首页 > 最新文献

2018 6th International Symposium on Digital Forensic and Security (ISDFS)最新文献

英文 中文
Detection of phishing attacks 网络钓鱼攻击检测
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355389
M. Baykara, Zahit Ziya Gürel
Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the login credentials or account information of the victim. These e-mails harm victims because of money loss and identity theft. In this study, a software called “Anti Phishing Simulator” was developed, giving information about the detection problem of phishing and how to detect phishing emails. With this software, phishing and spam mails are detected by examining mail contents. Classification of spam words added to the database by Bayesian algorithm is provided.
网络钓鱼是一种网络犯罪形式,攻击者模仿真实的人/机构,通过电子邮件或其他通信媒介将其宣传为正式的人或实体。网络钓鱼是一种网络攻击,攻击者通过网络钓鱼邮件发送恶意链接或附件,可以实现多种功能,包括获取受害者的登录凭据或账户信息。这些电子邮件伤害受害者,因为金钱损失和身份盗窃。在这项研究中,开发了一个名为“反网络钓鱼模拟器”的软件,提供了关于网络钓鱼检测问题和如何检测网络钓鱼电子邮件的信息。使用此软件,可以通过检查邮件内容来检测网络钓鱼和垃圾邮件。利用贝叶斯算法对添加到数据库中的垃圾词进行分类。
{"title":"Detection of phishing attacks","authors":"M. Baykara, Zahit Ziya Gürel","doi":"10.1109/ISDFS.2018.8355389","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355389","url":null,"abstract":"Phishing is a form of cybercrime where an attacker imitates a real person / institution by promoting them as an official person or entity through e-mail or other communication mediums. In this type of cyber attack, the attacker sends malicious links or attachments through phishing e-mails that can perform various functions, including capturing the login credentials or account information of the victim. These e-mails harm victims because of money loss and identity theft. In this study, a software called “Anti Phishing Simulator” was developed, giving information about the detection problem of phishing and how to detect phishing emails. With this software, phishing and spam mails are detected by examining mail contents. Classification of spam words added to the database by Bayesian algorithm is provided.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"191 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122301260","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 49
Forensic analysis of encrypted instant messaging applications on Android Android上加密即时通讯应用程序的取证分析
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355344
Khushboo Rathi, Umit Karabiyik, Temilola Aderibigbe, H. Chi
Smartphone market is growing day by day and according to Statista, as of 2017, 68.4% of the U.S. population uses smartphones. Similarly, the amount of information stored on these mobile devices is tremendous and ranging from personal details, contacts, applications data, to exchange of texts and media. This information can become a significant evidence during a digital forensics investigation and thereafter in courts. As Android is one of the leading smartphone operating systems worldwide, it is important to have the knowledge of Android forensics. Moreover, chat messaging between the users becoming the most prominent communication medium particularly among the youth. The exponential increase in the interception of chat messages on mobile devices led to implementation of end to end encryption. This is mainly due to the concerns raised on privacy and security of user data on smartphones. In this paper we analyze widely used encrypted Instant Messaging (IM) applications namely WeChat, Telegram, Viber and Whatsapp. We also show how these applications store data in the Android file system. In addition we also discuss forensic implications of the IM applications that are utilizing encryption. Analysis of artifacts collected from these applications is performed using the Android Debugging Bridge (ADB) tool and some other open source tools. Moreover, we also present the challenges faced during the collection of the forensically important artifacts.
智能手机市场日益增长,根据Statista的数据,截至2017年,68.4%的美国人使用智能手机。同样,存储在这些移动设备上的信息量是巨大的,从个人信息、联系人、应用程序数据到文本和媒体的交换。这些信息可以在数字取证调查中成为重要的证据,之后在法庭上也是如此。由于Android是全球领先的智能手机操作系统之一,掌握Android取证知识非常重要。此外,用户之间的聊天信息成为最突出的沟通媒介,特别是在年轻人中。在移动设备上拦截聊天消息的指数增长导致实现端到端加密。这主要是由于对智能手机用户数据的隐私和安全的担忧。本文分析了微信、Telegram、Viber和Whatsapp等广泛使用的加密即时通讯(IM)应用程序。我们还将展示这些应用程序如何在Android文件系统中存储数据。此外,我们还讨论了使用加密的IM应用程序的取证含义。使用Android Debugging Bridge (ADB)工具和其他一些开源工具对从这些应用程序收集的工件进行分析。此外,我们还提出了在收集法医重要文物过程中所面临的挑战。
{"title":"Forensic analysis of encrypted instant messaging applications on Android","authors":"Khushboo Rathi, Umit Karabiyik, Temilola Aderibigbe, H. Chi","doi":"10.1109/ISDFS.2018.8355344","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355344","url":null,"abstract":"Smartphone market is growing day by day and according to Statista, as of 2017, 68.4% of the U.S. population uses smartphones. Similarly, the amount of information stored on these mobile devices is tremendous and ranging from personal details, contacts, applications data, to exchange of texts and media. This information can become a significant evidence during a digital forensics investigation and thereafter in courts. As Android is one of the leading smartphone operating systems worldwide, it is important to have the knowledge of Android forensics. Moreover, chat messaging between the users becoming the most prominent communication medium particularly among the youth. The exponential increase in the interception of chat messages on mobile devices led to implementation of end to end encryption. This is mainly due to the concerns raised on privacy and security of user data on smartphones. In this paper we analyze widely used encrypted Instant Messaging (IM) applications namely WeChat, Telegram, Viber and Whatsapp. We also show how these applications store data in the Android file system. In addition we also discuss forensic implications of the IM applications that are utilizing encryption. Analysis of artifacts collected from these applications is performed using the Android Debugging Bridge (ADB) tool and some other open source tools. Moreover, we also present the challenges faced during the collection of the forensically important artifacts.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"10 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134330164","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 28
Android gaming malware detection using system call analysis Android游戏恶意软件检测使用系统调用分析
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355360
Mayank Jaiswal, Yasir Malik, Fehmi Jaafar
Android operating systems have become a prime target for attackers as most of the market is currently dominated by Android users. The situation gets worse when users unknowingly download or sideload cloning applications, especially gaming applications that look like benign games. In this paper, we present, a dynamic Android gaming malware detection system based on system call analysis to classify malicious and legitimate games. We performed the dynamic system call analysis on normal and malicious gaming applications while applications are in execution state. Our analysis reveals the similarities and differences between benign and malware game system calls and shows how dynamically analyzing the behavior of malicious activity through system calls during runtime makes it easier and is more effective to detect malicious applications. Experimental analysis and results shows the efficiency and effectiveness of our approach.
Android操作系统已经成为攻击者的主要目标,因为大多数市场目前由Android用户主导。当用户在不知情的情况下下载或附带加载克隆应用程序时,情况会变得更糟,尤其是看起来像良性游戏的游戏应用程序。本文提出了一种基于系统调用分析的Android游戏恶意软件动态检测系统,对恶意和正版游戏进行分类。我们对正常和恶意游戏应用程序在执行状态下进行了动态系统调用分析。我们的分析揭示了良性和恶意游戏系统调用之间的异同,并展示了如何在运行时通过系统调用动态分析恶意活动的行为,从而更容易、更有效地检测恶意应用程序。实验分析和结果表明了该方法的有效性和有效性。
{"title":"Android gaming malware detection using system call analysis","authors":"Mayank Jaiswal, Yasir Malik, Fehmi Jaafar","doi":"10.1109/ISDFS.2018.8355360","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355360","url":null,"abstract":"Android operating systems have become a prime target for attackers as most of the market is currently dominated by Android users. The situation gets worse when users unknowingly download or sideload cloning applications, especially gaming applications that look like benign games. In this paper, we present, a dynamic Android gaming malware detection system based on system call analysis to classify malicious and legitimate games. We performed the dynamic system call analysis on normal and malicious gaming applications while applications are in execution state. Our analysis reveals the similarities and differences between benign and malware game system calls and shows how dynamically analyzing the behavior of malicious activity through system calls during runtime makes it easier and is more effective to detect malicious applications. Experimental analysis and results shows the efficiency and effectiveness of our approach.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"14 18","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"113955871","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
Electronic mail forensic algorithm for crime investigation and dispute settlement 电子邮件取证算法的犯罪调查和纠纷解决
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355371
D. L. Msongaleli, K. Kucuk
Over the past decades, the Electronic Mail (email) has replaced the traditional postal system. Email service is ubiquitously used to transmit text and multimedia message globally. The high reliance on the email service has motivated criminals to exploit email applications for spreading malicious messages. Moreover, policing the cyberspace has been a complicated issue considering factors such as difficult to pinpoint culprits and jurisdictional complexity. Existing research publications address this problem by considering email header analysis techniques. Nevertheless, current email applications are susceptible to spoofed emails that often contain fake email header. This study presents the email investigation algorithm for criminal investigation and dispute settlement. We present the three-tiered algorithm that can be used by law enforcement and other investigation units in order to identify the culprits spreading malicious and disputed emails. Unlike existing publications, our study considers email header, email server logs, and local devices analysis in addressing email related disputes. Finally, we present a case study that shows the applicability of our algorithm.
在过去的几十年里,电子邮件已经取代了传统的邮政系统。电子邮件服务在全球范围内无处不在地用于传输文本和多媒体信息。对电子邮件服务的高度依赖促使犯罪分子利用电子邮件应用程序传播恶意信息。此外,考虑到难以确定罪犯和司法复杂性等因素,网络空间的监管一直是一个复杂的问题。现有的研究出版物通过考虑电子邮件标题分析技术来解决这个问题。然而,目前的电子邮件应用程序很容易受到欺骗的电子邮件,往往包含假的电子邮件标题。本文提出了一种用于刑事侦查和纠纷解决的电子邮件侦查算法。我们提出的三层算法可用于执法和其他调查单位,以确定传播恶意和有争议的电子邮件的罪魁祸首。与现有出版物不同,我们的研究考虑了电子邮件标题、电子邮件服务器日志和本地设备分析,以解决电子邮件相关争议。最后,我们给出了一个案例研究,显示了我们的算法的适用性。
{"title":"Electronic mail forensic algorithm for crime investigation and dispute settlement","authors":"D. L. Msongaleli, K. Kucuk","doi":"10.1109/ISDFS.2018.8355371","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355371","url":null,"abstract":"Over the past decades, the Electronic Mail (email) has replaced the traditional postal system. Email service is ubiquitously used to transmit text and multimedia message globally. The high reliance on the email service has motivated criminals to exploit email applications for spreading malicious messages. Moreover, policing the cyberspace has been a complicated issue considering factors such as difficult to pinpoint culprits and jurisdictional complexity. Existing research publications address this problem by considering email header analysis techniques. Nevertheless, current email applications are susceptible to spoofed emails that often contain fake email header. This study presents the email investigation algorithm for criminal investigation and dispute settlement. We present the three-tiered algorithm that can be used by law enforcement and other investigation units in order to identify the culprits spreading malicious and disputed emails. Unlike existing publications, our study considers email header, email server logs, and local devices analysis in addressing email related disputes. Finally, we present a case study that shows the applicability of our algorithm.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115656209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Software requirement analysis: Research challenges and technical approaches 软件需求分析:研究挑战和技术方法
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355322
S. Demirel, Resul Das
Requirement analysis is one of the key challenges in software development projects. Customer requirement specification and management entails various impacts to software projects and still is an improvement area on both academic and industrial fields. Models like CMMI also uncovers requirement development and management and specifies the specific goals and practices for them. In this paper, key challenges and issues of requirement management are listed with respect to a standardization activity, namely CMMI.
需求分析是软件开发项目中的关键挑战之一。客户需求规范和管理对软件项目产生了各种各样的影响,在学术和工业领域都是一个有待改进的领域。像CMMI这样的模型也揭示了需求开发和管理,并为它们指定了具体的目标和实践。在这篇文章中,需求管理的主要挑战和问题是根据标准化活动,即CMMI列出的。
{"title":"Software requirement analysis: Research challenges and technical approaches","authors":"S. Demirel, Resul Das","doi":"10.1109/ISDFS.2018.8355322","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355322","url":null,"abstract":"Requirement analysis is one of the key challenges in software development projects. Customer requirement specification and management entails various impacts to software projects and still is an improvement area on both academic and industrial fields. Models like CMMI also uncovers requirement development and management and specifies the specific goals and practices for them. In this paper, key challenges and issues of requirement management are listed with respect to a standardization activity, namely CMMI.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"17 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123675611","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 11
The use of fourier series for image encryptıon 使用傅里叶级数的图像encryptıon
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355365
Muharrem Tuıncay Gençoğlu
In this work, an image encryption algorithm was proposed using the Fourier Series. Then, we mentioned the method of mathematical analysis that should be done to strengthen this algorithm against the statistical attack. The development of this last algorithm has been left to professionals.
在这项工作中,提出了一种使用傅里叶级数的图像加密算法。然后,我们提到了数学分析的方法,应该做的是加强该算法对统计攻击。最后一种算法的开发留给了专业人士。
{"title":"The use of fourier series for image encryptıon","authors":"Muharrem Tuıncay Gençoğlu","doi":"10.1109/ISDFS.2018.8355365","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355365","url":null,"abstract":"In this work, an image encryption algorithm was proposed using the Fourier Series. Then, we mentioned the method of mathematical analysis that should be done to strengthen this algorithm against the statistical attack. The development of this last algorithm has been left to professionals.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123158617","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Audio based violent scene classification using ensemble learning 基于集成学习的音频暴力场景分类
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355393
S. Sarman, M. Sert
In this paper, we deal with the problem of violent scene detection. Although visual signal has been widely used in detection of violent scenes from video data, audio modality; on the other hand, has not been explored as much as visual modality of the video data. Also, in some scenarios such as video surveillance, visual modality can be missing or absent due to the environmental conditions. Therefore, we use the audio modality of video data to decide whether a video scene is violent or not. For this purpose, we propose an ensemble learning method to classify video scenes as “violent” or “non-violent”. We provide empirical analyses both for different audio features and classifiers. As a result, we obtain best classification performance by using the Random Forest algorithm along with the ZCR feature. We use MediaEval Violent Scene Detection task dataset for the evaluations and obtain superior results with the official metric MAP@100 of 66% compared with the literature.
本文主要研究暴力场景的检测问题。虽然视觉信号已被广泛应用于从视频数据中检测暴力场景,但音频模式;另一方面,对视频数据的视觉形态的探索还没有那么多。此外,在视频监控等某些场景中,由于环境条件的原因,视觉模式可能会缺失或缺失。因此,我们使用视频数据的音频模态来判断视频场景是否暴力。为此,我们提出了一种集成学习方法,将视频场景分类为“暴力”或“非暴力”。我们对不同的音频特征和分类器进行了实证分析。因此,我们将随机森林算法与ZCR特征结合使用,获得了最佳的分类性能。我们使用中世纪暴力场景检测任务数据集进行评估,与文献相比,官方度量MAP@100为66%,获得了更好的结果。
{"title":"Audio based violent scene classification using ensemble learning","authors":"S. Sarman, M. Sert","doi":"10.1109/ISDFS.2018.8355393","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355393","url":null,"abstract":"In this paper, we deal with the problem of violent scene detection. Although visual signal has been widely used in detection of violent scenes from video data, audio modality; on the other hand, has not been explored as much as visual modality of the video data. Also, in some scenarios such as video surveillance, visual modality can be missing or absent due to the environmental conditions. Therefore, we use the audio modality of video data to decide whether a video scene is violent or not. For this purpose, we propose an ensemble learning method to classify video scenes as “violent” or “non-violent”. We provide empirical analyses both for different audio features and classifiers. As a result, we obtain best classification performance by using the Random Forest algorithm along with the ZCR feature. We use MediaEval Violent Scene Detection task dataset for the evaluations and obtain superior results with the official metric MAP@100 of 66% compared with the literature.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"33 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125270698","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
An application of speech recognition with support vector machines 支持向量机在语音识别中的应用
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355321
Osman Eray, S. Tokat, S. Iplikci
Speech recognition systems aim to make human-machine communication quickly and easily. In recent years, various researches and studies have been carried out to develop speech recognition systems. Examples of these studies are speech recognition, speaker recognition and speaker verification. In this study, speech recognition systems were investigated, methods used in the literature were investigated and a Turkish speech recognition application was developed. The application consists of speech coding and speech recognition. Firstly 20 Turkish words which are frequently used on the computer were determined. There are 20 records from each word. A total of 400 words were recorded on the computer with a microphone. In the speech coding section of the application, these words recorded on the computer are encoded by the Linear Pre-estimation Coding (LPC) method and the LPC parameters for each word are obtained. In the speech recognition section of the application, the Support Vector Machines (SVM) method is used. Two types of SVM classifiers are designed. These are the Soft Margin SVM (SM-SVM) classifier and the Least Square SVM (LS-SVM) classifier. Classification consists of training and testing stages. Of the 400 coded words, 200 were used for the training phase and 200 were used for the testing phase. As a result, 91% accurate recognition success for the SM-SVM classifier; 71% correct recognition of the LS-SVM classifier has been achieved.
语音识别系统的目的是使人机交流更快捷、更方便。近年来,人们对语音识别系统的开发进行了各种各样的研究。这些研究的例子有语音识别、说话人识别和说话人验证。在本研究中,研究了语音识别系统,研究了文献中使用的方法,并开发了土耳其语语音识别应用程序。该应用程序由语音编码和语音识别两部分组成。首先确定了20个在计算机上经常使用的土耳其语单词。每个单词有20条记录。用麦克风在电脑上记录了总共400个单词。在本应用程序的语音编码部分,对记录在计算机上的这些单词采用线性预估计编码(LPC)方法进行编码,得到每个单词的LPC参数。在应用程序的语音识别部分,使用了支持向量机(SVM)方法。设计了两种支持向量机分类器。它们是软边支持向量机(SM-SVM)分类器和最小二乘支持向量机(LS-SVM)分类器。分类分为训练和测试两个阶段。在这400个编码单词中,200个用于训练阶段,200个用于测试阶段。结果表明,SM-SVM分类器的识别准确率为91%;LS-SVM分类器的识别率达到71%。
{"title":"An application of speech recognition with support vector machines","authors":"Osman Eray, S. Tokat, S. Iplikci","doi":"10.1109/ISDFS.2018.8355321","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355321","url":null,"abstract":"Speech recognition systems aim to make human-machine communication quickly and easily. In recent years, various researches and studies have been carried out to develop speech recognition systems. Examples of these studies are speech recognition, speaker recognition and speaker verification. In this study, speech recognition systems were investigated, methods used in the literature were investigated and a Turkish speech recognition application was developed. The application consists of speech coding and speech recognition. Firstly 20 Turkish words which are frequently used on the computer were determined. There are 20 records from each word. A total of 400 words were recorded on the computer with a microphone. In the speech coding section of the application, these words recorded on the computer are encoded by the Linear Pre-estimation Coding (LPC) method and the LPC parameters for each word are obtained. In the speech recognition section of the application, the Support Vector Machines (SVM) method is used. Two types of SVM classifiers are designed. These are the Soft Margin SVM (SM-SVM) classifier and the Least Square SVM (LS-SVM) classifier. Classification consists of training and testing stages. Of the 400 coded words, 200 were used for the training phase and 200 were used for the testing phase. As a result, 91% accurate recognition success for the SM-SVM classifier; 71% correct recognition of the LS-SVM classifier has been achieved.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125461131","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 7
New quantum secure key exchange protocols based on MaTRU 基于MaTRU的新型量子安全密钥交换协议
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355362
S. Akleylek, Nurşah Kaya
In this paper, we propose two new quantum secure key exchange protocols based on MaTRU. These protocols differ on the key agreement phase. They use ephemeral keys, i.e., they satisfy perfect forward secrecy property. We also give the parameter choices for the proposed key exchange protocols for different security levels. Then, we compare them with NTRU-KE in view of the number of required arithmetic operations.
本文提出了两种新的基于MaTRU的量子安全密钥交换协议。这些协议在密钥协议阶段有所不同。它们使用临时密钥,也就是说,它们满足完美的前向保密属性。我们还给出了针对不同安全级别所提出的密钥交换协议的参数选择。然后,我们将它们与ntrui - ke进行了比较,考虑到所需的算术运算的数量。
{"title":"New quantum secure key exchange protocols based on MaTRU","authors":"S. Akleylek, Nurşah Kaya","doi":"10.1109/ISDFS.2018.8355362","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355362","url":null,"abstract":"In this paper, we propose two new quantum secure key exchange protocols based on MaTRU. These protocols differ on the key agreement phase. They use ephemeral keys, i.e., they satisfy perfect forward secrecy property. We also give the parameter choices for the proposed key exchange protocols for different security levels. Then, we compare them with NTRU-KE in view of the number of required arithmetic operations.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"101 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335382","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
New results on permission based static analysis for Android malware 基于权限的Android恶意软件静态分析的新结果
Pub Date : 2018-03-22 DOI: 10.1109/ISDFS.2018.8355377
Durmuş Özkan Şahin, Oğuz Emre Kural, S. Akleylek, E. Kılıç
Mobile devices' hardware have been enhancing day by day. With this development, mobile phones are supporting many programs and everyone takes advantage of them. Nevertheless, malware applications are increasing more and more so that people can come across lots of problems. Android is a mobile operating system that is the most used on the smart mobile phones. Because it is the most used and open source, it has been the target of attackers. Android security related to the permissions allowed by users to the applications. There have been many studies on the permission based Android malware detection. In this study, permission based Android malware system is analyzed. Unlike other studies, we propose permission weight approach. Each of permissions is given a different score by means of this approach. Then, K-nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms are applied and the proposed method is compared with the previous studies. According to the experimental results, the proposed approach has better results than the other ones.
移动设备的硬件日益增强。随着这种发展,手机支持许多程序,每个人都利用它们。然而,恶意软件的应用越来越多,人们会遇到很多问题。Android是智能手机上使用最多的移动操作系统。因为它是最常用的开源软件,所以它一直是攻击者的目标。Android安全涉及到用户对应用程序所允许的权限。基于权限的Android恶意软件检测已经有很多研究。本研究对基于权限的Android恶意系统进行了分析。与其他研究不同,我们提出了许可权法。通过这种方法,每个权限都被赋予了不同的分数。然后,应用k -最近邻(KNN)和Naïve贝叶斯(NB)算法,并与前人的研究进行比较。实验结果表明,该方法具有较好的效果。
{"title":"New results on permission based static analysis for Android malware","authors":"Durmuş Özkan Şahin, Oğuz Emre Kural, S. Akleylek, E. Kılıç","doi":"10.1109/ISDFS.2018.8355377","DOIUrl":"https://doi.org/10.1109/ISDFS.2018.8355377","url":null,"abstract":"Mobile devices' hardware have been enhancing day by day. With this development, mobile phones are supporting many programs and everyone takes advantage of them. Nevertheless, malware applications are increasing more and more so that people can come across lots of problems. Android is a mobile operating system that is the most used on the smart mobile phones. Because it is the most used and open source, it has been the target of attackers. Android security related to the permissions allowed by users to the applications. There have been many studies on the permission based Android malware detection. In this study, permission based Android malware system is analyzed. Unlike other studies, we propose permission weight approach. Each of permissions is given a different score by means of this approach. Then, K-nearest Neighbor (KNN) and Naïve Bayes (NB) algorithms are applied and the proposed method is compared with the previous studies. According to the experimental results, the proposed approach has better results than the other ones.","PeriodicalId":154279,"journal":{"name":"2018 6th International Symposium on Digital Forensic and Security (ISDFS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-03-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130048851","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 25
期刊
2018 6th International Symposium on Digital Forensic and Security (ISDFS)
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1