Information Security and Digital Forensics: First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Selected Papers ... and Telecommunications Engineering)

This document was uploaded by one of our users. The uploader already confirmed that they had the permission to publish it. If you are author/publisher or own the copyright of this documents, please report to us by using this DMCA report form.

Simply click on the Download Book button.

Yes, Book downloads on Ebookily are 100% Free.

Sometimes the book is free on Amazon As well, so go ahead and hit "Search on Amazon"

Author(s): Dasun Weerasinghe
Edition: 1st Edition.
Year: 2010

Language: English
Pages: 191

3642115292......Page 1
Lecture Notes of the Institute
for Computer Sciences, Social-Informatics
and Telecommunications Engineering 41......Page 2
Information Security
and Digital Forensics......Page 3
Preface......Page 5
Table of Contents......Page 6
Introduction......Page 8
Types of Dos Attacks......Page 9
Addition of IEs Inside Frame Body Fields......Page 11
Proposed Draft as IEEE 802.11w......Page 12
Other Related Work......Page 13
Advantage over the Proposed Draft......Page 15
Conclusion......Page 16
References......Page 17
Introduction......Page 18
Log-Polar Transformation......Page 19
Generation of Watermark......Page 20
Watermark Embedding......Page 21
Discussion of the Robustness and Ability of Tamper Location......Page 22
Performance Discussion......Page 23
Conclusions......Page 24
References......Page 25
Introduction......Page 26
Device Identification and Image Integrity Verification Using Sensor Pattern Noise......Page 27
Signature Removal......Page 28
Signature Substitution......Page 29
Conclusions......Page 31
References......Page 32
Introduction......Page 33
Hypervisor Virtualization......Page 35
System Hardware......Page 36
NIDS and Packet Capturing Libraries......Page 37
Test-Bench......Page 38
Results......Page 39
UDP Traffic......Page 40
TCP Traffic......Page 42
OS and Application Incompatibility......Page 43
Hardware Incompatibility in Virtualization......Page 45
Conclusion......Page 46
References......Page 47
Introduction......Page 49
Classifier Training......Page 51
Training Strategy for Fisher’s Discriminant Analysis on an Unbalanced Feature Training Set......Page 52
Experimental Settings......Page 53
Results......Page 54
References......Page 55
Introduction......Page 57
PSP Forensics Issues and Possible Solutions......Page 58
Check If a Custom VSH Menu Is Enabled......Page 59
Imaging Issues......Page 61
Conclusions......Page 62
References......Page 63
Introduction......Page 64
Architecture......Page 66
Operation......Page 67
CPU Usage......Page 69
Packet Handling......Page 70
References......Page 71
Introduction......Page 73
Related Work......Page 74
Registration Process......Page 75
Data Transmission......Page 77
Data Access at the Security Capsule......Page 78
Parameter Based Access Control......Page 80
Conclusion......Page 81
References......Page 82
Introduction......Page 83
The Issues in Computer Teaching......Page 84
Teaching Internet Protocols......Page 85
Application Layer......Page 86
Conclusions......Page 87
References......Page 88
Introduction......Page 89
Denial of Service Attack......Page 90
SIP Injection Attack......Page 92
SIP Spoofing Attack......Page 93
SIP Traffic Capturing......Page 95
Conclusions......Page 96
References......Page 97
Introduction......Page 99
Internal Attacks......Page 100
Use of Cryptographic Approaches......Page 101
Internal Attacks in WMN......Page 103
Intrusion Detection Techniques......Page 104
Inter-mesh Access Point Controls......Page 105
Standardization......Page 106
References......Page 107
Data Loss and Its Causes......Page 109
Multilevel Security Model......Page 110
An Attack Classification Scheme......Page 111
Data Loss Classification......Page 112
Impact Zone......Page 113
System Hardening......Page 114
Targeting the Perpetrator......Page 115
References......Page 116
Introduction......Page 118
Related Work......Page 120
Network Intrusion Detections......Page 121
Datasets and Methodology......Page 123
Results of Experiments......Page 125
References......Page 128
Introduction......Page 130
Scope......Page 132
Algorithm Overview......Page 134
Simulation Results......Page 136
References......Page 140
Introduction......Page 142
Related Works......Page 144
Reclassification of Intrusions......Page 146
Automated Reclassification of Alerts......Page 148
Experimental Results......Page 149
Conclusion and Future Research......Page 151
References......Page 152
Introduction......Page 154
Virtual Network Security and Threats......Page 157
Virtual Network Management......Page 158
References......Page 160
Introduction......Page 162
The Adaptive Fusion Framework......Page 163
Database and Test Scenarios......Page 164
3D and 2D Face Recognition Algorithms......Page 165
Results......Page 166
References......Page 168
Introduction......Page 170
Approaches to Web Services (WS) Security......Page 172
Web Services Security Model......Page 173
e-Business Case Scenario......Page 174
The Model......Page 176
Conclusion and Future Work......Page 177
References......Page 178
Introduction......Page 179
The Problem......Page 180
Methodology......Page 181
Existing Processes for Membership Management at SEWA......Page 182
Analyzing the Existing Membership Data......Page 183
Facts Revealed from the Interviews and Group Discussions......Page 185
Challenges Encountered during De-duplication of Data......Page 186
Findings of the Study......Page 187
Conclusion and Further Research......Page 189
References......Page 190
Author Index......Page 191