首页 > 最新文献

2018 6th International Symposium on Digital Forensic and Security (ISDFS)最新文献

英文 中文
Terrorist attacks in Turkey: An evaluate of terrorist acts that occurred in 2016 土耳其的恐怖袭击:对2016年发生的恐怖主义行为的评估
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355370
D. Y. Mohammed, M. Karabatak
Terrorist attacks are the most significant challenging for the humankind across the world, which need the whole attention. To predict the terrorist group which is accountable for results and activities utilizing historical info is a difficult task because of the lake of detailed terrorist data. Therefore, this paper based on predicting terrorist groups responsible of attacks in TURKEY terrorist acts that occurred in 2016 by using data mining techniques is analyzing the most useful and accessible algorithms used by the machine learning systems. The typical analysis of these datasets including algorithms is implemented on the Weka tool depends upon real info represented through Global Terrorism Database (GTD) from the national consortium for the study of terrorism and responses of terrorism (START). The results of the paper show which algorithm is more convenient for a particular dataset. Tests are performed on real-life data by using Weka and also the final analysis and conclusion based on five performance steps which revealed that J48, is more accurate than Bayes Net, SVM and NB but KNN has the lowest classification accuracy although it performs well in other measures.
恐怖袭击是人类面临的最重大挑战,需要引起全世界的高度重视。由于缺乏详细的恐怖主义数据,利用历史信息预测对结果和活动负责的恐怖组织是一项艰巨的任务。因此,本文基于使用数据挖掘技术预测2016年土耳其恐怖袭击事件的恐怖组织,分析了机器学习系统使用的最有用和可访问的算法。对这些数据集(包括算法)的典型分析是在Weka工具上实现的,这些分析依赖于来自国家恐怖主义研究和恐怖主义反应联盟(START)的全球恐怖主义数据库(GTD)所表示的真实信息。本文的研究结果表明,对于特定的数据集,哪种算法更方便。使用Weka对实际数据进行了测试,并根据五个性能步骤进行了最终分析和结论,结果表明J48比Bayes Net, SVM和NB更准确,但KNN的分类精度最低,尽管它在其他措施中表现良好。
{"title":"Terrorist attacks in Turkey: An evaluate of terrorist acts that occurred in 2016","authors":"D. Y. Mohammed, M. Karabatak","doi":"10.1109/ISDFS.2018.8355370","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355370","url":null,"abstract":"Terrorist attacks are the most significant challenging for the humankind across the world, which need the whole attention. To predict the terrorist group which is accountable for results and activities utilizing historical info is a difficult task because of the lake of detailed terrorist data. Therefore, this paper based on predicting terrorist groups responsible of attacks in TURKEY terrorist acts that occurred in 2016 by using data mining techniques is analyzing the most useful and accessible algorithms used by the machine learning systems. The typical analysis of these datasets including algorithms is implemented on the Weka tool depends upon real info represented through Global Terrorism Database (GTD) from the national consortium for the study of terrorism and responses of terrorism (START). The results of the paper show which algorithm is more convenient for a particular dataset. Tests are performed on real-life data by using Weka and also the final analysis and conclusion based on five performance steps which revealed that J48, is more accurate than Bayes Net, SVM and NB but KNN has the lowest classification accuracy although it performs well in other measures.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Review of illegal betting as financial crime in web forensics 网络取证中非法赌博作为金融犯罪的研究综述
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355387
Yeşím Ülgen Sönmez, A. Varol
Throughout the world, there are debates and questionnaires on whether sports betting is morally wrong and whether it should be legal or illegal. While these debates continue every nationwide, governments are updating the laws on betting. They bring different criminal sanctions-like fault and offense-to betting bosses and betting players in both physical and virtual environments. Illegal betting harms countries' economies because money transfer is among the different countries. It also directs people to the gambling. For this reason, illegal betting is an important concept in information law and computer forensics. There can be many criminals or criminal tendencies in web activities, as well as illegal betting. This study reviews illegal betting in terms of information law and web forensics.
在世界各地,关于体育博彩是否在道德上是错误的,以及它应该是合法的还是非法的,都有争论和调查问卷。当这些争论在全国范围内继续进行时,政府正在更新有关赌博的法律。他们在现实和虚拟环境中对博彩老板和玩家施加不同的刑事制裁,比如过失和犯罪。非法赌博损害国家经济,因为资金转移是在不同的国家之间进行的。它还引导人们去赌博。因此,非法赌博是信息法和计算机取证中的一个重要概念。在网络活动和非法赌博中,可能存在许多犯罪分子或犯罪倾向。本文从信息法和网络取证的角度回顾了非法赌博。
{"title":"Review of illegal betting as financial crime in web forensics","authors":"Yeşím Ülgen Sönmez, A. Varol","doi":"10.1109/ISDFS.2018.8355387","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355387","url":null,"abstract":"Throughout the world, there are debates and questionnaires on whether sports betting is morally wrong and whether it should be legal or illegal. While these debates continue every nationwide, governments are updating the laws on betting. They bring different criminal sanctions-like fault and offense-to betting bosses and betting players in both physical and virtual environments. Illegal betting harms countries' economies because money transfer is among the different countries. It also directs people to the gambling. For this reason, illegal betting is an important concept in information law and computer forensics. There can be many criminals or criminal tendencies in web activities, as well as illegal betting. This study reviews illegal betting in terms of information law and web forensics.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Neural network based intrusion detection systems with different training functions 基于神经网络的入侵检测系统具有不同的训练函数
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355327
Gozde Karatas, O. K. Sahingoz
In the last decades, due to the improvements in networking techniques and the increased use of the Internet, the digital communications entered all of the activities in the global marketplace. Parallel to these enhancements the attempts of hackers for intruding the networks are also increased. They tried to make unauthorized access to the networks for making some modifications in their data or to increase the network traffic for making a denial of service attack. Although a firewall seems as a good tool for preventing this type of attacks, intrusion detection systems (IDSs) are also preferred especially for detecting the attack within the network system. In the last few years, the performance of the IDS is increased with the help of machine learning algorithms whose effects depend on the used training/learning algorithm. Mainly it is really hard to know which learning algorithm can be the fastest one according to the problem type. The algorithm selection depends on lots of factors such as the size of data sets, number of nodes network design, the targeted error rate, the complexity of the problem, etc. In this paper, it is aimed to compare different network training function in a multi-layered artificial neural network which is designed for constructing an effective intrusion detection system. The experimental results are depicted in the paper by explaining the efficiency of the algorithms according to their true-positive detection rates and speed of the execution.
在过去的几十年里,由于网络技术的进步和互联网使用的增加,数字通信进入了全球市场的所有活动。与这些增强并行的是,黑客入侵网络的尝试也在增加。他们试图对网络进行未经授权的访问,对他们的数据进行一些修改,或者增加网络流量,进行拒绝服务攻击。虽然防火墙似乎是防止此类攻击的好工具,但入侵检测系统(ids)也更适合用于检测网络系统内的攻击。在过去的几年里,IDS的性能在机器学习算法的帮助下得到了提高,而机器学习算法的效果取决于所使用的训练/学习算法。根据问题的类型,很难知道哪个学习算法是最快的。算法的选择取决于许多因素,如数据集的大小、网络设计的节点数量、目标错误率、问题的复杂程度等。为了构建有效的入侵检测系统,本文对多层人工神经网络中不同的网络训练函数进行了比较。本文从真阳性检测率和执行速度两方面说明了算法的效率,并给出了实验结果。
{"title":"Neural network based intrusion detection systems with different training functions","authors":"Gozde Karatas, O. K. Sahingoz","doi":"10.1109/ISDFS.2018.8355327","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355327","url":null,"abstract":"In the last decades, due to the improvements in networking techniques and the increased use of the Internet, the digital communications entered all of the activities in the global marketplace. Parallel to these enhancements the attempts of hackers for intruding the networks are also increased. They tried to make unauthorized access to the networks for making some modifications in their data or to increase the network traffic for making a denial of service attack. Although a firewall seems as a good tool for preventing this type of attacks, intrusion detection systems (IDSs) are also preferred especially for detecting the attack within the network system. In the last few years, the performance of the IDS is increased with the help of machine learning algorithms whose effects depend on the used training/learning algorithm. Mainly it is really hard to know which learning algorithm can be the fastest one according to the problem type. The algorithm selection depends on lots of factors such as the size of data sets, number of nodes network design, the targeted error rate, the complexity of the problem, etc. In this paper, it is aimed to compare different network training function in a multi-layered artificial neural network which is designed for constructing an effective intrusion detection system. The experimental results are depicted in the paper by explaining the efficiency of the algorithms according to their true-positive detection rates and speed of the execution.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Detecting human emotions using electroencephalography (EEG) using dynamic programming approach 基于动态规划方法的脑电图检测人类情绪
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355324
W. Mardini, G. A. Ali, Esraa Magdady, Sajedah Al-Momani
The relation between human emotions and EEG signals have been actively studied during the last few decades. In this paper, we study a novel attempt to measure the human brain activity and analyze its signals using electroencephalography (EEG) in order to classify the human emotions indicated by the brain wavelets. The study will measure the brain wavelets of female students in order to detect the emotions of happiness, sadness, and fear. This study will use specially designed sensors placed around the scalp. The measured signals transfer to a computing device. The data collected analyze by a software system, which developed by our team. We use dynamic programming to extract the maximum number of quality service that provides to the user when the device captures specific signals for each emotion.
近几十年来,人们一直在积极研究人类情绪与脑电图信号之间的关系。本文研究了一种利用脑电图(EEG)测量人脑活动并分析其信号的新方法,以便对脑小波所表示的人类情绪进行分类。该研究将测量女学生的大脑小波,以探测快乐、悲伤和恐惧的情绪。这项研究将使用放置在头皮周围的特殊设计的传感器。被测量的信号传输到计算设备。收集到的数据通过我们团队开发的软件系统进行分析。当设备捕捉到每种情绪的特定信号时,我们使用动态规划来提取提供给用户的优质服务的最大数量。
{"title":"Detecting human emotions using electroencephalography (EEG) using dynamic programming approach","authors":"W. Mardini, G. A. Ali, Esraa Magdady, Sajedah Al-Momani","doi":"10.1109/ISDFS.2018.8355324","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355324","url":null,"abstract":"The relation between human emotions and EEG signals have been actively studied during the last few decades. In this paper, we study a novel attempt to measure the human brain activity and analyze its signals using electroencephalography (EEG) in order to classify the human emotions indicated by the brain wavelets. The study will measure the brain wavelets of female students in order to detect the emotions of happiness, sadness, and fear. This study will use specially designed sensors placed around the scalp. The measured signals transfer to a computing device. The data collected analyze by a software system, which developed by our team. We use dynamic programming to extract the maximum number of quality service that provides to the user when the device captures specific signals for each emotion.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
Central audit logging mechanism in personal data web services 个人资料web服务的中央审核记录机制
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355333
A. Hasiloglu, Abdulkadir Bali
Personal data have been compiled and harnessed by a great number of establishments to execute their legal activities. Establishments are legally bound to maintain the confidentiality and security of personal data. Hence it is a requirement to provide access logs for the personal information. Depending on the needs and capacity, personal data can be opened to the users via platforms such as file system, database and web service. Web service platform is a popular alternative since it is autonomous and can isolate the data source from the user. In this paper, the way to log personal data accessed via web service method has been discussed. As an alternative to classical method in which logs were recorded and saved by client applications, a different mechanism of forming a central audit log with API manager has been investigated. By forging a model policy to exemplify central logging method, its advantages and disadvantages have been explored. It has been concluded in the end that this model could be employed in centrally recording audit logs.
许多机构已收集和利用个人资料,以执行其法律活动。在法律上,机构有义务为个人资料保密和保密。因此,需要为个人信息提供访问日志。根据需要和容量,个人数据可以通过文件系统、数据库和网络服务等平台向用户开放。Web服务平台是一种流行的替代方案,因为它是自治的,可以将数据源与用户隔离开来。本文讨论了通过web服务方式访问个人数据的记录方式。作为由客户机应用程序记录和保存日志的经典方法的替代方法,研究了一种使用API管理器形成中央审计日志的不同机制。通过建立一个模型策略来举例说明中心测井方法,探讨了其优缺点。最后得出结论,该模型可用于审计日志的集中记录。
{"title":"Central audit logging mechanism in personal data web services","authors":"A. Hasiloglu, Abdulkadir Bali","doi":"10.1109/ISDFS.2018.8355333","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355333","url":null,"abstract":"Personal data have been compiled and harnessed by a great number of establishments to execute their legal activities. Establishments are legally bound to maintain the confidentiality and security of personal data. Hence it is a requirement to provide access logs for the personal information. Depending on the needs and capacity, personal data can be opened to the users via platforms such as file system, database and web service. Web service platform is a popular alternative since it is autonomous and can isolate the data source from the user. In this paper, the way to log personal data accessed via web service method has been discussed. As an alternative to classical method in which logs were recorded and saved by client applications, a different mechanism of forming a central audit log with API manager has been investigated. By forging a model policy to exemplify central logging method, its advantages and disadvantages have been explored. It has been concluded in the end that this model could be employed in centrally recording audit logs.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cybercrimes against children in Turkey 土耳其针对儿童的网络犯罪
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355374
E. Ates, E. Bostanci, M. Güzel
Technology is an important issue affecting human life. We are experiencing conveniences in various fields in our lives along with the technological developments, especially with the emergence of the computers and internet concept. The virtual world provides opportunities for people who are inclined to crime. Since people from every walk of life can be easily reached especially in the internet environment, it has become easier to be a victim of a crime. The victimization is important in general, however, its effect on children is much greater than that of adults. Therefore, the sample of child victims of cybercrime in Turkey was examined using data obtained from Turkish Statistical Institute in this study. In order to examine crime and ways for combating the crime, the hot spots where the victims live mostly and the generic profile of the victims were discovered. The results obtained from the conducted analysis is expected to contribute significantly to the preventive and forensic processes carried out by the relevant authorities.
科技是影响人类生活的重要问题。随着科技的发展,特别是随着计算机和互联网概念的出现,我们在生活的各个领域都体验到了便利。虚拟世界为有犯罪倾向的人提供了机会。由于各行各业的人都可以很容易地联系到,特别是在互联网环境中,因此更容易成为犯罪的受害者。受害一般来说很重要,然而,它对儿童的影响远大于对成人的影响。因此,在本研究中,使用从土耳其统计研究所获得的数据,对土耳其网络犯罪的儿童受害者样本进行了检查。为了调查犯罪和打击犯罪的方法,发现了受害者主要居住的热点地区和受害者的一般特征。从所进行的分析中获得的结果预计将对有关当局开展的预防和法医程序作出重大贡献。
{"title":"Cybercrimes against children in Turkey","authors":"E. Ates, E. Bostanci, M. Güzel","doi":"10.1109/ISDFS.2018.8355374","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355374","url":null,"abstract":"Technology is an important issue affecting human life. We are experiencing conveniences in various fields in our lives along with the technological developments, especially with the emergence of the computers and internet concept. The virtual world provides opportunities for people who are inclined to crime. Since people from every walk of life can be easily reached especially in the internet environment, it has become easier to be a victim of a crime. The victimization is important in general, however, its effect on children is much greater than that of adults. Therefore, the sample of child victims of cybercrime in Turkey was examined using data obtained from Turkish Statistical Institute in this study. In order to examine crime and ways for combating the crime, the hot spots where the victims live mostly and the generic profile of the victims were discovered. The results obtained from the conducted analysis is expected to contribute significantly to the preventive and forensic processes carried out by the relevant authorities.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Review and comparison of captcha approaches and a new captcha model 验证码方法的回顾和比较以及一种新的验证码模型
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355316
M. Baykara, Furkan Alnıak, Kahraman Çınar
Captcha is an abbreviation of Completely Automated Public Turing test to Tell Computers and Humans Apart. It is a technique used for verification purposes in many applications. Software developers often use this method to get rid of the malicious requests that automatic tools will make. The proliferation of bots and spam tools in particular has led to the emergence and rapid spread of such technologies. Captcha has been developed to prevent such malicious activities, but today's simple image-based Captcha applications can be solved by OCR methods. In this study, an image based CAPTCHA was developed. In this captcha method, which is created with high noise value, it is very difficult to solve with OCR because the noise does not decrease even when the picture is converted to binary. In addition, the existing captcha approaches were examined and a security comparison was given.
Captcha是“区分计算机和人类的完全自动化公共图灵测试”的缩写。它是一种在许多应用程序中用于验证目的的技术。软件开发人员经常使用这种方法来摆脱自动工具将产生的恶意请求。尤其是机器人和垃圾邮件工具的激增,导致了这类技术的出现和迅速传播。Captcha的开发是为了防止此类恶意活动,但今天简单的基于图像的Captcha应用程序可以通过OCR方法解决。本研究开发了一种基于图像的验证码。这种验证码方法的噪声值很高,即使将图像转换为二值,噪声也没有减少,因此很难用OCR来解决。此外,对现有的验证码方法进行了分析和安全性比较。
{"title":"Review and comparison of captcha approaches and a new captcha model","authors":"M. Baykara, Furkan Alnıak, Kahraman Çınar","doi":"10.1109/ISDFS.2018.8355316","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355316","url":null,"abstract":"Captcha is an abbreviation of Completely Automated Public Turing test to Tell Computers and Humans Apart. It is a technique used for verification purposes in many applications. Software developers often use this method to get rid of the malicious requests that automatic tools will make. The proliferation of bots and spam tools in particular has led to the emergence and rapid spread of such technologies. Captcha has been developed to prevent such malicious activities, but today's simple image-based Captcha applications can be solved by OCR methods. In this study, an image based CAPTCHA was developed. In this captcha method, which is created with high noise value, it is very difficult to solve with OCR because the noise does not decrease even when the picture is converted to binary. In addition, the existing captcha approaches were examined and a security comparison was given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115004807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Study on cyber security assessment for wireless network at nuclear facilities 核设施无线网络网络安全评估研究
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355332
Sangwoo Kim, Hyunjong Lim, S. Lim, Ick-hyun Shin
The fourth industrial revolution has become an major issue of recent year and also impacting the field of nuclear facilities that research of introducing the latest Internet of Thing(IoT) technologies such as sensor-networks communication is being conducted. Especially, research and study for applying wireless network technology to safety-related and emergency preparedness systems in nuclear facilities are being conducted as well. However, wireless it is hard to apply physical access control on the wireless network using frequency. If digital systems of nuclear facility are compromised by cyber attack, public safety were not be guaranteed. From this point, the cyber security assessment must be performed when applying wireless network technologies to the systems in the nuclear facility. This study is to analyze and develop the cyber security assessment methodology with wireless network at nuclear facilities. We analyzed the cases of wireless network attacks broadly known in critical infrastructure and public facilities, and draw out the requirements and inspection activity in the cyber security assessment that must be checked in the wireless network. The requirements and activities presented in this paper are able to be the reference to establish the policy and guidelines for cyber security assessment when the nuclear facilities are applying the wireless network technology into the field.
近年来,第四次工业革命成为热门话题,正在研究引入传感器网络通信等最新物联网(IoT)技术的核设施领域也受到了影响。特别是,将无线网络技术应用于核设施安全相关系统和应急准备系统的研究和研究也正在进行。然而,无线网络很难利用频率对无线网络进行物理访问控制。如果核设施的数字系统受到网络攻击,公共安全将无法得到保障。从这一点来看,在将无线网络技术应用于核设施系统时,必须进行网络安全评估。本研究旨在分析并发展核子设施无线网路网路安全评估方法。我们分析了在关键基础设施和公共设施中广为人知的无线网络攻击案例,并提出了在无线网络中必须检查的网络安全评估要求和检查活动。本文提出的要求和活动可为核设施在现场应用无线网络技术时制定网络安全评估政策和指导方针提供参考。
{"title":"Study on cyber security assessment for wireless network at nuclear facilities","authors":"Sangwoo Kim, Hyunjong Lim, S. Lim, Ick-hyun Shin","doi":"10.1109/ISDFS.2018.8355332","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355332","url":null,"abstract":"The fourth industrial revolution has become an major issue of recent year and also impacting the field of nuclear facilities that research of introducing the latest Internet of Thing(IoT) technologies such as sensor-networks communication is being conducted. Especially, research and study for applying wireless network technology to safety-related and emergency preparedness systems in nuclear facilities are being conducted as well. However, wireless it is hard to apply physical access control on the wireless network using frequency. If digital systems of nuclear facility are compromised by cyber attack, public safety were not be guaranteed. From this point, the cyber security assessment must be performed when applying wireless network technologies to the systems in the nuclear facility. This study is to analyze and develop the cyber security assessment methodology with wireless network at nuclear facilities. We analyzed the cases of wireless network attacks broadly known in critical infrastructure and public facilities, and draw out the requirements and inspection activity in the cyber security assessment that must be checked in the wireless network. The requirements and activities presented in this paper are able to be the reference to establish the policy and guidelines for cyber security assessment when the nuclear facilities are applying the wireless network technology into the field.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A tool to compute approximation matching between windows processes 一个计算窗口进程间近似匹配的工具
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355372
R. Rodríguez, Miguel Martín-Pérez, I. Abadía
Finding identical digital objects (or artifacts) during a forensic analysis is commonly achieved by means of cryptographic hashing functions, such as MD5, SHA1, or SHA-256, to name a few. However, these functions suffer from the avalanche effect property, which guarantees that if an input is changed slightly the output changes significantly. Hence, these functions are unsuitable for typical digital forensics scenarios where a forensics memory image from a likely compromised machine shall be analyzed. This memory image file contains a snapshot of processes (instances of executable files) which were up on execution when the dumping process was done. However, processes are relocated at memory and contain dynamic data that depend on the current execution and environmental conditions. Therefore, the comparison of cryptographic hash values of different processes from the same executable file will be negative. Bytewise approximation matching algorithms may help in these scenarios, since they provide a similarity measurement in the range [0,1] between similar inputs instead of a yes/no answer (in the range {0,1}). In this paper, we introduce ProcessFuzzyHash, a Volatility plugin that enables us to compute approximation hash values of processes contained in a Windows memory dump.
在取证分析期间查找相同的数字对象(或工件)通常通过加密散列函数(例如MD5、SHA1或SHA-256)来实现。然而,这些函数受到雪崩效应的影响,这保证了如果输入发生轻微变化,输出就会发生显著变化。因此,这些功能不适合典型的数字取证场景,在这些场景中,需要分析来自可能受到损害的机器的取证内存映像。此内存映像文件包含转储过程完成时正在执行的进程(可执行文件的实例)的快照。但是,进程在内存中被重新定位,并且包含依赖于当前执行和环境条件的动态数据。因此,来自同一可执行文件的不同进程的加密散列值的比较将是负的。字节逼近匹配算法可能在这些场景中有所帮助,因为它们提供了相似输入之间[0,1]范围内的相似性度量,而不是一个是/否答案(在{0,1}范围内)。在本文中,我们介绍了ProcessFuzzyHash,一个波动性插件,使我们能够计算包含在Windows内存转储中的进程的近似哈希值。
{"title":"A tool to compute approximation matching between windows processes","authors":"R. Rodríguez, Miguel Martín-Pérez, I. Abadía","doi":"10.1109/ISDFS.2018.8355372","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355372","url":null,"abstract":"Finding identical digital objects (or artifacts) during a forensic analysis is commonly achieved by means of cryptographic hashing functions, such as MD5, SHA1, or SHA-256, to name a few. However, these functions suffer from the avalanche effect property, which guarantees that if an input is changed slightly the output changes significantly. Hence, these functions are unsuitable for typical digital forensics scenarios where a forensics memory image from a likely compromised machine shall be analyzed. This memory image file contains a snapshot of processes (instances of executable files) which were up on execution when the dumping process was done. However, processes are relocated at memory and contain dynamic data that depend on the current execution and environmental conditions. Therefore, the comparison of cryptographic hash values of different processes from the same executable file will be negative. Bytewise approximation matching algorithms may help in these scenarios, since they provide a similarity measurement in the range [0,1] between similar inputs instead of a yes/no answer (in the range {0,1}). In this paper, we introduce ProcessFuzzyHash, a Volatility plugin that enables us to compute approximation hash values of processes contained in a Windows memory dump.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116818007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
A comparison of cyber-security oriented testbeds for IoT-based smart grids 基于物联网的智能电网网络安全试验台比较
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355329
Muhammet Zekeriya Gunduz, Resul Das
Combining conventional power networks and information communication technologies forms smart grid concept. Researches on the evolution of conventional power grid system into smart grid continue thanks to the development of communication and information technologies hopefully. Testing of smart grid systems is usually performed in simulation environments. However, achieving more effective real-world implementations, a smart grid application needs a real-world test environment, called testbed. Smart grid, which is the combination of conventional electricity line with information communication technologies, is vulnerable to cyber-attacks and this is a key challenge improving the smart grid. The vulnerabilities to cyber-attacks in smart grid arise from information communication technologies' nature inherently. Testbeds, which cyber-security researches and studies can be performed, are needed to find effective solutions against cyber-attacks capabilities in smart grid practices. In this paper, an evaluation of existing smart grid testbeds with the capability of cyber security is presented. First, background, domains, research areas and security issues in smart grid are introduced briefly. Then smart grid testbeds and features are explained. Also, existing security-oriented testbeds and cyber-attack testing capabilities of testbeds are evaluated. Finally, we conclude the study and give some recommendations for security-oriented testbed implementations.
将传统电网与信息通信技术相结合,形成智能电网概念。随着通信和信息技术的发展,传统电网向智能电网演进的研究有望继续进行。智能电网系统的测试通常在仿真环境中进行。然而,为了实现更有效的现实世界实现,智能电网应用程序需要一个真实世界的测试环境,称为测试平台。智能电网是传统电力线路与信息通信技术的结合,容易受到网络攻击,这是提高智能电网的关键挑战。信息通信技术的固有特性决定了智能电网易受网络攻击的脆弱性。为了在智能电网实践中找到有效的应对网络攻击能力的解决方案,需要进行网络安全研究和研究的测试平台。本文对现有智能电网试验台的网络安全性能进行了评估。首先,简要介绍了智能电网的研究背景、领域、研究方向和安全问题。然后介绍了智能电网试验台及其特点。同时,对现有的面向安全的测试平台和测试平台的网络攻击测试能力进行了评估。最后,我们对研究进行了总结,并对面向安全的测试平台的实现提出了一些建议。
{"title":"A comparison of cyber-security oriented testbeds for IoT-based smart grids","authors":"Muhammet Zekeriya Gunduz, Resul Das","doi":"10.1109/ISDFS.2018.8355329","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355329","url":null,"abstract":"Combining conventional power networks and information communication technologies forms smart grid concept. Researches on the evolution of conventional power grid system into smart grid continue thanks to the development of communication and information technologies hopefully. Testing of smart grid systems is usually performed in simulation environments. However, achieving more effective real-world implementations, a smart grid application needs a real-world test environment, called testbed. Smart grid, which is the combination of conventional electricity line with information communication technologies, is vulnerable to cyber-attacks and this is a key challenge improving the smart grid. The vulnerabilities to cyber-attacks in smart grid arise from information communication technologies' nature inherently. Testbeds, which cyber-security researches and studies can be performed, are needed to find effective solutions against cyber-attacks capabilities in smart grid practices. In this paper, an evaluation of existing smart grid testbeds with the capability of cyber security is presented. First, background, domains, research areas and security issues in smart grid are introduced briefly. Then smart grid testbeds and features are explained. Also, existing security-oriented testbeds and cyber-attack testing capabilities of testbeds are evaluated. Finally, we conclude the study and give some recommendations for security-oriented testbed implementations.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 20
期刊
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1