首页 > 最新文献

2006 IEEE Information Assurance Workshop最新文献

英文 中文
Compound Identity Measure: A New Concept for Information Assurance 复合身份度量:信息保障的新概念
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652089
A.R. Choudhary
In this paper we have presented a new concept: the compound identity measure. In essence, the compound identity combines the user identity with the contextual information under which the user acts. The measure of the compound identity is a weighted combination of the user related entities and the context related entities. This numeric measure is a variable depending upon what entities are included and with what relative weightings. This variability can be a function of the real-time SA/COP data, thus allowing it to dynamically respond to the operational events, in the near real-time. We have defined the concept, described the detailed methods to evaluate the concept into a measure, pointed out the enabling technologies, and illustrated the scheme with an example. We have also pointed out how to use the compound identity measure in a policy-based decision engine, and various areas of its application. The concept is currently being prototyped in our laboratory to support VoIP capabilities in IPv6 networks
本文提出了一个新的概念:复合恒等测度。从本质上讲,复合身份将用户身份与用户行为的上下文信息结合在一起。复合身份的度量是用户相关实体和上下文相关实体的加权组合。这个数字度量是一个变量,取决于所包含的实体和相对权重。这种可变性可以是实时SA/COP数据的函数,从而允许它在接近实时的情况下动态响应操作事件。我们定义了概念,描述了将概念评估为度量的详细方法,指出了使能技术,并通过实例说明了方案。我们还指出了如何在基于策略的决策引擎中使用复合身份度量,以及它的各种应用领域。这个概念目前正在我们的实验室进行原型设计,以支持IPv6网络中的VoIP功能
{"title":"Compound Identity Measure: A New Concept for Information Assurance","authors":"A.R. Choudhary","doi":"10.1109/IAW.2006.1652089","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652089","url":null,"abstract":"In this paper we have presented a new concept: the compound identity measure. In essence, the compound identity combines the user identity with the contextual information under which the user acts. The measure of the compound identity is a weighted combination of the user related entities and the context related entities. This numeric measure is a variable depending upon what entities are included and with what relative weightings. This variability can be a function of the real-time SA/COP data, thus allowing it to dynamically respond to the operational events, in the near real-time. We have defined the concept, described the detailed methods to evaluate the concept into a measure, pointed out the enabling technologies, and illustrated the scheme with an example. We have also pointed out how to use the compound identity measure in a policy-based decision engine, and various areas of its application. The concept is currently being prototyped in our laboratory to support VoIP capabilities in IPv6 networks","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"81 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115310706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 6
Developing a Threat Model for Enterprise Storage Area Networks 面向企业存储区域网络的威胁模型研究
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652070
C. DeCusatis
The need for improved security has been widely recognized in the information technology industry, particularly for enterprise storage area networks (SANs). However, until recently there has been relatively little development of threat models which specifically address the unique requirements of these networks. In this paper, we present a method for quantifying risk, justifying security upgrade costs, and proactively assessing threats to an enterprise-class SAN. The threat model suggests that a centralized approach to security management based on the host processor may be more effective than a distributed approach based on the edge of the network. Examples of enterprise server security features developed to address these threats are discussed, along with performance results on host-based encryption and a roadmap for future security enhancements
在信息技术行业,特别是企业存储区域网络(san)中,对改进安全性的需求已得到广泛认可。然而,直到最近,专门针对这些网络的独特需求的威胁模型的开发相对较少。在本文中,我们提出了一种量化风险、证明安全升级成本和主动评估企业级SAN威胁的方法。威胁模型表明,基于主机处理器的集中式安全管理方法可能比基于网络边缘的分布式方法更有效。本文讨论了为解决这些威胁而开发的企业服务器安全特性的示例,以及基于主机的加密的性能结果和未来安全性增强的路线图
{"title":"Developing a Threat Model for Enterprise Storage Area Networks","authors":"C. DeCusatis","doi":"10.1109/IAW.2006.1652070","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652070","url":null,"abstract":"The need for improved security has been widely recognized in the information technology industry, particularly for enterprise storage area networks (SANs). However, until recently there has been relatively little development of threat models which specifically address the unique requirements of these networks. In this paper, we present a method for quantifying risk, justifying security upgrade costs, and proactively assessing threats to an enterprise-class SAN. The threat model suggests that a centralized approach to security management based on the host processor may be more effective than a distributed approach based on the edge of the network. Examples of enterprise server security features developed to address these threats are discussed, along with performance results on host-based encryption and a roadmap for future security enhancements","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114154430","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Towards High Level Attack Scenario Graph through Honeynet Data Correlation Analysis 利用蜜网数据关联分析构建高层次攻击场景图
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652098
Jianwei Zhuge, Xinhui Han, Yu Chen, Zhiyuan Ye, Wei Zou
Honeynet data analysis has become a core requirement of honeynet technology. However, current honeynet data analysis mechanisms are still unable to provide security analysts enough capacities of comprehend the captured data quickly, in particular, there is no work done on behavior level correlation analysis. Towards providing high level attack scenario graphs, in this paper, we propose a honeynet data correlation analysis model and method. Based on a network attack and defense knowledge base and network environment perceiving mechanism, our proposed honeynet data correlation analysis method can recognize the attacker/s plan from a large volume of captured data and consequently reconstruct attack scenarios. Two proof-of-concept experiments on Scan of the Month 27 dataset and in-the-wild botnet scenarios are presented to show the effectiveness of our method
蜜网数据分析已成为蜜网技术的核心要求。然而,目前的蜜网数据分析机制仍然无法为安全分析人员提供足够的能力来快速理解捕获的数据,特别是在行为层面的相关性分析方面还没有做足够的工作。为了提供高层次的攻击场景图,本文提出了一种蜜网数据关联分析模型和方法。基于网络攻防知识库和网络环境感知机制,我们提出的蜜网数据关联分析方法可以从大量捕获的数据中识别攻击者的计划,从而重构攻击场景。在27月扫描数据集和野外僵尸网络场景上进行了两个概念验证实验,以证明我们的方法的有效性
{"title":"Towards High Level Attack Scenario Graph through Honeynet Data Correlation Analysis","authors":"Jianwei Zhuge, Xinhui Han, Yu Chen, Zhiyuan Ye, Wei Zou","doi":"10.1109/IAW.2006.1652098","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652098","url":null,"abstract":"Honeynet data analysis has become a core requirement of honeynet technology. However, current honeynet data analysis mechanisms are still unable to provide security analysts enough capacities of comprehend the captured data quickly, in particular, there is no work done on behavior level correlation analysis. Towards providing high level attack scenario graphs, in this paper, we propose a honeynet data correlation analysis model and method. Based on a network attack and defense knowledge base and network environment perceiving mechanism, our proposed honeynet data correlation analysis method can recognize the attacker/s plan from a large volume of captured data and consequently reconstruct attack scenarios. Two proof-of-concept experiments on Scan of the Month 27 dataset and in-the-wild botnet scenarios are presented to show the effectiveness of our method","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129818920","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Creating a Balanced Scorecard for Computer Security 为计算机安全创建平衡计分卡
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652071
L. DeLooze
Information assurance includes the monitoring and controlling of the various aspects of an organization's computer security systems. This paper outlines various approaches to define the measures or metrics that can be used to reliably describe the organization's current IA posture and introduces the use of the balanced scorecard for computer security. The balanced scorecard is most commonly used to monitor and control business elements by looking at them from four important perspectives: customer, financial, internal processes, and innovation and growth. This paper proposes a comparable approach for managing computer security by looking at security mechanisms from the perspectives of the users, owners, regulators, and system administrators
信息保障包括监视和控制组织计算机安全系统的各个方面。本文概述了定义可用于可靠地描述组织当前IA状态的度量或度量的各种方法,并介绍了计算机安全平衡计分卡的使用。平衡计分卡最常用来监视和控制业务元素,方法是从四个重要的角度来观察它们:客户、财务、内部流程以及创新和增长。本文通过从用户、所有者、监管机构和系统管理员的角度来看待安全机制,提出了一种管理计算机安全的类似方法
{"title":"Creating a Balanced Scorecard for Computer Security","authors":"L. DeLooze","doi":"10.1109/IAW.2006.1652071","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652071","url":null,"abstract":"Information assurance includes the monitoring and controlling of the various aspects of an organization's computer security systems. This paper outlines various approaches to define the measures or metrics that can be used to reliably describe the organization's current IA posture and introduces the use of the balanced scorecard for computer security. The balanced scorecard is most commonly used to monitor and control business elements by looking at them from four important perspectives: customer, financial, internal processes, and innovation and growth. This paper proposes a comparable approach for managing computer security by looking at security mechanisms from the perspectives of the users, owners, regulators, and system administrators","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129644135","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
A Dynamic Filtering Technique for Sebek System Monitoring Sebek系统监测的动态滤波技术
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652106
E. Balas, G. Travis, C. Viecco
In this paper we investigate the performance limits of system call based monitoring tools using the Linux version of Sebek as a focal point. We quantify the amount of uninteresting data that it collects and illustrate the problems that this creates: detection of Sebek, amount of work to analyze data, and data privacy. To mitigate these problems we propose a dynamic filtering technique. Finally we evaluate the performance of an implementation of this technique
在本文中,我们以Linux版本的Sebek为重点,研究了基于系统调用的监控工具的性能限制。我们量化了它收集的无趣数据的数量,并说明了由此产生的问题:Sebek检测、分析数据的工作量以及数据隐私。为了缓解这些问题,我们提出了一种动态过滤技术。最后,我们对该技术的一个实现进行了性能评估
{"title":"A Dynamic Filtering Technique for Sebek System Monitoring","authors":"E. Balas, G. Travis, C. Viecco","doi":"10.1109/IAW.2006.1652106","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652106","url":null,"abstract":"In this paper we investigate the performance limits of system call based monitoring tools using the Linux version of Sebek as a focal point. We quantify the amount of uninteresting data that it collects and illustrate the problems that this creates: detection of Sebek, amount of work to analyze data, and data privacy. To mitigate these problems we propose a dynamic filtering technique. Finally we evaluate the performance of an implementation of this technique","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130561248","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 4
PalProtect: A Collaborative Security Approach to Comment Spam PalProtect:一种处理垃圾评论的协作安全方法
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652092
Benny Wong, M. Locasto, A. Keromytis
Collaborative security is a promising solution to many types of security problems. Organizations and individuals often have a limited amount of resources to detect and respond to the threat of automated attacks. Enabling them to take advantage of the resources of their peers by sharing information related to such threats is a major step towards automating defense systems. In particular, comment spam posted on blogs as a way for attackers to do search engine optimization (SEO) is a major annoyance. Many measures have been proposed to thwart such spam, but all such measures are currently enacted and operate within one administrative domain. We propose and implement a system for cross-domain information sharing to improve the quality and speed of defense against such spam
协作安全是解决许多类型安全问题的一种很有前途的解决方案。组织和个人通常只有有限的资源来检测和响应自动攻击的威胁。通过共享与此类威胁相关的信息,使他们能够利用同行的资源,这是迈向自动化防御系统的重要一步。特别是,在博客上发布的评论垃圾邮件作为攻击者进行搜索引擎优化(SEO)的一种方式是一个主要的烦恼。已经提出了许多措施来阻止这种垃圾邮件,但所有这些措施目前都是在一个管理领域内制定和实施的。我们提出并实现了一个跨域信息共享系统,以提高对此类垃圾邮件的防御质量和速度
{"title":"PalProtect: A Collaborative Security Approach to Comment Spam","authors":"Benny Wong, M. Locasto, A. Keromytis","doi":"10.1109/IAW.2006.1652092","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652092","url":null,"abstract":"Collaborative security is a promising solution to many types of security problems. Organizations and individuals often have a limited amount of resources to detect and respond to the threat of automated attacks. Enabling them to take advantage of the resources of their peers by sharing information related to such threats is a major step towards automating defense systems. In particular, comment spam posted on blogs as a way for attackers to do search engine optimization (SEO) is a major annoyance. Many measures have been proposed to thwart such spam, but all such measures are currently enacted and operate within one administrative domain. We propose and implement a system for cross-domain information sharing to improve the quality and speed of defense against such spam","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127686710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 5
Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652084
L. DeLooze
Self-organized maps (SOM) use an unsupervised learning technique to independently organize a set of input patterns into various classes. In this paper, we use an ensemble of SOMs to identify computer attacks and characterize them appropriately using the major classes of computer attacks (denial of service, probe, user-to-root and remote-to-local). The procedure produces a set of confidence levels for each connection as a way to describe the connection's behavior
自组织映射(SOM)使用无监督学习技术将一组输入模式独立地组织到不同的类中。在本文中,我们使用SOMs集合来识别计算机攻击,并使用主要的计算机攻击类别(拒绝服务,探测,用户到根和远程到本地)适当地描述它们。该过程为每个连接生成一组置信水平,作为描述连接行为的一种方式
{"title":"Attack Characterization and Intrusion Detection using an Ensemble of Self-Organizing Maps","authors":"L. DeLooze","doi":"10.1109/IAW.2006.1652084","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652084","url":null,"abstract":"Self-organized maps (SOM) use an unsupervised learning technique to independently organize a set of input patterns into various classes. In this paper, we use an ensemble of SOMs to identify computer attacks and characterize them appropriately using the major classes of computer attacks (denial of service, probe, user-to-root and remote-to-local). The procedure produces a set of confidence levels for each connection as a way to describe the connection's behavior","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130817658","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 19
File Type Identification of Data Fragments by Their Binary Structure 基于二进制结构的数据片段文件类型识别
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652088
Martin Karresand, N. Shahmehri
Rapidly gaining information superiority is vital when fighting an enemy, but current computer forensics tools, which require file headers or a working file system to function, do not enable us to quickly map out the contents of corrupted hard disks or other fragmented storage media found at crime scenes. The lack of proper tools slows down the hunt for information, which would otherwise help in gaining the upper hand against IT based perpetrators. To address this problem, this paper presents an algorithm which allows categorization of data fragments based solely on their structure, without the need for any meta data. The algorithm is based on measuring the rate of change of the byte contents of digital media and extends the byte frequency distribution based Oscar method presented in an earlier paper. The evaluation of the new method shows a detection rate of 99.2 %, without generating any false positives, when used to scan for JPEG data. The slowest implementation of the algorithm scans a 72.2 MB file in approximately 2.5 seconds and scales linearly
在与敌人作战时,迅速获得信息优势是至关重要的,但目前的计算机取证工具需要文件头或工作文件系统才能发挥作用,这使我们无法快速绘制出在犯罪现场发现的损坏硬盘或其他碎片存储介质的内容。缺乏适当的工具会减缓对信息的搜寻,否则将有助于在对抗基于IT的犯罪者方面占上风。为了解决这个问题,本文提出了一种算法,该算法允许仅根据数据片段的结构对其进行分类,而不需要任何元数据。该算法基于测量数字媒体字节内容的变化率,扩展了前人提出的基于字节频率分布的Oscar方法。对新方法的评价表明,在对JPEG数据进行扫描时,该方法的检测率为99.2%,没有产生任何误报。该算法最慢的实现在大约2.5秒内扫描72.2 MB的文件并线性扩展
{"title":"File Type Identification of Data Fragments by Their Binary Structure","authors":"Martin Karresand, N. Shahmehri","doi":"10.1109/IAW.2006.1652088","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652088","url":null,"abstract":"Rapidly gaining information superiority is vital when fighting an enemy, but current computer forensics tools, which require file headers or a working file system to function, do not enable us to quickly map out the contents of corrupted hard disks or other fragmented storage media found at crime scenes. The lack of proper tools slows down the hunt for information, which would otherwise help in gaining the upper hand against IT based perpetrators. To address this problem, this paper presents an algorithm which allows categorization of data fragments based solely on their structure, without the need for any meta data. The algorithm is based on measuring the rate of change of the byte contents of digital media and extends the byte frequency distribution based Oscar method presented in an earlier paper. The evaluation of the new method shows a detection rate of 99.2 %, without generating any false positives, when used to scan for JPEG data. The slowest implementation of the algorithm scans a 72.2 MB file in approximately 2.5 seconds and scales linearly","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128895250","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 115
Foundations for Visual Forensic Analysis 视觉法医分析基础
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652095
Sheldon Teerlink, R. Erbacher
Computer forensics is the preservation, analysis, and interpretation of computer data. It is a crucial tool in the arsenal of law enforcement investigators, national security analysts, and corporate computer emergency response teams. There is a need for software that aids investigators in locating data on hard drives left by persons committing illegal activities. Analysts use forensic techniques to analyze insider attacks on organizations and recover data hidden or deleted by disgruntled employees or attackers. Advanced software tools are needed to reduce the tedious efforts of forensic examiners, especially when searching large hard drives. This paper discusses the background, algorithms, fundamentals, and techniques intrinsic to the visual analysis of typical computer forensic data. In terms of the visualization technique itself we discuss a visualization techniques to represent file statistics such as file size, last access date, creation date, last modification date, owner, number of i-nodes for fragmentation, and file type. The user interface to this software allows file searching, pattern matching, and the display of file contents
计算机取证是计算机数据的保存、分析和解释。它是执法调查人员、国家安全分析人员和企业计算机应急响应团队的重要工具。需要一种软件来帮助调查人员定位从事非法活动的人留下的硬盘上的数据。分析师使用取证技术来分析对组织的内部攻击,并恢复被心怀不满的员工或攻击者隐藏或删除的数据。需要先进的软件工具来减少法医审查员的繁琐工作,特别是在搜索大型硬盘驱动器时。本文讨论了典型计算机取证数据可视化分析的背景、算法、基本原理和技术。就可视化技术本身而言,我们讨论了一种可视化技术来表示文件统计信息,如文件大小、最后访问日期、创建日期、最后修改日期、所有者、用于碎片的i节点数量和文件类型。该软件的用户界面允许文件搜索、模式匹配和文件内容的显示
{"title":"Foundations for Visual Forensic Analysis","authors":"Sheldon Teerlink, R. Erbacher","doi":"10.1109/IAW.2006.1652095","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652095","url":null,"abstract":"Computer forensics is the preservation, analysis, and interpretation of computer data. It is a crucial tool in the arsenal of law enforcement investigators, national security analysts, and corporate computer emergency response teams. There is a need for software that aids investigators in locating data on hard drives left by persons committing illegal activities. Analysts use forensic techniques to analyze insider attacks on organizations and recover data hidden or deleted by disgruntled employees or attackers. Advanced software tools are needed to reduce the tedious efforts of forensic examiners, especially when searching large hard drives. This paper discusses the background, algorithms, fundamentals, and techniques intrinsic to the visual analysis of typical computer forensic data. In terms of the visualization technique itself we discuss a visualization techniques to represent file statistics such as file size, last access date, creation date, last modification date, owner, number of i-nodes for fragmentation, and file type. The user interface to this software allows file searching, pattern matching, and the display of file contents","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"180 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116325237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Aspects of Personal Information Theory 个人信息理论的各个方面
Pub Date : 2006-06-21 DOI: 10.1109/IAW.2006.1652090
S. Al-Fedaghi
This paper demonstrates that there exists a ground for building personal information theory through the exploration of several notions such as personal information privacy, security, sharing, and mining. It introduces a methodology for developing a conceptualization of these notions in the personal information context. To illustrate unique techniques that can be applied only to personal information, we develop a general model for sharing personal information. A protection strategy, based on separating non-personal information from its proprietors, is introduced and applied to personal information
本文通过对个人信息隐私、安全、共享、挖掘等概念的探讨,论证了建立个人信息理论的基础。它介绍了一种在个人信息上下文中对这些概念进行概念化的方法。为了说明只能应用于个人信息的独特技术,我们开发了一个共享个人信息的通用模型。介绍了一种基于将非个人信息与其所有者分离的保护策略,并将其应用于个人信息
{"title":"Aspects of Personal Information Theory","authors":"S. Al-Fedaghi","doi":"10.1109/IAW.2006.1652090","DOIUrl":"https://doi.org/10.1109/IAW.2006.1652090","url":null,"abstract":"This paper demonstrates that there exists a ground for building personal information theory through the exploration of several notions such as personal information privacy, security, sharing, and mining. It introduces a methodology for developing a conceptualization of these notions in the personal information context. To illustrate unique techniques that can be applied only to personal information, we develop a general model for sharing personal information. A protection strategy, based on separating non-personal information from its proprietors, is introduced and applied to personal information","PeriodicalId":326306,"journal":{"name":"2006 IEEE Information Assurance Workshop","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2006-06-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128702383","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
期刊
2006 IEEE Information Assurance Workshop
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1