Suchen und Finden
Mehr zum Inhalt
Information Security and Digital Forensics. Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications, Vol 41 - First International Conference, ISDF 2009, London, United Kingdom, September 7-9, 2009, Revised Sele
Preface
5
Table of Contents
6
Analysis of Denial of Service Attacks in IEEE 802.11s Wireless Mesh Networks
8
Introduction
8
Types of Dos Attacks
9
DoS Attacks in WMNs
11
Analysis of Existing Security Models
11
Addition of IEs Inside Frame Body Fields
11
Addition of 11 Bit Code by Replacing Bits of Frame Control and Sequence Control
12
Proposed Draft as IEEE 802.11w
12
Other Related Work
13
Proposed Scheme
15
Advantage over the Proposed Draft
15
Shortfalls of 802.11w
16
Conclusion
16
References
17
A Semi-fragile Watermarking Algorithm for Authenticating 2D Engineering Graphics Based on Log-Polar Transformation
18
Introduction
18
2D Engineering Graphics and Log-Polar Transformation
19
2D Engineering Graphics
19
Log-Polar Transformation
19
Semi-fragile Watermarking for 2D Engineering Graphics
20
Generation of Watermark
20
Watermark Embedding
21
Watermarks Verification
22
Experimental Results and Discussion
22
Experimental Results
22
Discussion of the Robustness and Ability of Tamper Location
22
Performance Discussion
23
Conclusions
24
References
25
On the Repudiability of Device Identification and Image Integrity Verification Using Sensor Pattern Noise
26
Introduction
26
Device Identification and Image Integrity Verification Using Sensor Pattern Noise
27
Potential Attacks
28
Signature Removal
28
Signature Substitution
29
Conclusions
31
References
32
Virtualization Efficacy for Network Intrusion Detection Systems in High Speed Environment
33
Introduction
33
Virtualization
35
Hosted Virtualization
35
Hypervisor Virtualization
35
Packet Handling
36
System Hardware
36
Operating System
37
NIDS and Packet Capturing Libraries
37
Performance Test
38
Test-Bench
38
Evaluation Methodology
39
Results
39
UDP Traffic
40
TCP Traffic
42
Analysis
43
OS and Application Incompatibility
43
Hardware Incompatibility in Virtualization
45
Conclusion
46
References
47
Face Recognition Using Balanced Pairwise Classifier Training
49
Introduction
49
Gabor Feature Extraction
51
Classifier Training
51
Empirical Kernel Map
52
Training Strategy for Fisher’s Discriminant Analysis on an Unbalanced Feature Training Set
52
Experimental Settings
53
Results
54
Conclusion
55
References
55
Forensic Investigation of the Soft-Modded PlayStation Portable (PSP)
57
Introduction
57
PSP Onboard Flash Memory and Custom Firmware
58
Data Storage Areas in the Onboard NAND Flash Memory
58
Custom Firmware (CFW)
58
PSP Forensics Issues and Possible Solutions
58
Checking If the System Has Been Modded
59
Check If a Custom VSH Menu Is Enabled
59
Imaging Issues
61
NAND Flash Dumping
62
Media Analysis
62
Conclusions
62
References
63
Smart Logic - Preventing Packet Loss in High Speed Network Intrusion Detection Systems
64
Introduction
64
Smart Logic
66
Architecture
66
Operation
67
Test Bench
69
Results
69
CPU Usage
69
Packet Handling
70
Conclusion
71
References
71
Parameter Based Access Control Model for Mobile Handsets
73
Introduction
73
Related Work
74
Security Design
75
Registration Process
75
Data Transmission
77
Data Access at the Security Capsule
78
Parameter Based Access Control
80
Conclusion
81
References
82
Ethical Dilemmas in Teaching Computer and Internet Security
83
Introduction
83
The Issues in Computer Teaching
84
Teaching Network Programming
85
Teaching e-Business
85
Teaching Internet Protocols
85
Datalink Layer
86
Network Layer
86
Transport Layer
86
Application Layer
86
Teaching Trustworthiness and Security
87
Conclusions
87
References
88
Overview of SIP Attacks and Countermeasures
89
Introduction
89
SIP Security Measures
90
Denial of Service Attack
90
SIP Injection Attack
92
SIP Spoofing Attack
93
SIP Authentication Attack
95
SIP Traffic Capturing
95
SIP Messages Modification Attack
96
VoIP SPAM (SPIT)
96
Conclusions
96
References
97
Security Challenges in Multihop Wireless Mesh Networks–A Survey
99
Introduction
99
Potential Attacks on WMN Protocols
100
External Attacks
100
Internal Attacks
100
Secure Routing Protocols
101
Use of Cryptographic Approaches
101
Internal Attacks in WMN
103
Intrusion Detection Techniques
104
Mesh Security
105
Client Access Controls
105
Inter-mesh Access Point Controls
105
Standardization
106
Conclusion
107
References
107
A Security Architecture to Protect Against Data Loss
109
System Modelling
109
Data Loss and Its Causes
109
Accidental Data Loss by Her Majesty’s Revenue and Customs
110
The Searchlight Model
110
Multilevel Security Model
110
An Attack Classification Scheme
111
Data Loss Classification
112
Attack Surface
113
Impact Zone
113
Protecting against Data Loss
114
Accidental Data Loss by Her Majesty’s Revenue and Customs
114
System Hardening
114
Targeting the Perpetrator
115
Conclusions
116
References
116
A Simple Method for Improving Intrusion Detections in Corporate Networks
118
Introduction
118
Related Work
120
Network Intrusion Detections
121
Datasets and Methodology
123
Results of Experiments
125
Conclusion and Future Research Work
128
References
128
Detecting Sybils in Peer-to-Peer File Replication Systems
130
Introduction
130
Related Work
132
Sybil Detection
132
Scope
132
Algorithm Overview
134
Simulation Results
136
Conclusion
140
References
140
Adaptive Clustering Method for Reclassifying Network Intrusions
142
Introduction
142
Related Works
144
Overview of Datasets
146
Reclassification of Intrusions
146
Automated Reclassification of Alerts
148
Experimental Results
149
Summary of Experimental Results
151
Conclusion and Future Research
151
References
152
Technology Perspective: Is Green IT a Threat to IT Security?
154
Introduction
154
Research Challenges
157
Virtual Network Security and Threats
157
Virtual Network Management
158
Summary
160
References
160
An Adaptive Fusion Framework for Fault-Tolerant Multibiometrics
162
Introduction
162
The Adaptive Fusion Framework
163
Experiments
164
Database and Test Scenarios
164
3D and 2D Face Recognition Algorithms
165
Adaptive and Non-adaptive Fusion
166
Results
166
Conclusion
168
References
168
Cross-Enterprise Policy Model for e-Business Web Services Security
170
Introduction
170
Related Work
172
e-Business and Its Security Concerns
172
Approaches to Web Services (WS) Security
172
Web Services Security Model
173
e-Business Case Scenario
174
Security Requirements
176
The Model
176
Conclusion and Future Work
177
References
178
Challenges of Identity Management – A Context in Rural India
179
Introduction
179
The Problem
180
Related Research
181
Methodology
181
The Study
182
Existing Processes for Membership Management at SEWA
182
Analyzing the Existing Membership Data
183
Facts Revealed from the Interviews and Group Discussions
185
Challenges Encountered during De-duplication of Data
186
Findings of the Study
187
Conclusion and Further Research
189
References
190
Author Index
191
Alle Preise verstehen sich inklusive der gesetzlichen MwSt.