voting using ethereum blockchain","authors":"Emre Yavuz, Ali Koc, Umut Can Çabuk, G. Dalkılıç","doi":"10.1109/ISDFS.2018.8355340","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355340","url":null,"abstract":"There is no doubt that the revolutionary concept of the blockchain, which is the underlying technology behind the famous cryptocurrency Bitcoin and its successors, is triggering the start of a new era in the Internet and the online services. While most people focus only at cryptocurrencies; in fact, many administrative operations, fintech procedures, and everyday services that can only be done offline and/or in person, can now safely be moved to the Internet as online services. What makes it a powerful tool for digitalizing everyday services is the introduction of smart contracts, as in the Ethereum platform. Smart contracts are meaningful pieces of codes, to be integrated in the blockchain and executed as scheduled in every step of blockchain updates. E-voting on the other hand, is another trending, yet critical, topic related to the online services. The blockchain with the smart contracts, emerges as a good candidate to use in developments of safer, cheaper, more secure, more transparent, and easier-to-use e-voting systems. Ethereum and its network is one of the most suitable ones, due to its consistency, widespread use, and provision of smart contracts logic. An e-voting system must be secure, as it should not allow duplicated votes and be fully transparent, while protecting the privacy of the attendees. In this work, we have implemented and tested a sample e-voting application as a smart contract for the Ethereum network using the Ethereum wallets and the Solidity language. Android platform is also considered to allow voting for people who do not have an Ethereum wallet. After an election is held, eventually, the Ethereum blockchain will hold the records of ballots and votes. Users can submit their votes via an Android device or directly from their Ethereum wallets, and these transaction requests are handled with the consensus of every single Ethereum node. This consensus creates a transparent environment for e-voting. In addition to a broad discussion about reliability and efficiency of the blockchain-based e-voting systems, our application and its test results are presented in this paper, too.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128257584","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}