SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Third International Conference on Digital Security and Forensics (DigitalSec2016)
-
An Evidence Collection and Analysis of Ubuntu File System
A file system of Ubuntu operating system can conserve and manage a lot of configuration information and the information with forensic importance. Mining and analyzing the useful data of the Ubuntu ...Authors: Dinesh Patil, Bandu Meshram
Year Published: Sep. 2016 | 1-11 | DigitalSec2016 -
Utilizing Program's Execution Data for Digital Forensics
Criminals use computers and software to perform their crimes or to cover their misconducts. Main memory or RAM encompasses vibrant information about a system including its active processes. Program's ...Authors: Ziad Al-Sharif
Year Published: Sep. 2016 | 12-19 | DigitalSec2016 -
Systems in Danger: A Short Review on Metamorphic Computer Viruses
In current times, anti-virus scanners are usually built on signatures which look for known patterns in order to decide if a file is virus infected. Hackers have incorporated the code obfuscation ...Authors: Seyed Amirhossein Mousavi, Babak Bashari Rad, Teh Ying Wah
Year Published: Sep. 2016 | 20-26 | DigitalSec2016 -
Application and Evaluation of Method for Establishing Consensus on Measures Based on Cybersecurity Framework
Due to the development of our information society in recent years, the number of companies depending on IT systems has increased. However, it has been noticed that executives have not implemented ...Authors: Shota Fukushima, Ryoichi Sasaki
Year Published: Sep. 2016 | 27-34 | DigitalSec2016 -
Development and Evaluation of a Dynamic Security Evaluation System for the Cloud System Operation
Because of today's sophisticated cyberattacks, IT systems are required to take security into special consideration from the design stage to the operational stage. Therefore, industry organizations as ...Authors: Motoharu Sekine, Yuki Ashino, Shigeyoshi Shima, Yoshimi Teshigawara, Ryoichi Sasaki
Year Published: Sep. 2016 | 35-45 | DigitalSec2016 -
Proposal of an Improved Event Tree and Defense Tree Combined Method for Risk Evaluation with Common Events
Damage caused by targeted attacks has increased in recent years. In order to cope with the issue, we previously developed the event tree and defense tree combined (EDC) method for obtaining the ...Authors: Ryo Aihara, Ryohei Ishii, Ryoichi Sasaki
Year Published: Sep. 2016 | 46-53 | DigitalSec2016 -
Proposal of Unified Data Management and Recovery Tool Using Shadow Copy
In recent years, solid state drives (SSD) have started to replace hard disk drives. A SSD is a high-speed storage device with a TRIM function. However, a SSD cannot restore deleted files. Therefore, ...Authors: Naoki Matsutaka, Masato Eguchi, Takuya Okazaki, Tahashi Matsumoto, Tetsutaro Uehara, Ryoichi Sasaki
Year Published: Sep. 2016 | 54-60 | DigitalSec2016 -
Countermeasure against Drive by Download Attack by Analyzing Domain Information
In recent years, malware infections by Drive by Download (DbD) attacks carried out with the cooperation of malicious web sites have caused serious damage. The blacklist method is a current typical ...Authors: Tadashi Kimura, Ryoichi Sasaki
Year Published: Sep. 2016 | 61-67 | DigitalSec2016 -
Fingerprinting Violating Machines with TCP Timestamps
Cyber crime has increased as a side effect of the dramatic growth in Internet deployment. Identifying machines that are responsible about crimes is a vital step in an attack investigation. Tracking ...Authors: Mohammed Al-Saleh
Year Published: Sep. 2016 | 68-73 | DigitalSec2016 -
Method for Detecting a Malicious Domain by Using WHOIS and DNS Features
Damages caused by targeted attacks are a serious problem. It is not enough to prevent only the initial infections, because techniques for targeted attacks have become more sophisticated every year, ...Authors: Masahiro Kuyama, Yoshio Kakizaki, Ryoichi Sasaki
Year Published: Sep. 2016 | 74-80 | DigitalSec2016 -
Awareness of Cloud Storage Forensics amongst the Malaysian Users
Cloud storage services are getting wide, popular and it is using by most of the company and also students who study higher education in Malaysia. The cloud storage services are just being popular to ...Authors: Yee Say Keat, Babak Bashari Rad, Mohammad Ahmadi
Year Published: Sep. 2016 | 81-88 | DigitalSec2016 -
Filtering Avoidance Using Web Translation Service and its Countermeasures
Recently, damage by targeted attacks has been increasing and has also become diversified. A targeted attack is any malicious attack targeted toward a specific individual or organization. It has the ...Authors: Ryota Suzuki, Atsuo Inomata, Ryoichi Sasaki
Year Published: Sep. 2016 | 89-96 | DigitalSec2016 -
Using Mutual Information for Feature Selection in Network Intrusion Detection System
This paper presents the feature selection problem for data classification arising from a large number of redundant and irrelevant features. It first proposes a Mutual Information based Feature ...Authors: Mohammed A. Ambusaidi
Year Published: Sep. 2016 | 97-104 | DigitalSec2016 -
Cloud Authentication Logic on Data Security
Cloud computing provides dynamic capacity and capabilities, and it imparts resources as services over the Internet. In cloud computing, information migrated to third parties and it poses enormous ...Authors: Maryam Shahpasand, Muhammad Ehsan Rana, Ramlan Mahmod, Nur Izura Udzir
Year Published: Sep. 2016 | 105-112 | DigitalSec2016 -
Privacy and Security Challenges in Cloud Based Electronic Health Record: Towards Access Control Model
Over the years, data theft has been rampant in financial institutions, however at present medical data is in the spotlight. Healthcare industry is considered as a potential target for hackers and ...Authors: Micheal Kubbo, Manoj Jayabalan, Muhammad Ehsan Rana
Year Published: Sep. 2016 | 113-121 | DigitalSec2016