Mehr zum Inhalt

Information Security and Digital Forensics. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications, Vol 41 - First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Sele


 

Preface

5

Table of Contents

6

Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks

8

Introduction

8

Types of Dos Attacks

9

DoS Attacks in WMNs

11

Analysis of Existing Security Models

11

Addition of IEs Inside Frame Body Fields

11

Addition of 11 Bit Code by Replacing Bits of Frame Control and Sequence Control

12

Proposed Draft as IEEE 802.11w

12

Other Related Work

13

Proposed Scheme

15

Advantage over the Proposed Draft

15

Shortfalls of 802.11w

16

Conclusion

16

References

17

A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation

18

Introduction

18

2D Engineering Graphics and Log-Polar Transformation

19

2D Engineering Graphics

19

Log-Polar Transformation

19

Semi-fragile Watermarking for 2D Engineering Graphics

20

Generation of Watermark

20

Watermark Embedding

21

Watermarks Verification

22

Experimental Results and Discussion

22

Experimental Results

22

Discussion of the Robustness and Ability of Tamper Location

22

Performance Discussion

23

Conclusions

24

References

25

On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise

26

Introduction

26

Device Identification and Image Integrity Verification Using Sensor Pattern Noise

27

Potential Attacks

28

Signature Removal

28

Signature Substitution

29

Conclusions

31

References

32

Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment

33

Introduction

33

Virtualization

35

Hosted Virtualization

35

Hypervisor Virtualization

35

Packet Handling

36

System Hardware

36

Operating System

37

NIDS and Packet Capturing Libraries

37

Performance Test

38

Test-Bench

38

Evaluation Methodology

39

Results

39

UDP Traffic

40

TCP Traffic

42

Analysis

43

OS and Application Incompatibility

43

Hardware Incompatibility in Virtualization

45

Conclusion

46

References

47

Face Recognition Using Balanced Pairwise Classifier Training

49

Introduction

49

Gabor Feature Extraction

51

Classifier Training

51

Empirical Kernel Map

52

Training Strategy for Fisher’s Discriminant Analysis on an Unbalanced Feature Training Set

52

Experimental Settings

53

Results

54

Conclusion

55

References

55

Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)

57

Introduction

57

PSP Onboard Flash Memory and Custom Firmware

58

Data Storage Areas in the Onboard NAND Flash Memory

58

Custom Firmware (CFW)

58

PSP Forensics Issues and Possible Solutions

58

Checking If the System Has Been Modded

59

Check If a Custom VSH Menu Is Enabled

59

Imaging Issues

61

NAND Flash Dumping

62

Media Analysis

62

Conclusions

62

References

63

Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems

64

Introduction

64

Smart Logic

66

Architecture

66

Operation

67

Test Bench

69

Results

69

CPU Usage

69

Packet Handling

70

Conclusion

71

References

71

Parameter Based Access Control Model for Mobile Handsets

73

Introduction

73

Related Work

74

Security Design

75

Registration Process

75

Data Transmission

77

Data Access at the Security Capsule

78

Parameter Based Access Control

80

Conclusion

81

References

82

Ethical Dilemmas in Teaching Computer and Internet Security

83

Introduction

83

The Issues in Computer Teaching

84

Teaching Network Programming

85

Teaching e-Business

85

Teaching Internet Protocols

85

Datalink Layer

86

Network Layer

86

Transport Layer

86

Application Layer

86

Teaching Trustworthiness and Security

87

Conclusions

87

References

88

Overview of SIP Attacks and Countermeasures

89

Introduction

89

SIP Security Measures

90

Denial of Service Attack

90

SIP Injection Attack

92

SIP Spoofing Attack

93

SIP Authentication Attack

95

SIP Traffic Capturing

95

SIP Messages Modification Attack

96

VoIP SPAM (SPIT)

96

Conclusions

96

References

97

Security Challenges in Multihop Wireless Mesh Networks–A Survey

99

Introduction

99

Potential Attacks on WMN Protocols

100

External Attacks

100

Internal Attacks

100

Secure Routing Protocols

101

Use of Cryptographic Approaches

101

Internal Attacks in WMN

103

Intrusion Detection Techniques

104

Mesh Security

105

Client Access Controls

105

Inter-mesh Access Point Controls

105

Standardization

106

Conclusion

107

References

107

A Security Architecture to Protect Against Data Loss

109

System Modelling

109

Data Loss and Its Causes

109

Accidental Data Loss by Her Majesty’s Revenue and Customs

110

The Searchlight Model

110

Multilevel Security Model

110

An Attack Classification Scheme

111

Data Loss Classification

112

Attack Surface

113

Impact Zone

113

Protecting against Data Loss

114

Accidental Data Loss by Her Majesty’s Revenue and Customs

114

System Hardening

114

Targeting the Perpetrator

115

Conclusions

116

References

116

A Simple Method for Improving Intrusion Detections in Corporate Networks

118

Introduction

118

Related Work

120

Network Intrusion Detections

121

Datasets and Methodology

123

Results of Experiments

125

Conclusion and Future Research Work

128

References

128

Detecting Sybils in Peer-to-Peer File Replication Systems

130

Introduction

130

Related Work

132

Sybil Detection

132

Scope

132

Algorithm Overview

134

Simulation Results

136

Conclusion

140

References

140

Adaptive Clustering Method for Reclassifying Network Intrusions

142

Introduction

142

Related Works

144

Overview of Datasets

146

Reclassification of Intrusions

146

Automated Reclassification of Alerts

148

Experimental Results

149

Summary of Experimental Results

151

Conclusion and Future Research

151

References

152

Technology Perspective: Is Green IT a Threat to IT Security?

154

Introduction

154

Research Challenges

157

Virtual Network Security and Threats

157

Virtual Network Management

158

Summary

160

References

160

An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics

162

Introduction

162

The Adaptive Fusion Framework

163

Experiments

164

Database and Test Scenarios

164

3D and 2D Face Recognition Algorithms

165

Adaptive and Non-adaptive Fusion

166

Results

166

Conclusion

168

References

168

Cross-Enterprise Policy Model for e-Business Web Services Security

170

Introduction

170

Related Work

172

e-Business and Its Security Concerns

172

Approaches to Web Services (WS) Security

172

Web Services Security Model

173

e-Business Case Scenario

174

Security Requirements

176

The Model

176

Conclusion and Future Work

177

References

178

Challenges of Identity Management – A Context in Rural India

179

Introduction

179

The Problem

180

Related Research

181

Methodology

181

The Study

182

Existing Processes for Membership Management at SEWA

182

Analyzing the Existing Membership Data

183

Facts Revealed from the Interviews and Group Discussions

185

Challenges Encountered during De-duplication of Data

186

Findings of the Study

187

Conclusion and Further Research

189

References

190

Author Index

191