Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355370
D. Y. Mohammed, M. Karabatak
Terrorist attacks are the most significant challenging for the humankind across the world, which need the whole attention. To predict the terrorist group which is accountable for results and activities utilizing historical info is a difficult task because of the lake of detailed terrorist data. Therefore, this paper based on predicting terrorist groups responsible of attacks in TURKEY terrorist acts that occurred in 2016 by using data mining techniques is analyzing the most useful and accessible algorithms used by the machine learning systems. The typical analysis of these datasets including algorithms is implemented on the Weka tool depends upon real info represented through Global Terrorism Database (GTD) from the national consortium for the study of terrorism and responses of terrorism (START). The results of the paper show which algorithm is more convenient for a particular dataset. Tests are performed on real-life data by using Weka and also the final analysis and conclusion based on five performance steps which revealed that J48, is more accurate than Bayes Net, SVM and NB but KNN has the lowest classification accuracy although it performs well in other measures.
{"title":"Terrorist attacks in Turkey: An evaluate of terrorist acts that occurred in 2016","authors":"D. Y. Mohammed, M. Karabatak","doi":"10.1109/ISDFS.2018.8355370","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355370","url":null,"abstract":"Terrorist attacks are the most significant challenging for the humankind across the world, which need the whole attention. To predict the terrorist group which is accountable for results and activities utilizing historical info is a difficult task because of the lake of detailed terrorist data. Therefore, this paper based on predicting terrorist groups responsible of attacks in TURKEY terrorist acts that occurred in 2016 by using data mining techniques is analyzing the most useful and accessible algorithms used by the machine learning systems. The typical analysis of these datasets including algorithms is implemented on the Weka tool depends upon real info represented through Global Terrorism Database (GTD) from the national consortium for the study of terrorism and responses of terrorism (START). The results of the paper show which algorithm is more convenient for a particular dataset. Tests are performed on real-life data by using Weka and also the final analysis and conclusion based on five performance steps which revealed that J48, is more accurate than Bayes Net, SVM and NB but KNN has the lowest classification accuracy although it performs well in other measures.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"119 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132533258","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355387
Yeşím Ülgen Sönmez, A. Varol
Throughout the world, there are debates and questionnaires on whether sports betting is morally wrong and whether it should be legal or illegal. While these debates continue every nationwide, governments are updating the laws on betting. They bring different criminal sanctions-like fault and offense-to betting bosses and betting players in both physical and virtual environments. Illegal betting harms countries' economies because money transfer is among the different countries. It also directs people to the gambling. For this reason, illegal betting is an important concept in information law and computer forensics. There can be many criminals or criminal tendencies in web activities, as well as illegal betting. This study reviews illegal betting in terms of information law and web forensics.
{"title":"Review of illegal betting as financial crime in web forensics","authors":"Yeşím Ülgen Sönmez, A. Varol","doi":"10.1109/ISDFS.2018.8355387","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355387","url":null,"abstract":"Throughout the world, there are debates and questionnaires on whether sports betting is morally wrong and whether it should be legal or illegal. While these debates continue every nationwide, governments are updating the laws on betting. They bring different criminal sanctions-like fault and offense-to betting bosses and betting players in both physical and virtual environments. Illegal betting harms countries' economies because money transfer is among the different countries. It also directs people to the gambling. For this reason, illegal betting is an important concept in information law and computer forensics. There can be many criminals or criminal tendencies in web activities, as well as illegal betting. This study reviews illegal betting in terms of information law and web forensics.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129551611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355327
Gozde Karatas, O. K. Sahingoz
In the last decades, due to the improvements in networking techniques and the increased use of the Internet, the digital communications entered all of the activities in the global marketplace. Parallel to these enhancements the attempts of hackers for intruding the networks are also increased. They tried to make unauthorized access to the networks for making some modifications in their data or to increase the network traffic for making a denial of service attack. Although a firewall seems as a good tool for preventing this type of attacks, intrusion detection systems (IDSs) are also preferred especially for detecting the attack within the network system. In the last few years, the performance of the IDS is increased with the help of machine learning algorithms whose effects depend on the used training/learning algorithm. Mainly it is really hard to know which learning algorithm can be the fastest one according to the problem type. The algorithm selection depends on lots of factors such as the size of data sets, number of nodes network design, the targeted error rate, the complexity of the problem, etc. In this paper, it is aimed to compare different network training function in a multi-layered artificial neural network which is designed for constructing an effective intrusion detection system. The experimental results are depicted in the paper by explaining the efficiency of the algorithms according to their true-positive detection rates and speed of the execution.
{"title":"Neural network based intrusion detection systems with different training functions","authors":"Gozde Karatas, O. K. Sahingoz","doi":"10.1109/ISDFS.2018.8355327","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355327","url":null,"abstract":"In the last decades, due to the improvements in networking techniques and the increased use of the Internet, the digital communications entered all of the activities in the global marketplace. Parallel to these enhancements the attempts of hackers for intruding the networks are also increased. They tried to make unauthorized access to the networks for making some modifications in their data or to increase the network traffic for making a denial of service attack. Although a firewall seems as a good tool for preventing this type of attacks, intrusion detection systems (IDSs) are also preferred especially for detecting the attack within the network system. In the last few years, the performance of the IDS is increased with the help of machine learning algorithms whose effects depend on the used training/learning algorithm. Mainly it is really hard to know which learning algorithm can be the fastest one according to the problem type. The algorithm selection depends on lots of factors such as the size of data sets, number of nodes network design, the targeted error rate, the complexity of the problem, etc. In this paper, it is aimed to compare different network training function in a multi-layered artificial neural network which is designed for constructing an effective intrusion detection system. The experimental results are depicted in the paper by explaining the efficiency of the algorithms according to their true-positive detection rates and speed of the execution.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130843822","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355324
W. Mardini, G. A. Ali, Esraa Magdady, Sajedah Al-Momani
The relation between human emotions and EEG signals have been actively studied during the last few decades. In this paper, we study a novel attempt to measure the human brain activity and analyze its signals using electroencephalography (EEG) in order to classify the human emotions indicated by the brain wavelets. The study will measure the brain wavelets of female students in order to detect the emotions of happiness, sadness, and fear. This study will use specially designed sensors placed around the scalp. The measured signals transfer to a computing device. The data collected analyze by a software system, which developed by our team. We use dynamic programming to extract the maximum number of quality service that provides to the user when the device captures specific signals for each emotion.
{"title":"Detecting human emotions using electroencephalography (EEG) using dynamic programming approach","authors":"W. Mardini, G. A. Ali, Esraa Magdady, Sajedah Al-Momani","doi":"10.1109/ISDFS.2018.8355324","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355324","url":null,"abstract":"The relation between human emotions and EEG signals have been actively studied during the last few decades. In this paper, we study a novel attempt to measure the human brain activity and analyze its signals using electroencephalography (EEG) in order to classify the human emotions indicated by the brain wavelets. The study will measure the brain wavelets of female students in order to detect the emotions of happiness, sadness, and fear. This study will use specially designed sensors placed around the scalp. The measured signals transfer to a computing device. The data collected analyze by a software system, which developed by our team. We use dynamic programming to extract the maximum number of quality service that provides to the user when the device captures specific signals for each emotion.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"40 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123729090","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355333
A. Hasiloglu, Abdulkadir Bali
Personal data have been compiled and harnessed by a great number of establishments to execute their legal activities. Establishments are legally bound to maintain the confidentiality and security of personal data. Hence it is a requirement to provide access logs for the personal information. Depending on the needs and capacity, personal data can be opened to the users via platforms such as file system, database and web service. Web service platform is a popular alternative since it is autonomous and can isolate the data source from the user. In this paper, the way to log personal data accessed via web service method has been discussed. As an alternative to classical method in which logs were recorded and saved by client applications, a different mechanism of forming a central audit log with API manager has been investigated. By forging a model policy to exemplify central logging method, its advantages and disadvantages have been explored. It has been concluded in the end that this model could be employed in centrally recording audit logs.
{"title":"Central audit logging mechanism in personal data web services","authors":"A. Hasiloglu, Abdulkadir Bali","doi":"10.1109/ISDFS.2018.8355333","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355333","url":null,"abstract":"Personal data have been compiled and harnessed by a great number of establishments to execute their legal activities. Establishments are legally bound to maintain the confidentiality and security of personal data. Hence it is a requirement to provide access logs for the personal information. Depending on the needs and capacity, personal data can be opened to the users via platforms such as file system, database and web service. Web service platform is a popular alternative since it is autonomous and can isolate the data source from the user. In this paper, the way to log personal data accessed via web service method has been discussed. As an alternative to classical method in which logs were recorded and saved by client applications, a different mechanism of forming a central audit log with API manager has been investigated. By forging a model policy to exemplify central logging method, its advantages and disadvantages have been explored. It has been concluded in the end that this model could be employed in centrally recording audit logs.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114905365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355374
E. Ates, E. Bostanci, M. Güzel
Technology is an important issue affecting human life. We are experiencing conveniences in various fields in our lives along with the technological developments, especially with the emergence of the computers and internet concept. The virtual world provides opportunities for people who are inclined to crime. Since people from every walk of life can be easily reached especially in the internet environment, it has become easier to be a victim of a crime. The victimization is important in general, however, its effect on children is much greater than that of adults. Therefore, the sample of child victims of cybercrime in Turkey was examined using data obtained from Turkish Statistical Institute in this study. In order to examine crime and ways for combating the crime, the hot spots where the victims live mostly and the generic profile of the victims were discovered. The results obtained from the conducted analysis is expected to contribute significantly to the preventive and forensic processes carried out by the relevant authorities.
{"title":"Cybercrimes against children in Turkey","authors":"E. Ates, E. Bostanci, M. Güzel","doi":"10.1109/ISDFS.2018.8355374","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355374","url":null,"abstract":"Technology is an important issue affecting human life. We are experiencing conveniences in various fields in our lives along with the technological developments, especially with the emergence of the computers and internet concept. The virtual world provides opportunities for people who are inclined to crime. Since people from every walk of life can be easily reached especially in the internet environment, it has become easier to be a victim of a crime. The victimization is important in general, however, its effect on children is much greater than that of adults. Therefore, the sample of child victims of cybercrime in Turkey was examined using data obtained from Turkish Statistical Institute in this study. In order to examine crime and ways for combating the crime, the hot spots where the victims live mostly and the generic profile of the victims were discovered. The results obtained from the conducted analysis is expected to contribute significantly to the preventive and forensic processes carried out by the relevant authorities.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116635064","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355316
M. Baykara, Furkan Alnıak, Kahraman Çınar
Captcha is an abbreviation of Completely Automated Public Turing test to Tell Computers and Humans Apart. It is a technique used for verification purposes in many applications. Software developers often use this method to get rid of the malicious requests that automatic tools will make. The proliferation of bots and spam tools in particular has led to the emergence and rapid spread of such technologies. Captcha has been developed to prevent such malicious activities, but today's simple image-based Captcha applications can be solved by OCR methods. In this study, an image based CAPTCHA was developed. In this captcha method, which is created with high noise value, it is very difficult to solve with OCR because the noise does not decrease even when the picture is converted to binary. In addition, the existing captcha approaches were examined and a security comparison was given.
{"title":"Review and comparison of captcha approaches and a new captcha model","authors":"M. Baykara, Furkan Alnıak, Kahraman Çınar","doi":"10.1109/ISDFS.2018.8355316","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355316","url":null,"abstract":"Captcha is an abbreviation of Completely Automated Public Turing test to Tell Computers and Humans Apart. It is a technique used for verification purposes in many applications. Software developers often use this method to get rid of the malicious requests that automatic tools will make. The proliferation of bots and spam tools in particular has led to the emergence and rapid spread of such technologies. Captcha has been developed to prevent such malicious activities, but today's simple image-based Captcha applications can be solved by OCR methods. In this study, an image based CAPTCHA was developed. In this captcha method, which is created with high noise value, it is very difficult to solve with OCR because the noise does not decrease even when the picture is converted to binary. In addition, the existing captcha approaches were examined and a security comparison was given.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"128 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115004807","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355332
Sangwoo Kim, Hyunjong Lim, S. Lim, Ick-hyun Shin
The fourth industrial revolution has become an major issue of recent year and also impacting the field of nuclear facilities that research of introducing the latest Internet of Thing(IoT) technologies such as sensor-networks communication is being conducted. Especially, research and study for applying wireless network technology to safety-related and emergency preparedness systems in nuclear facilities are being conducted as well. However, wireless it is hard to apply physical access control on the wireless network using frequency. If digital systems of nuclear facility are compromised by cyber attack, public safety were not be guaranteed. From this point, the cyber security assessment must be performed when applying wireless network technologies to the systems in the nuclear facility. This study is to analyze and develop the cyber security assessment methodology with wireless network at nuclear facilities. We analyzed the cases of wireless network attacks broadly known in critical infrastructure and public facilities, and draw out the requirements and inspection activity in the cyber security assessment that must be checked in the wireless network. The requirements and activities presented in this paper are able to be the reference to establish the policy and guidelines for cyber security assessment when the nuclear facilities are applying the wireless network technology into the field.
{"title":"Study on cyber security assessment for wireless network at nuclear facilities","authors":"Sangwoo Kim, Hyunjong Lim, S. Lim, Ick-hyun Shin","doi":"10.1109/ISDFS.2018.8355332","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355332","url":null,"abstract":"The fourth industrial revolution has become an major issue of recent year and also impacting the field of nuclear facilities that research of introducing the latest Internet of Thing(IoT) technologies such as sensor-networks communication is being conducted. Especially, research and study for applying wireless network technology to safety-related and emergency preparedness systems in nuclear facilities are being conducted as well. However, wireless it is hard to apply physical access control on the wireless network using frequency. If digital systems of nuclear facility are compromised by cyber attack, public safety were not be guaranteed. From this point, the cyber security assessment must be performed when applying wireless network technologies to the systems in the nuclear facility. This study is to analyze and develop the cyber security assessment methodology with wireless network at nuclear facilities. We analyzed the cases of wireless network attacks broadly known in critical infrastructure and public facilities, and draw out the requirements and inspection activity in the cyber security assessment that must be checked in the wireless network. The requirements and activities presented in this paper are able to be the reference to establish the policy and guidelines for cyber security assessment when the nuclear facilities are applying the wireless network technology into the field.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"18 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128598233","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355372
R. Rodríguez, Miguel Martín-Pérez, I. Abadía
Finding identical digital objects (or artifacts) during a forensic analysis is commonly achieved by means of cryptographic hashing functions, such as MD5, SHA1, or SHA-256, to name a few. However, these functions suffer from the avalanche effect property, which guarantees that if an input is changed slightly the output changes significantly. Hence, these functions are unsuitable for typical digital forensics scenarios where a forensics memory image from a likely compromised machine shall be analyzed. This memory image file contains a snapshot of processes (instances of executable files) which were up on execution when the dumping process was done. However, processes are relocated at memory and contain dynamic data that depend on the current execution and environmental conditions. Therefore, the comparison of cryptographic hash values of different processes from the same executable file will be negative. Bytewise approximation matching algorithms may help in these scenarios, since they provide a similarity measurement in the range [0,1] between similar inputs instead of a yes/no answer (in the range {0,1}). In this paper, we introduce ProcessFuzzyHash, a Volatility plugin that enables us to compute approximation hash values of processes contained in a Windows memory dump.
{"title":"A tool to compute approximation matching between windows processes","authors":"R. Rodríguez, Miguel Martín-Pérez, I. Abadía","doi":"10.1109/ISDFS.2018.8355372","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355372","url":null,"abstract":"Finding identical digital objects (or artifacts) during a forensic analysis is commonly achieved by means of cryptographic hashing functions, such as MD5, SHA1, or SHA-256, to name a few. However, these functions suffer from the avalanche effect property, which guarantees that if an input is changed slightly the output changes significantly. Hence, these functions are unsuitable for typical digital forensics scenarios where a forensics memory image from a likely compromised machine shall be analyzed. This memory image file contains a snapshot of processes (instances of executable files) which were up on execution when the dumping process was done. However, processes are relocated at memory and contain dynamic data that depend on the current execution and environmental conditions. Therefore, the comparison of cryptographic hash values of different processes from the same executable file will be negative. Bytewise approximation matching algorithms may help in these scenarios, since they provide a similarity measurement in the range [0,1] between similar inputs instead of a yes/no answer (in the range {0,1}). In this paper, we introduce ProcessFuzzyHash, a Volatility plugin that enables us to compute approximation hash values of processes contained in a Windows memory dump.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"24 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116818007","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2018-03-22DOI: 10.1109/ISDFS.2018.8355329
Muhammet Zekeriya Gunduz, Resul Das
Combining conventional power networks and information communication technologies forms smart grid concept. Researches on the evolution of conventional power grid system into smart grid continue thanks to the development of communication and information technologies hopefully. Testing of smart grid systems is usually performed in simulation environments. However, achieving more effective real-world implementations, a smart grid application needs a real-world test environment, called testbed. Smart grid, which is the combination of conventional electricity line with information communication technologies, is vulnerable to cyber-attacks and this is a key challenge improving the smart grid. The vulnerabilities to cyber-attacks in smart grid arise from information communication technologies' nature inherently. Testbeds, which cyber-security researches and studies can be performed, are needed to find effective solutions against cyber-attacks capabilities in smart grid practices. In this paper, an evaluation of existing smart grid testbeds with the capability of cyber security is presented. First, background, domains, research areas and security issues in smart grid are introduced briefly. Then smart grid testbeds and features are explained. Also, existing security-oriented testbeds and cyber-attack testing capabilities of testbeds are evaluated. Finally, we conclude the study and give some recommendations for security-oriented testbed implementations.
{"title":"A comparison of cyber-security oriented testbeds for IoT-based smart grids","authors":"Muhammet Zekeriya Gunduz, Resul Das","doi":"10.1109/ISDFS.2018.8355329","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355329","url":null,"abstract":"Combining conventional power networks and information communication technologies forms smart grid concept. Researches on the evolution of conventional power grid system into smart grid continue thanks to the development of communication and information technologies hopefully. Testing of smart grid systems is usually performed in simulation environments. However, achieving more effective real-world implementations, a smart grid application needs a real-world test environment, called testbed. Smart grid, which is the combination of conventional electricity line with information communication technologies, is vulnerable to cyber-attacks and this is a key challenge improving the smart grid. The vulnerabilities to cyber-attacks in smart grid arise from information communication technologies' nature inherently. Testbeds, which cyber-security researches and studies can be performed, are needed to find effective solutions against cyber-attacks capabilities in smart grid practices. In this paper, an evaluation of existing smart grid testbeds with the capability of cyber security is presented. First, background, domains, research areas and security issues in smart grid are introduced briefly. Then smart grid testbeds and features are explained. Also, existing security-oriented testbeds and cyber-attack testing capabilities of testbeds are evaluated. Finally, we conclude the study and give some recommendations for security-oriented testbed implementations.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126706829","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}