ICIW 2007 2Nd International Conference on I- Warfare and Security Naval Postgraduate School, Monterey, California, USA

Total Page:16

File Type:pdf, Size:1020Kb

ICIW 2007 2Nd International Conference on I- Warfare and Security Naval Postgraduate School, Monterey, California, USA ICIW 2007 2nd International Conference on i- Warfare and Security Naval Postgraduate School, Monterey, California, USA 8-9 March 2007 Edited by Leigh Armistead Edith Cowan University Copyright The Authors, 2007. All Rights Reserved. No reproduction, copy or transmission may be made without written permission from the individual authors. Papers have been double-blind peer reviewed before final submission to the conference. Initially, paper abstracts were read and selected by the conference panel for submission as possible papers for the conference. Many thanks to the reviewers who helped ensure the quality of the full papers. ISBN: 978-1-905305-41-4 Published by Academic Conferences Limited Reading UK 44-118-972-4148 [email protected] ICIW 2007 Contents Proceedings Paper Title Author(s) Page Preface iv Biographies of Conference Chairs, Programme Chair, Keynote Speaker and vi Mini-track Chairs Biographies of contributing authors viii Edwin Leigh Armistead1 and The Evolution of Information Operations, Thomas Murphy2 Contracts across the DoD: Opportunities for 1Edith Cowan University, Australia 1-8 Growth in the Future for Academics 2Northlight Technologies, USA Sviatoslav Braynov On Manipulability of Algorithms University of Illinois at Springfield 9-16 IL USA Developing a Framework to Improve Adam Bryant and Michael Grimaila Information Assurance Battlespace Air Force Institute of Technology, 17-24 Knowledge Fairborn, OH, USA Scott Bryant and Michael Grimaila Security Risks in USAF Geospatial Air Force Institute of Technology 25-32 Information Sharing Fairborn, OH, USA Performance Impact of Connectivity James Cullum, Cynthia Irvine and Restrictions and Increased Vulnerability Tim Levin 33-46 Presence on Automated Attack Graph Naval Postgraduate School, Generation Monterey, CA, USA Kenneth Edge, Richard Raines, Rusty Baldwin, Michael Grimaila, Analyzing Security Measures for Mobile Ad Christopher Reuter and Robert Hoc Networks Using Attack and Protection Bennington 47-56 Trees Wright-Patterson AFB, Fairborn,Oh, USA Sid Faber1and Bert Lundy2 1Software Engineering Institute, A Study of DNS Traffic Patterns on a Large Pittsburgh, PA, USA 57-68 Autonomous System 2Naval Postgraduate School, Monterey, CA, USA Larry Fortson and Michael Grimaila Development of a Defensive Cyber Damage Air Force Institute of Technology, 69-76 Assessment Framework Fairborn, OH, USA Simson Garfinkel Anti-Forensics: Techniques, Detection and Naval Postgraduate School, 77-84 Countermeasures Monterey, CA, USA Kenneth Geers and Alexander Eisen IPv6: World Update NCIS Washington, DC, USA 85-94 Leap in the Dark: An Attempt to Theorize Shuyuan Mary Ho Personnel Anomaly Detection for Countering Syracuse University, NY, USA 95-100 Insider Threats i Proceedings Paper Title Author(s) Page Berg Hyacinthe1 and Yves Anglade2 Conceptual Design of a Microfluidics 1Florida State University, Suppressor to Protect against Potentially Tallahassee, FL, USA 101-110 Lethal Printing Devices: A Scenario-based 2Florida A&M University, Physical Cyber Security Measure Tallahassee, FL, USA Derek Isaacs ‘Virtual’ Security Teaching Techniques – Colorado Technical University, and 111-116 Teaching IA methods using VMWare Teams Boecore Inc, Colorado Springs CO, USA Keisuke Iwai, Minoru Sasaki and Differential Power Analysis Attacks against Takakazu Kurokawa 117-122 AES Circuits Implemented on a FPGA National Defense Academy, Japan Magdi Kamel, Mark Eramo, and Categorization of Profiles for PSYOPs: Can Christopher Sutter 123-132 Technology Help? Naval Postgraduate School, Monterey, CA, USA Tuija Kuusisto1, Rauno Kuusisto2 and Mark Nissen3 1Ministry of Defence, Helsinki, Implications of Information Flow Priorities for Finland 2 133-140 Interorganizational Crisis Management National Defence University, Helsinki, Finland 3Naval Postgraduate School, Monterey, CA, USA Irving Lachow and Robert Miller Thinking Strategically About Information National Defense University, 141-146 Operations Washington, DC, USA William Mahoney and William Intrusion Detection in open Source Software Sousan 147-154 via Dynamic Aspects University of Nebraska at Omaha, NE, USA Fine-Grain Security for Military-Civilian- R William Maule and Shelley Gallup Coalition Operations Though Virtual Private Naval Postgraduate School, 155-162 Workspace Technology Monterey, CA, USA Creating Hardware-based Primitives that Stephen Mott and Paul Williams Facilitate the Exposure of State Information Air Force Institute of Technology, 163-170 Useful for Security Related Monitoring Fairborn, OH, USA Ken Revett1, Sergio Tenreiro de Magalhaes2 and Henrique Santos2 Graphical Based user Authentication with 1 University of Westminster, 171-176 Embedded Mouse Stroke Dynamics London,Uk 2University do Minho, Portugal Neil Rowe Planning Cost-Effective Deceptive Resource U.S. Naval Postgraduate School, 177-184 Denial in Defense to Cyber-Attacks CA, USA Neil Rowe, Han Goh, Sze Lim, and Experiments with a Testbed for Automated Binh Duong Defensive Deception Planning for Cyber- U.S. Naval Postgraduate School, 185-194 Attacks CA, USA Robert Sainsbury and Richard Possible Risks Analysis Engine: A Prototype Baskerville Tool for Managing IT Security Safeguards Georgia State University, Atlanta, 195-204 Acquisition GA, USA ii Minoru Sasaki, Keisuke Iwai and Modified RSL as a Countermeasure Against Takakazu Kurokawa 205-216 Differential Power Analysis National Defense Academy, Japan Tiffiny Smith1, Pamela Woolley2, 1 1 A Framework for Relating Cyberspace Robert Mills , and Richard Raines 1 Operations to the Cognitive and Physical Air Force Institute of Technology, 217-224 Domains Fairborn, OH, USA 2 Fairchild AFB WA, USA Anthonius Sulaiman, Sandeep Mandada, Srinivas Mukkamala and Similarity Analysis of Malicious Executables Andrew Sung 225-232 New Mexico Tech, Socorro,NM, USA Stilianos Vidalis, Eric Llewellyn and Using Deception for assuring Security Chrostopher Tubbs 233-240 University of Wales, Newport ,UK Andrew Walenstein1, Rachit Mathur2, Mohamed Chouchane1, and Arun Lakhotia1 1 The Design Space of Metamorphic Malware University of Louisiana at Lafayette, 241-248 LA, U.S.A. 2McAfee Avert Labs, Beaverton, OR, U.S.A. Ken Webb Information Terrorism in the New Security RNSA and Edith Cowan University, 249-256 Environment Perth, Western Australia Bill Woodcock1 and Ross Stapleton- Gray2 Inter-Network Operations Center Dial-By- 1Packet Clearing House, Berkeley, ASN (INOC-DBA), a Hotline for Critical CA, USA 257-262 Internet Infrastructure Management 2Internet Awareness, Inc., Berkeley, CA, USA Don Milne1, John McCarthy2,and Bryan Mills2 1Buckinghamshire Chilterns SME Security in the Digital age University College, High Wycombe, 263-270 UK 2Service Tec Global Services Ltd, UK iii Preface Welcome to the Second International Conference on Information Warfare and Security (ICIW 2007), hosted this year by the Naval Postgraduate School in Monterey, California. The Conference Chair is Dr Dorothy Denning from the Naval Postgraduate School and the Programme Chair is Leigh Armistead from Edith Cowan University in Perth, Australia. The main aim of this Conference is for individuals working in the area of Information Warfare and Information Security to come together to share knowledge with peers interested in the same area of study. The opening keynote address this year is given by Tim Thomas, Foreign Military Studies Office, Army Command and Staff College, Fort Leavenworth, USA on the topic of “Decoding the Virtual Dragon”. On day two of the conference the keynote speaker is John Arquilla from the Naval Postgraduate School, who will talk on “Information Warfare Today”. An important benefit of attending this conference is the ability to share ideas and meet the people who hold them. The range of papers will ensure an interesting two days. The topics covered by the papers this year illustrate the depth of the information operations’ research area, with the subject matter ranging from the highly technical to the more strategic visions of the use and influence of information. To further enhance the conference experience Leigh Armistead will lead an interactive session encouraging debate and discussion the current status of research in the I-Warfare and Security area. With an initial submission of 60 abstracts, after the double blind, peer review process there are 33 papers published in these Conference Proceedings. These papers illustrate the true International spread of the conference, coming from Australia, Finland, Japan, United Kingdom, United States. I wish you a most enjoyable conference. Leigh Armistead Edith Cowan University Programme Chair iv Conference Executive: Edwin Leigh Armistead, Edith Cowan University, Australia Sviatoslav Braynov University of Illinois at Springfield, IL, USA Dorothy Denning, Naval Postgraduate School, Monterey, CA, USA Steve Iatrou, Naval Postgraduate College, Monterey, CA, USA Andy Jones, Security Research Centre, BT, UK and Edith Cowan University, Australia Dan Kuehl, National Defense University, Washington DC, UK, Tara Leweling, Naval Postgraduate School, Monterey, CA, USA Corey Schou, Idaho State University, USA Stylianos Vidalis, University of Glamorgan, UK Conference Committee: The conference programme committee consists of key people in the information systems, information warfare and information security communities around the world. The following people have confirmed their participation: Leigh Armistead (Edith Cowan University, Australia); John Arquila (Naval Postgraduate School, USA); Richard Baskerville (Georgia
Recommended publications
  • Securing Enterprise Web Applications at the Source: an Application Security Perspective
    Securing Enterprise Web Applications at the Source: An Application Security Perspective Author: Eugene Lebanidze [email protected] EXECUTIVE SUMMARY Purpose: This paper considers a variety of application level threats facing enterprise web applications and how those can be mitigated in order to promote security. Evidence shows that perhaps as many as sixty percent of attacks on enterprise web applications are facilitated by exploitable vulnerabilities present in the source code. In this paper we take the approach of examining the various threats specific to the application layer along with their corresponding compensating controls. Threats specific to each of the tiers of the n- tiered enterprise web application are discussed with focus on threat modeling. Compensating controls are addressed at the architecture, design, implementation and deployment levels. The discussion focuses around the core security services, namely confidentiality, integrity, authentication, authorization, availability, non-repudiation and accountability. The paper examines how these core security services are supported in the J2EE and .NET frameworks. Recommendations and standards from various organizations are considered in this paper (e.g. OWASP, NIST, etc.) We also recognize that development and deployment of a secure enterprise web-based application is dependent upon the organization’s enterprise security architecture (ESA) framework. Therefore, we map some elements of our discussion for security architecture and technology issues to the five rings of the enterprise security architecture model, particularly in the context of the Zachman Framework enterprise architecture (EA). While most of the web application security threats and mitigations discussed fall in rings four and five, we tie the local risk to the enterprise risk in ring one of the ESA.
    [Show full text]
  • Attack–Defense Trees
    Attack–Defense Trees Patrick Schweitzer Supervisor: Prof. Dr. Sjouke Mauw (University of Luxembourg) Daily advisor: Dr. Barbara Kordy (University of Luxembourg) © 2013 Patrick Schweitzer The author was employed at the University of Luxembourg and received support from the Fonds National de la Recherche, Luxembourg (PHD-09-167) in the project “Security Analysis through Attack–Defense Trees”. PhD-FSTC-2013-28 The Faculty of Sciences, Technology and Communication DISSERTATION Presented on 8 November 2013 in Luxembourg to obtain the degree of DOCTEUR DE L’UNIVERSITÉ DU LUXEMBOURG EN INFORMATIQUE by Patrick SCHWEITZER Born on 25 January 1980 in Saarbrücken–Dudweiler (Germany) ATTACK–DEFENSE TREES Dissertation defense committee Dr. Barbara Kordy, vice-chairman Université du Luxembourg Dr. Sjouke Mauw, dissertation supervisor Professor, Université du Luxembourg Dr. Christian W. Probst, member Assistant Professor, The Technical University of Denmark Dr. Yves Le Traon, chairman Professor, Université du Luxembourg Dr. Jan Willemson, member Cybernetica, Estonia Summary The advent of the information age has notably amplified the importance of security. Unfortunately security considerations still widely occur as an afterthought. For many companies, security is not a requirement to conduct business and is therefore readily neglected. However the lack of security may obstruct, impede and even ruin an otherwise flourishing enterprise. Only when internal computer networks shut down, web portals are inaccessible, mail servers are attacked, or similar incidents affect the day to day business of an enterprise, security enters into the field of vision of companies. As such, security by design is only slowly becoming accepted practice. Amongst security researchers, there is no dispute that a reasonable approach to- wards uninterrupted business activities includes security measures and controls from the beginning.
    [Show full text]
  • Cyber Threat Modeling: Survey, Assessment, and Representative Framework
    Prepared for: Department of Homeland Security Cyber Threat Modeling: Survey, Assessment, and Representative Framework April 7, 2018 Authors: Deborah J. Bodeau Catherine D. McCollum David B. Fox The Homeland Security Systems Engineering and Development Institute (HSSEDI)™ Operated by The MITRE Corporation Approved for Public Release; Distribution Unlimited. Case Number 18-1174 / DHS reference number 16-J-00184-01 This document is a product of the Homeland Security Systems Engineering and Development Institute (HSSEDI™). Homeland Security Systems Engineering & Development Institute The Homeland Security Act of 2002 (Section 305 of PL 107-296, as codified in 6 U.S.C. 185), herein referred to as the “Act,” authorizes the Secretary of the Department of Homeland Security (DHS), acting through the Under Secretary for Science and Technology, to establish one or more federally funded research and development centers (FFRDCs) to provide independent analysis of homeland security issues. The MITRE Corporation operates the Homeland Security Systems Engineering and Development Institute (HSSEDI) as an FFRDC for DHS under contract HSHQDC-14-D-00006. The HSSEDI FFRDC provides the government with the necessary systems engineering and development expertise to conduct complex acquisition planning and development; concept exploration, experimentation and evaluation; information technology, communications and cyber security processes, standards, methodologies and protocols; systems architecture and integration; quality and performance review, best practices and performance measures and metrics; and, independent test and evaluation activities. The HSSEDI FFRDC also works with and supports other federal, state, local, tribal, public and private sector organizations that make up the homeland security enterprise. The HSSEDI FFRDC’s research is undertaken by mutual consent with DHS and is organized as a set of discrete tasks.
    [Show full text]
  • Chapter 1- Web Application Security Fundamentals
    Chapter 1- Web Application Security Fundamentals Improving Web Application Security: Threats and Countermeasures J.D. Meier, Alex Mackman, Michael Dunner, Srinath Vasireddy, Ray Escamilla and Anandha Murukan Microsoft Corporation Published: June 2003 See the "patterns & practices Security Guidance for Applications Index" for links to additional security resources. See the Landing Page for the starting point and a complete overview of Improving Web Application Security: Threats and Countermeasures. Summary: This chapter introduces Web application security, explains common security terminology and presents a set of proven security principles upon which many of the recommendations throughout this guide are based. It presents an overview of the security process and explains why a holistic approach to security that covers multiple layers including the network, host and application, is required to achieve the goal of hack-resilient Web applications. This chapter also introduces and defines host configuration categories and application vulnerability categories, which are used throughout the remainder of this guide. Contents We Are Secure -- We Have a Firewall What Do We Mean By Security? Threats, Vulnerabilities, and Attacks Defined How Do You Build a Secure Web Application? Secure Your Network, Host, and Application Securing Your Network Securing Your Host Securing Your Application Security Principles Summary Additional Resources When you hear talk about Web application security, there is a tendency to immediately think about attackers defacing Web sites, stealing credit card numbers, and bombarding Web sites with denial of service attacks. You might also think about viruses, Trojan horses, and worms. These are the types of problems that receive the most press because they represent some of the most significant threats faced by today's Web applications.
    [Show full text]
  • Attack Analysis Methodologies Attack Analysis Methodologies in the Automotive Industry
    Attack Analysis Methodologies Attack Analysis Methodologies in the Automotive Industry Master’s thesis in Computer Systems and Networks Seyed Reza Esmaeili & Afshin Soltani Esterabadi Department of Computer Science and Engineering CHALMERS UNIVERSITY OF TECHNOLOGY Gothenburg, Sweden 2019 Master’s thesis 2019 Attack Analysis Methodologies Attack Analysis Methodologies in the Automotive Industry Seyed Reza Esmaeili Afshin Soltani Esterabadi Department of Computer Science and Engineering Division of Computer Systems and Networks Chalmers University of Technology Gothenburg, Sweden 2019 Attack Analysis Methodologies Attack Analysis Methodologies in the Automotive Industry SEYED REZA ESMAEILI & AFSHIN SOLTANI ESTERABADI © SEYED REZA ESMAEILI, AFSHIN SOLTANI ESTERABADI, 2019. Supervisor: Erland Jonsson, Department of Computer Science and Engineering Advisors: Christian Sandberg & Manne Engelke, Volvo Group Trucks Technology Examiner: Tomas Olovsson, Department of Computer Science and Engineering Master’s Thesis 2019 Department of Computer Science and Engineering Division of Computer Systems and Networks Chalmers University of Technology SE-412 96 Gothenburg Telephone +46 31 772 1000 Cover: Volvo FH 4x2 truck. © Volvo Truck Corporation. All rights reserved. Typeset in LATEX Gothenburg, Sweden 2019 iv Attack Analysis Methodologies Attack Analysis Methodologies in the Automotive Industry SEYED REZA ESMAEILI & AFSHIN SOLTANI ESTERABADI Department of Computer Science and Engineering Chalmers University of Technology Abstract In recent years, we have witnessed that technology has advanced dramatically. While new, hi-tech, automated devices entered our lives, a tendency of moving from the disjointed nature of objects to a more interconnected world has emerged. Although such need of interconnection was originated in the IT industry and with the Internet of Things (IoT), automotive industry was also affected by such a trend.
    [Show full text]
  • Threat Modeling
    www.it-ebooks.info www.it-ebooks.info fl ast.indd 11:57:23:AM 01/17/2014 Page xx Threat Modeling Designing for Security Adam Shostack www.it-ebooks.info ffi rs.indd 12:57:18:PM 01/17/2014 Page i Threat Modeling: Designing for Security Published by John Wiley & Sons, Inc. 10475 Crosspoint BoulevardIndianapolis, IN 46256 www.wiley.com Copyright © 2014 by Adam Shostack Published by John Wiley & Sons, Inc., Indianapolis, Indiana Published simultaneously in Canada ISBN: 978-1-118-80999-0 ISBN: 978-1-118-82269-2 (ebk) ISBN: 978-1-118-81005-7 (ebk) Manufactured in the United States of America 10 9 8 7 6 5 4 3 2 1 No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning or otherwise, except as permitted under Sections 107 or 108 of the 1976 United States Copyright Act, without either the prior written permis- sion of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, 222 Rosewood Drive, Danvers, MA 01923, (978) 750-8400, fax (978) 646-8600. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, or online at http://www.wiley .com/go/permissions. Limit of Liability/Disclaimer of Warranty: The publisher and the author make no representations or warranties with respect to the accuracy or completeness of the contents of this work and specifi cally disclaim all warranties, including without limitation warranties of fi tness for a particular purpose.
    [Show full text]
  • Improving Web Application Security
    Improving Web Application Security Threats and Countermeasures Forewords by Mark Curphey, Joel Scambray, and Erik Olson Improving Web Application Security Threats and Countermeasures patterns & practices J.D. Meier, Microsoft Corporation Alex Mackman, Content Master Srinath Vasireddy, Microsoft Corporation Michael Dunner, Microsoft Corporation Ray Escamilla, Microsoft Corporation Anandha Murukan, Satyam Computer Services Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e-mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, e-mail address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Microsoft Corporation. Microsoft, MS-DOS, Windows, Windows NT, Active Directory, BizTalk, IntelliSense, MSDN, Visual Basic, Visual C#, Visual C++, and Visual Studio are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. © 2003 Microsoft Corporation. All rights reserved. Version 1.0 6/30/2003 The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Contents Forewords xliii Foreword by Mark Curphey .....................................................................................xliii Foreword by Joel Scambray .....................................................................................xlv Foreword by Erik Olson .........................................................................................
    [Show full text]
  • Web Secure Software Lifecycle Model
    International Journal of Scientific & Engineering Research, Volume 4, Issue 5, May-2013 2312 ISSN 2229-5518 Web Secure Software Lifecycle Model D. R. Ingle, Dr. B.B. Meshram Abstract-The traditional approach of developing software does not consider security as a prime factor for the development of any software. It is considered as one of the features of the developed system. Since in the recent years number of cyber crimes have increased, there is a need to redesign the software development process and introduce security at each and every phase of software development lifecycle. To induce security at every phase we need to identify the vulnerabilities at each phase. Hence this paper summarizes the survey conducted on vulnerabilities at different phases, the threats and tentative attacks due to the corresponding vulnerabilities. We have also conducted survey on patches available for these threats and hence we have proposed a secure software development lifecycle. We have considered web as the application to identify the vulnerabilities and we have also implemented the security patches on a case study. Key words-Vulnerability, security, requirement phase, design phase, implementation phase, testing phase .maintenance phase —————————— —————————— Different researches in the field of software security are based 1. INTRODUCTION on either analysis of security at the phases of software development lifecycle or implementing security at particular stage14]. This is overcome in SOSDLC where analysis of Security is the prime concern of any project. Unfortunately in security is done only after it is implemented at each phase. the early days software projects were developed with requirement as the primary concern[1].
    [Show full text]
  • Attack Tree-Based Threat Risk Analysis
    Attack Tree-based Threat Risk Analysis by Terrance R Ingoldsby Amenaza Technologies Limited Copyright © 2009, 2010, 2013, 2021 Amenaza Technologies Limited – All Rights Reserved Amenaza®, SecurITree®, as well as the and symbols are registered trademarks of Amenaza Technologies Limited Amenaza Technologies Limited 406 – 917 85th St SW, m/s 125 Calgary, Alberta T3H 5Z9 Canada 1-888-949-9797 toll free US & Canada +01 403 263 7737 International E-mail: [email protected] Web: www.amenaza.com Last revised on January 27, 2021 (7:05pm) Copyright © 2021 Amenaza Technologies Limited Table of Contents Foreword by the Author . 1 Attack Tree-based Threat Risk Analysis. 1 Introduction.............................................................3 Basic Attack Tree Concepts . 5 Attack Tree Origins.................................................5 Prerequisites of an Attack . 6 Attack Tree Vulnerability Models . 6 Behavioral Indicators . 14 Pruning – Eliminating Attack Scenarios Based on Infeasibility. 17 Impacts...............................................................18 Attack Scenario Risk Requires Victim Impact . 18 Attack Scenario Probability and Attacker Psychology . 19 Objective Analysis of Subjective Human Traits. 20 Attacker Behavior . 20 Pain Factor – the Victim’s Perspective. 31 Scenario Risk Value . 32 Calculation of Juvenile Delinquent Risks for Two Attack Scenarios. 33 Relative Risk vs Cumulative Risk . 34 Scenarios Involving Both Intentional and Random Events . 42 Sub-root Analysis . 46 Heuristics for Reducing Combinatoric Growth of Scenario Space . 47 Countermeasures and Controls . 48 Countermeasure nodes . 51 Attack Graphs vs Attack Trees . 52 Conclusion ............................................................54 Appendix I – Basic Hostile Attack Risk Analysis Flowchart . 55 Glossary ..............................................................56 Copyright © 2021 Amenaza Technologies Limited i All Rights Reserved List of Figures Figure 1 – Goal Oriented Tree . 10 Figure 2 – Approaches to Burglarizing a House .
    [Show full text]
  • Validating Digital Forensic Evidence
    VALIDATING DIGITAL FORENSIC EVIDENCE A THESIS PRESENTED BY Karthikeyan Shanmugam SEPTEMBER 2011 A thesis submitted in partial fulfilment of the requirements for the degree of Doctor of Philosophy Electronic and Computer Engineering School of Engineering, Design and Technology Brunel University Uxbridge UB8 3PH, UK 1 Dedication This work is dedicated to my parents T. Shanmugam and Mallika Shanmugam whom together made the required sacrifice to ensure that my siblings and I got university education and career. 2 BRUNEL UNIVERSITY VALIDATING FORENSIC EVIDENCE AN ANTI-FORENSIC APPROACH Declaration: I have read and I understand the Department's guidelines’ on plagiarism and cheating, and I certify that this submission fully complies with these guidelines. Student’s name: KARTHIKEYAN SHANMUGAM Signature of student: ii ABSTRACT This dissertation focuses on the forensic validation of computer evidence. It is a burgeoning field, by necessity, and there have been significant advances in the detection and gathering of evidence related to electronic crimes. What makes the computer forensics field similar to other forensic fields is that considerable emphasis is placed on the validity of the digital evidence. It is not just the methods used to collect the evidence that is a concern. What is also a problem is that perpetrators of digital crimes may be engaged in what is called anti-forensics. Digital forensic evidence techniques are deliberately thwarted and corrupted by those under investigation. In traditional forensics the link between evidence and perpetrator's actions is often straightforward: a fingerprint on an object indicates that someone has touched the object. Anti-forensic activity would be the equivalent of having the ability to change the nature of the fingerprint before, or during the investigation, thus making the forensic evidence collected invalid or less reliable.
    [Show full text]