SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
International Journal of Cyber-Security and Digital Forensics (IJCSDF)
-
RATIONALE AND DESIGN OF THE ACCESS SPECIFICATION LANGUAGE RASP
In this paper we describe the formal specification language RASP for expressing fine-grained access control constraints in information systems. The design of the language is motivated by a number of ...Authors: Mark Evered
Year Published: 2012 | 1-14 | IJCSDF | Vol. 1 No. 1 -
APPLICATION OF NEW CLASSES OF MERSENNE PRIMES FOR FAST MODULAR REDUCTION FOR LARGE-INTEGER MULTIPLICATION
This paper attempts to speed-up the modular reduction as an independent step of modular multiplication, which is the central operation in public-key cryptosystems. Based on the properties of Mersenne ...Authors: Suhas Sreehari, Huapeng Wu, Majid Ahmadi
Year Published: 2012 | 15-19 | IJCSDF | Vol. 1 No. 1 -
FEATURE FUSION APPROACH ON KEYSTROKE DYNAMICS EFFICIENCY ENHANCEMENT
In this paper we study the performance and effect of diverse keystroke feature combinations on keystroke dynamics authentication system by using fusion approach. First of all, four types of keystroke ...Authors: Pin Shen Teh, Shigang Yue, Andrew B.J. Teoh
Year Published: 2012 | 20-31 | IJCSDF | Vol. 1 No. 1 -
SECURE MODEL FOR VIRTUALIZATION LAYER IN CLOUD INFRASTRUCTURE
cloud security is one of the buzz words in cloud computing. Since virtualization is the fundamental of the cloud computing, needs to study it more deeply to avoid attacks and system failure. In this ...Authors: Sina Manavi, Sadra Mohammadalian, Nur Izura Udzir, Azizol Abdullah
Year Published: 2012 | 32-40 | IJCSDF | Vol. 1 No. 1 -
PRIVACY IN MEDICAL DATA PUBLISHING
Privacy in data publishing concerns itself with the problem of releasing data to enable its study and analysis while protecting the privacy of the people or the subjects whose data is being released. ...Authors: Lila Ghemri, Raji Kannah
Year Published: 2012 | 41-49 | IJCSDF | Vol. 1 No. 1 -
GAME THEORY: TRUST MODEL FOR COMMON CRITERIA CERTIFICATIONS & EVALUATIONS
International standard and certification play major role in product distributions and marketing activities. To be well accepted in global market, all IT products and services require international ...Authors: Mohd Anuar Mat Isa, Jamalul-lail Ab Manan, Ramlan Mahmod, Habibah Hashim, Nur Izura Udzir, Ali Dehghan Tanha, Mar Yah Said
Year Published: 2012 | 50-58 | IJCSDF | Vol. 1 No. 1 -
GENETIC ALGORITHM APPROACH FOR RISK REDUCTION OF INFORMATION SECURITY
Nowadays, information systems constitute a crucial part of organizations; by losing security, these organizations will lose plenty of competitive advantages as well. The core point of information ...Authors: Alireza Tamjidyamcholo, Rawaa Dawoud Al-Dabbagh
Year Published: 2012 | 59-66 | IJCSDF | Vol. 1 No. 1 -
RESPONDING TO IDENTITY CRIME ON THE INTERNET
This paper discusses the unique challenges of responding to identity crime. Identity crime involves the use of personal identification information to perpetrate crimes. As such, identity crime ...Authors: Eric Holm
Year Published: 2012 | 67-74 | IJCSDF | Vol. 1 No. 2 -
AUTHENTICATING DEVICES IN UBIQUITOUS COMPUTING ENVIRONMENT
The deficient of a good authentication protocol in a ubiquitous application environment has made it a good target for adversaries. As a result, all the devices which are participating in such ...Authors: Kamarularifin Abd Jalil, Qatrunnada Binti Abdul Rahman
Year Published: 2012 | 75-81 | IJCSDF | Vol. 1 No. 2 -
AN IMAGE ENCRYPTION METHOD: SD-ADVANCED IMAGE ENCRYPTION STANDARD: SD-AIES
The security of digital information in modern times is one of the most important factors to keep in mind. For this reason, in this paper, the author has proposed a new standard method of image ...Authors: Somdip Dey
Year Published: 2012 | 82-88 | IJCSDF | Vol. 1 No. 2 -
MEASURING SECURITY OF WEB SERVICES IN REQUIREMENT ENGINEERING PHASE
Addressing security in early stages of web service development has always been a major engineering trend. However, to assure security of web services it is required to perform security evaluation in ...Authors: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman, Mohammad Moein Almasi
Year Published: 2012 | 89-98 | IJCSDF | Vol. 1 No. 2 -
POWER AMOUNT ANALYSIS: AN EFFICIENT MEANS TO REVEAL THE SECRETS IN CRYPTOSYSTEMS
In this paper we propose a novel approach to reveal the information leakage of cryptosystems by means of a side-channel analysis of their power consumption. We therefore introduce first a ...Authors: Qizhi Tian, Sorin A. Huss
Year Published: 2012 | 99-114 | IJCSDF | Vol. 1 No. 2 -
CERTIFICATE REVOCATION MANAGEMENT IN VANET
Vehicular Ad hoc Network security is one of the hottest topics of research in the field of network security. One of the ultimate goals in the design of such networking is to ...Authors: Ghassan Samara
Year Published: 2012 | 115-121 | IJCSDF | Vol. 1 No. 2 -
FINITE FIELD ARITHMETIC ARCHITECTURE BASED ON CELLULAR ARRAY
Recently, various finite field arithmetic structures are introduced for VLSI circuit implementation on cryptosystems and error correcting codes. In this study, we present an ...Authors: Kee-Won Kim, Jun-Cheol Jeon
Year Published: 2012 | 122-129 | IJCSDF | Vol. 1 No. 2 -
AN AIS INSPIRED ALERT REDUCTION MODEL
One of the most important topics in the field of intrusion detection systems is to find a solution to reduce the overwhelming alerts generated by IDSs in the network. Inspired by ...Authors: Mohammad Mahboubian, Nur Izura Udzir, Shamala Subramaniam, Nor Asila Wati Abdul Hamid
Year Published: 2012 | 130-139 | IJCSDF | Vol. 1 No. 2 -
TRUST MEASUREMENTS YELD DISTRIBUTED DECISION SUPPORT IN CLOUD COMPUTING
This paper proposes the creation of a trust model to ensure the reliable files exchange between the users of a private cloud. To validate the proposed model, a simulation environment with the tool ...Authors: Edna Dias Canedo, Rafael Timóteo de Sousa Junior, Rhandy Rafhael de Carvalho and Robson de Oliveira Albuquerque
Year Published: 2012 | 140-151 | IJCSDF | Vol. 1 No. 2 -
A FORMAL SEMANTIC MODEL FOR THE ACCESS SPECIFICATION LANGUAGE RASP
The access specification language RASP extends traditional role-based access control (RBAC) concepts to provide greater expressive power often required for fine-grained access control in ...Authors: Mark Evered
Year Published: 2012 | 152-159 | IJCSDF | Vol. 1 No. 2 -
A NEW SHIFTCOLUMN TRANSFORMATION: AN ENHANCEMENT OF RIJNDAEL KEY SCHEDULING
In this paper, we proposed a new approach for key scheduling algorithm which is an enhancement of the Rijndael key scheduling. This proposed algorithm was developed to improve ...Authors: Salasiah Sulaiman, Zaiton Muda, Julia Juremi, Ramlan Mahmod, Sharifah Md. Yasin
Year Published: 2012 | 160-166 | IJCSDF | Vol. 1 No. 3 -
SOPHISTICATION TECHNIQUES OF FOURTH GENERATIONS IN NEOTERIC MOBILE LTE AND LTE-ADVANCED
Long Term Evolution (LTE-Advanced) is a preliminary mobile communication standard formally submitted as a candidate for 4G systems to the ITU-T. LTE-A is being standardized by the ...Authors: A. Z. Yonis, M. F. L. Abdullah
Year Published: 2012 | 167-176 | IJCSDF | Vol. 1 No. 3 -
EFFICIENT FOREGROUND EXTRACTION BASED ON OPTICAL FLOW AND SMED FOR ROAD TRAFFIC ANALYSIS
Foreground detection is a key procedure in video analysis such as object detection and tracking. Several foreground detection techniques and edge detectors have been developed until ...Authors: K SuganyaDevi, N Malmurugan, R Sivakumar
Year Published: 2012 | 177-182 | IJCSDF | Vol. 1 No. 3 -
ENHANCING ADVANCED ENCRYPTION STANDARD S-BOX GENERATION BASED ON ROUND KEY
This paper presents a new AES-like design for key- dependent AES using S-box rotation. The algorithm involves key expansion algorithm together with S-box rotation and this ...Authors: Julia Juremi, Ramlan Mahmod, Salasiah Sulaiman, Jazrin Ramli
Year Published: 2012 | 183-188 | IJCSDF | Vol. 1 No. 3 -
RUNTIME MONITORING TECHNIQUE TO HANDLE TAUTOLOGY BASED SQL INJECTION ATTACKS
Software systems, like web applications, are often used to provide reliable online services such as banking, shopping, social networking, etc., to users. The increasing use of such systems ...Authors: Ramya Dharam, Sajjan G. Shiva
Year Published: 2012 | 189-203 | IJCSDF | Vol. 1 No. 3 -
MITIGATING MAN-IN-THE-BROWSER ATTACKS WITH HARDWARE-BASED AUTHENTICATION SCHEME
Lack of security awareness amongst end users when dealing with online banking and electronic commerce leave many client side application vulnerabilities open. Thus, this is enables ...Authors: Fazli Bin Mat Nor, Kamarularifin Abd Jalil, Jamalul-lail Ab Manan
Year Published: 2012 | 204-210 | IJCSDF | Vol. 1 No. 3 -
SECURITY MEASUREMENT BASED ON GQM TO IMPROVE APPLICATION SECURITY DURING REQUIREMENTS STAGE
Developing secure web applications that can withstand malicious attacks requires a careful injection of security considerations into early stages of development lifecycle. Assessing security at ...Authors: Ala A. Abdulrazeg, Norita Md Norwawi, Nurlida Basir
Year Published: 2012 | 211-220 | IJCSDF | Vol. 1 No. 3 -
AMALGAMATION OF CYCLIC BIT OPERATION IN SD-EI IMAGE ENCRYPTION METHOD: AN ADVANCED VERSION OF SD-EI METHOD: SD-EI VER-2
In this paper, the author presents an advanced version of image encryption technique, which is itself an upgraded version of SD-EI image encryption method. In this new method, ...Authors: Somdip Dey
Year Published: 2012 | 221-225 | IJCSDF | Vol. 1 No. 3 -
DATA LEAK, CRITICAL INFORMATION INFRASTRUCTURE AND THE LEGAL OPTIONS: WHAT DOES WIKILEAKS TEACH US?
The massive data leaks by Wikileaks suggest how fragile a national security is from the perspective of information system and network sustainability. What Wikileaks have done and ...Authors: Ida Madieha Abdul Ghani Azmi, Sonny Zulhuda, Sigit Puspito Wigati Jarot
Year Published: 2012 | 226-231 | IJCSDF | Vol. 1 No. 3 -
THE RIGHT TO CONSENT AND CONTROL PERSONAL INFORMATION PROCESSING IN CYBERSPACE
Consumer concerns over the safety of their personal information and the violation of their privacy rights are described as being the single overwhelming barrier to rapid growth of e- ...Authors: Thilla Rajaretnam
Year Published: 2012 | 232-240 | IJCSDF | Vol. 1 No. 3 -
THE PROBLEM TO CONSENT TO THE COLLECTION, USE, AND DISCLOSURE OF PERSONAL INFORMATION IN CYBERSPACE
Consumer concerns over the safety of their personal information and the violation of their privacy rights are described as being the single overwhelming barrier to rapid growth of ...Authors: Thilla Rajaretnam
Year Published: 2012 | 241-247 | IJCSDF | Vol. 1 No. 3 -
TOWARDS QUANTITATIVE MEASURES OF INFORMATION SECURITY: A CLOUD COMPUTING CASE STUDY
Cloud computing is a prospering technology that most organizations consider as a cost effective strategy to manage Information Technology (IT). It delivers computing services as a ...Authors: Mouna Jouini, Anis Ben Aissa, Latifa Ben Arfa Rabai, Ali Mili
Year Published: 2012 | 248-262 | IJCSDF | Vol. 1 No. 3 -
SECURE NETWORK COMMUNICATION BASED ON TEXT-TO-IMAGE ENCRYPTION
Security becomes an important issue when secure or sensitive information is sent over a network where all computers are connected together. In such a network a computer is recognized by its ...Authors: Ahmad Abusukhon, Mohamad Talib, Issa Ottoum
Year Published: 2012 | 263-271 | IJCSDF | Vol. 1 No. 4 -
AN ANALYSIS OF BASE STATION LOCATION ACCURACY WITHIN MOBILE-CELLULAR NETWORKS
An important feature within a mobile-cellular net- work is that the location of a cellphone can be determined. As long as the cellphone is powered on, the location of the cellphone can always be ...Authors: Liam Smit, Adrie Stander, Jacques Ophoff
Year Published: 2012 | 272-279 | IJCSDF | Vol. 1 No. 4 -
TECHNICAL SECURITY METRICS MODEL IN COMPLIANCE WITH ISO/IEC 27001 STANDARD
Technical security metrics provide measurements in ensuring the effectiveness of technical security controls or technology devices/objects that are used in protecting the information systems. ...Authors: M. Azuwa, Rabiah Ahmad, Shahrin Sahib, Solahuddin Shamsuddin
Year Published: 2012 | 280-288 | IJCSDF | Vol. 1 No. 4 -
TRUSTED DOCUMENT SIGNING BASED ON USE OF BIOMETRIC (FACE) KEYS
An online secured document exchange, secured bank transactions, and other e- commerce requirements need to be protected in commercial environment as it becomes big,. Digital signature ...Authors: Ahmed Elmadani
Year Published: 2012 | 289-296 | IJCSDF | Vol. 1 No. 4 -
A COMPARATIVE STUDY OF THE PERCEPTIONS OF END USERS IN THE EASTERN, WESTERN, CENTRAL, SOUTHERN AND NORTHERN REGIONS OF SAUDI ARABIA ABOUT EMAIL SPAM AND DEALING WITH IT
This paper presents the results of a survey of email users in different regions of Saudi Arabia about email SPAM. The survey investigated the nature of email SPAM, how email users in the ...Authors: Hasan Alkahtani, Robert Goodwin, Paul Gardner-Stephen
Year Published: 2012 | 297-310 | IJCSDF | Vol. 1 No. 4 -
A SURVEY ON PRIVACY ISSUES IN DIGITAL FORENSICS
Privacy issues have always been a major concern in computer forensics and security and in case of any investigation whether it is pertaining to computer or not always privacy issues appear. To enable ...Authors: Asou Aminnezhad, Ali Dehghantanha, Mohd Taufik Abdullah
Year Published: 2012 | 311-323 | IJCSDF | Vol. 1 No. 4 -
MODELLING BASED APPROACH FOR RECONSTRUCTING EVIDENCE OF VOIP MALICIOUS ATTACKS
Voice over Internet Protocol (VoIP) is a new communication technology that uses internet protocol in providing phone services. VoIP provides various forms of benefits such as low monthly fee and ...Authors: Mohammed Ibrahim, Mohd Taufik Abdullah, Ali Dehghantanha
Year Published: 2012 | 324-340 | IJCSDF | Vol. 1 No. 4 -
EPSILON2: UTILIZING NETWORK VIRTUALIZATION TO SIMULATE AN INFORMATION SECURITY TESTING ENVIRONMENT
Epsilon2 is based off the old Epsilon system but is built from the ground up using newer technologies. It utilizes the KVM hypervisor together with libvirt to virtualize physical networks in order to ...Authors: Lin G. De Luna, Patrick Kevin G. Detera, Samuel David F. Guerrero, Hiro R. Mejia, Miguel Alberto N. Gomez
Year Published: 2013 | 1-8 | IJCSDF | Vol. 2 No. 1 -
COMPUTER FORENSICS BETWEEN THE ITALIAN LEGISLATION AND PRAGMATIC QUESTIONS
Over the last few years, analysing a computer or a digital device has become a necessity in the field of criminal investigations. However, during the forensic analysis, some ordinary mistakes are ...Authors: Gianni Fenu, Fabrizio Solinas
Year Published: 2013 | 9-24 | IJCSDF | Vol. 2 No. 1 -
AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM WITH NETWORK ATTACK DETECTION CAPABILITIES (PANCAKES)
Signature-based Intrusion Detection System (IDS) helps in maintaining the integrity of data in a network controlled environment. Unfortunately, this type of IDS depends on predetermined intrusion ...Authors: Frances Bernadette C. De Ocampo, Trisha Mari L. Del Castillo, Miguel Alberto N. Gomez
Year Published: 2013 | 25-35 | IJCSDF | Vol. 2 No. 1 -
A FRAMEWORK FOR GOOD CORPORATE GOVERNANCE AND ORGANISATIONAL LEARNING – AN EMPIRICAL STUDY
The importance of applying good governance principles has grown over the past decade and many studies have been performed to investigate the role and impact of such principles. One of the ...Authors: WD Kearney, HA Kruger
Year Published: 2013 | 36-47 | IJCSDF | Vol. 2 No. 1 -
PROPOSAL AND ITS EVALUATION OF A SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD:SECRET TAP WITH DOUBLE SHIFT
Recently, mobile terminals such as smartphones have come into widespread use. Most of such mobile terminals store several types of important data, such as personal information. Therefore, it is ...Authors: Yoshihiro Kita, Fumio Sugai, MiRang Park, Naonobu Okazaki
Year Published: 2013 | 48-55 | IJCSDF | Vol. 2 No. 1 -
A DRM SCHEME USING FILE PHYSICAL INFORMATION
A digital file has both the content and physical information, however the latter was not fully made use of in previous digital rights management (DRM) systems. This paper introduces the idea of ...Authors: Cheng Qu, Yinyan Yu, Zhi Tang, Xiaoyu Cui
Year Published: 2013 | 56-69 | IJCSDF | Vol. 2 No. 1 -
A PRIVACY-PRESERVING APPROACH FOR COLLECTING EVIDENCE IN FORENSIC INVESTIGATION
Capturing digital evidence is crucial for counteracting against computer and cyber crimes. The technique of cloning the whole harddisk (for single PC) for investigation is not feasible in large ...Authors: Shuhui Hou, Siu-Ming Yiuy, Tetsutaro Ueharaz, Ryoichi Sasakix
Year Published: 2013 | 70-78 | IJCSDF | Vol. 2 No. 1 -
INVESTIGATING THE NUMBER OF USERS AND MONTHS TO MAKE TULUNGAN EFFECTIVE AGAINST SELF-PROMOTING USERS
Tulungan is a reputation system for collaborative web filtering that is both consensus-independent and self-promoting resistant. Simulation results show that Tulungan requires less than 50% good ...Authors: Alexis V. Pantola, Susan Pancho-Festin, Florante Salvador
Year Published: 2013 | 79-87 | IJCSDF | Vol. 2 No. 1 -
PRODUCT PIRACY PREVENTION: PRODUCT COUNTERFEIT DETECTION WITHOUT SECURITY LABELS
Counterfeiting is a challenge to companies, customers and markets all over the world. Besides the economic damage which affects in particular the companies and countries that use advanced production ...Authors: Christian Horn, Matthias Blankenburg, Maximilian Fechteler, Jorg Kruger
Year Published: 2013 | 88-102 | IJCSDF | Vol. 2 No. 1 -
AUTOMATING THE GENERATION OF FAKE DOCUMENTS TO DETECT NETWORK INTRUDERS
This paper introduces two concepts: Canary Files and a Canary File management system. A Canary File is a fake computer document that is placed amongst real documents in order to aid in the early ...Authors: Ben Whitham
Year Published: 2013 | 103-118 | IJCSDF | Vol. 2 No. 1 -
AN AUTOMATED MALWARE DETECTION SYSTEM FOR ANDROID USING BEHAVIOR-BASED ANALYSIS AMDA
The Android platform is the fastest growing market in smartphone operating systems to date. As such, it has become the most viable target of security threats. The reliance of the Android Market ...Authors: Kevin Joshua Abela, Don Kristopher Angeles, Jan Raynier Delas Alas, Robert Joseph Tolentino, Miguel Alberto Gomez
Year Published: 2013 | 1-11 | IJCSDF | Vol. 2 No. 2 -
ON ENHANCING DATA UTILITY IN K-ANONYMIZATION FOR DATA WITHOUT HIERARCHICAL TAXONOMIES
K-anonymity is the model that is widely used to protect the privacy of individuals in publishing micro-data. It could be defined as clustering with constrain of minimum k tuples in each group. ...Authors: Mohammad Rasool Sarrafi Aghdam, Noboru Sonehara
Year Published: 2013 | 12-22 | IJCSDF | Vol. 2 No. 2 -
THE MEAN FAILURE COST CYBERSECURITY MODEL TOWARD SECURITY MEASURES AND ASSOCIATED MECHANISMS
This paper presents results of the quantification of security threats of e-learning system using an economic measure abridged by MFC (Mean Failure Cost). We study means to optimize this measure and ...Authors: Neila Rjaibi, Latifa Ben Arfa Rabai, Anis Ben Aissa
Year Published: 2013 | 23-35 | IJCSDF | Vol. 2 No. 2 -
DOMAIN INFORMATION BASED BLACKLISTING METHOD FOR THE DETECTION OF MALICIOUS WEBPAGES
Malicious web pages that host drive by download exploits have become a popular means by which an attacker delivers malicious contents to computers across the internet. The popularity of the attack ...Authors: Ralph Edem Agbefu, Yoshiaki Hori, Kouichi Sakurai
Year Published: 2013 | 36-47 | IJCSDF | Vol. 2 No. 2 -
DIGITAL FORENSIC TRENDS AND FUTURE
Nowadays, rapid evolution of computers and mobile phones has caused these devices to be used in criminal activities. Providing appropriate and sufficient security measures is a difficult job due to ...Authors: Farhood Norouzizadeh Dezfoli, Ali Dehghantanha, Ramlan Mahmoud, Nor Fazlida Binti Mohd Sani, Farid Daryabar
Year Published: 2013 | 48-76 | IJCSDF | Vol. 2 No. 2 -
A REVIEW ON IMPACTS OF CLOUD COMPUTING ON DIGITAL FORENSICS
Nowadays, digital storage of computer data is moving toward cloud computing which is a set of infrastructure provides data storage for organizations and individuals. Due to this large scale, in case ...Authors: Farid Daryabar, Ali Dehghantanha, Nur Izura Udzir, Nor Fazlida binti Mohd Sani, Solahuddin bin Shamsuddin
Year Published: 2013 | 77-94 | IJCSDF | Vol. 2 No. 2 -
ASSESSING DATABASE AND NETWORK THREATS IN TRADITIONAL AND CLOUD COMPUTING
Cloud Computing is currently one of the most widely-spoken terms in IT. While it offers a range of technological and financial benefits, its wide acceptance by organizations is not yet wide spread. ...Authors: Katerina Lourida, Antonis Mouhtaropoulos, Alex Vakaloudis
Year Published: 2013 | 1-17 | IJCSDF | Vol. 2 No. 3 -
An Authentication Middleware for Prevention of Information Theft
Information theft or data leakage is a growing concern for companies as well as individual users. Intruders can easily copy huge amount of confidential data using hand-held devices such as USB flash ...Authors: S. Kami Makki, Md. Sadekur Rahman
Year Published: 2013 | 18-26 | IJCSDF | Vol. 2 No. 3 -
The Improved 32nd-Order Differential Attack on 8 Rounds of MISTY2 without FL Functions
We study the 32nd-order differential attack on 8 rounds of MISTY2 without FL functions. MISTY2 is a 64-bit block cipher with a 128-bit secret key proposed by Matsui of Mitsubishi Electric Corp. in ...Authors: Yasutaka Igarashi, Toshinobu Kaneko, Yutaka Eguchi, Takahiro Murai, Ryutaro
Year Published: 2013 | 27-34 | IJCSDF | Vol. 2 No. 3 -
A Detailed Strategy for Managing Corporation Cyber War Security
Modern corporations depend heavily on information and communication technologies and are becoming increasingly interconnected locally and internationally. This interconnectedness and dependency on ...Authors: Walid Al-Ahmad
Year Published: 2013 | 1-9 | IJCSDF | Vol. 2 No. 4 -
A SURVEY ON MALWARE PROPAGATION, ANALYSIS, AND DETECTION
Lately, a new kind of war takes place between the security community and malicious software developers, the security specialists use all possible techniques, methods and strategies to stop and remove ...Authors: Mohsen Damshenas, Ali Dehghantanha, Ramlan Mahmoud
Year Published: 2013 | 10-29 | IJCSDF | Vol. 2 No. 4 -
Detecting Hidden Encrypted Volume Files via Statistical Analysis
Nowadays various software tools have been developed for the purpose of creating encrypted volume files. Many of those tools are open source and freely available on the internet. Because of that, the ...Authors: Mario Piccinelli, Paolo Gubian
Year Published: 2014 | 30-37 | IJCSDF | Vol. 3 No. 1 -
Detection and Protection Against Intrusions on Smart Grid Systems
The wide area monitoring of power systems is implemented at a central control center to coordinate the actions of local controllers. Phasor measurement units (PMUs) are used for the collection of ...Authors: Ata Arvani, Vittal S. Rao
Year Published: 2014 | 38-48 | IJCSDF | Vol. 3 No. 1 -
CC-Case as an Integrated Method of Security Analysis and Assurance over Life-cycle Process
Secure system design faces many risks such as information leakage and denial of service. We propose a method named CC-Case to describe se-curity assurance cases based on the security struc-tures and ...Authors: Tomoko Kaneko, Shuichiro Yamamoto and Hidehiko Tanaka
Year Published: 2014 | 49-62 | IJCSDF | Vol. 3 No. 1 -
An Adaptive Steganographic Method in Frequency Domain Based on Statistical Metrics of Image
Steganography is a branch of information hiding. A tradeoff between the hiding payload and quality of digital image steganographic schemes is major challenge of the steganographic methods. An ...Authors: Seyyed Amin Seyyedi, Nick Ivanov
Year Published: 2014 | 63-71 | IJCSDF | Vol. 3 No. 1 -
Behind Identity Theft and Fraud in Cyberspace: The Current Landscape of Phishing Vectors
Increased consumer anti-phishing awareness and improved anti-spam technologies has gradually reduced the impact of traditional phishing spams in recent years. To keep up their game in a multi-billion ...Authors: Thomas Nagunwa
Year Published: 2014 | 72-83 | IJCSDF | Vol. 3 No. 1 -
Comprehensive Solution to Mitigate the Cyber-attacks in Cloud Computing
Cloud computing is a web based utility model. Cybercrimes effecting web based system are equally applicable in the cloud computing. Considering the sensitivity and the damage that can be caused by ...Authors: Jitendra Singh
Year Published: 2014 | 84-92 | IJCSDF | Vol. 3 No. 2 -
Security and Integrity of Data in Cloud Computing Based on Feature Extraction of Handwriting Signature
Cloud Computing gains users to store their data into the cloud as the remotest manner so that they can be comforted from the trouble of local data save and maintenance. The user loses the control of ...Authors: Ali A. Yassin, Hikmat Z. Neima and Haider Sh. Hashim
Year Published: 2014 | 93-105 | IJCSDF | Vol. 3 No. 2 -
Improvising the Input Process of Traceability Model for Digital Forensic Investigation
In this paper, we present an enhancement input in the traceability model of digital forensic investigation. Plus, we present a literature review about existing traceability models. Furthermore, the ...Authors: Iman Ahmeid Mohamed, Azizah Bt Abdul Manaf
Year Published: 2014 | 106-110 | IJCSDF | Vol. 3 No. 2 -
Software Stream Cipher based on pGSSG Generator
Secrecy of a software stream cipher based on p-ary Generalized Self-Shrinking Generator (pGSSG) is examined in this paper. Background information for the generator’s algorithm is provided. The ...Authors: Antoniya Tasheva, Zhaneta Tasheva and Ognyan Nakov
Year Published: 2014 | 111-121 | IJCSDF | Vol. 3 No. 2 -
The Consequences of State-Level Intrusions: A Risk Worth Taking?
Over the years states have intruded the cyberspace of other states. Does the offending state consider the consequences it may face for the intrusion under international law and/or at international ...Authors: Murdoch Watney
Year Published: 2014 | 122-129 | IJCSDF | Vol. 3 No. 2 -
Performance Measurement for Mobile Forensic Data Acquisition in Firefox OS
Mozilla Corporation has recently released a Linux-based open source operating system, namely Firefox OS. The arrival of this Firefox OS has created new challenges, concentrations and opportunities ...Authors: Mohd Najwadi Yusoff, Ramlan Mahmod, Mohd Taufik Abdullah and Ali Dehghantanha
Year Published: 2014 | 130-140 | IJCSDF | Vol. 3 No. 3 -
The Significance of Mandatory Data Breach Warnings to Identity Crime
The relationship between data breaches and identity crime has been scarcely explored in current literature. However, there is an important relationship between the misuse of personal identification ...Authors: Eric Holm, Geraldine Mackenzie
Year Published: 2014 | 141-152 | IJCSDF | Vol. 3 No. 3 -
Composite Heuristic Algorithm for Clustering Text Data Sets
Document clustering has become a frequent task in business. Current topic modeling and clustering algorithms can handle this task, but there are some ways to improve the quality of ...Authors: Nikita Nikitinsky, Tamara Sokolova, Ekaterina Pshehotskaya
Year Published: 2014 | 153-162 | IJCSDF | Vol. 3 No. 3 -
Enhanced Mobile Authentication Techniques
Milenage algorithm applies the block cipher Rijnadael (AES) with 128 bit key and 128 bit block size. This algorithm is used in the 3GPP authentication and key generation functions (f1, ...Authors: Zakaria Zakaria Hassan, Talaat A. Elgarf, Abdelhalim Zekry
Year Published: 2014 | 163-169 | IJCSDF | Vol. 3 No. 3 -
Forensic Evidence of Copyright Infringement by Digital Audio Sampling Analysis - Identification – Marking
In recent years, the number of attempts to use digital audio and video evidence in litigation in civil and criminal proceedings has increased. Technical progress makes editing and changing music, ...Authors: Stefan Braun
Year Published: 2014 | 170-182 | IJCSDF | Vol. 3 No. 3 -
Advances of Mobile Forensic Procedures in Firefox OS
The advancement of smartphone technology has attracted many companies in developing mobile operating system (OS). Mozilla Corporation recently released Linux-based open source mobile OS, named ...Authors: Mohd Najwadi Yusoff, Ramlan Mahmod, Ali Dehghantanha, Mohd Taufik Abdullah
Year Published: 2014 | 183-199 | IJCSDF | Vol. 3 No. 4 -
Alarming! Security Aspects of the Wireless Vehicle: Review
The auto-mobile industry has grown to become an integral part of our day – to – day life. The introduction of wireless vehicles definitely have to pass through the analysis of potential security ...Authors: Sabarathinam Chockalingam, Harjinder Singh Lallie
Year Published: 2014 | 200-208 | IJCSDF | Vol. 3 No. 4 -
A Survey on Digital Forensics Trends
Digital forensic has evolved from addressing minor computer crimes to investigation of complex international cases with massive effect on the world. This paper studies the evolution of the digital ...Authors: Ali Dehghantanha, Mohsen Damshenas, Ramlan Mahmoud
Year Published: 2014 | 209-234 | IJCSDF | Vol. 3 No. 4 -
e-Fraud Forensics Investigation Techniques with Formal Concept Analysis
One of the cardinal impacts of Cyber Security (CS) is the combating of financial e-fraud and other related crimes. Formal Concept Analysis (FCA) could serve as a great useful weapon in the detection ...Authors: WAZIRI Victor Onomza, Abdullahi Umar, MORUFU Olalere
Year Published: 2014 | 235-245 | IJCSDF | Vol. 3 No. 4 -
Security Breaches, Network Exploits and Vulnerabilities: A Conundrum and an Analysis
Enterprise systems are continuously on cyber-attacks as struggle for solutions are sort. Today, these organizations spend over $70 billion on IT security, but are unable to protect the organization ...Authors: Oredola A. Soluade, Emmanuel U Opara
Year Published: 2014 | 246-261 | IJCSDF | Vol. 3 No. 4 -
An Assessment of Corporate Security Policy Violations Using Live Forensics Analysis
Many more corporate entities today are utilizing ICTs to identify opportunities for innovative and customer-centric, value-added products and services. Indeed, information systems have been key ...Authors: Ezer Osei Yeboah-Boateng, Eric Bonnah Boadi
Year Published: 2015 | 262-271 | IJCSDF | Vol. 4 No. 1 -
BYOD NETWORK: Enhancing Security through Trust–Aided Access Control Mechanisms
The growth of mobile devices both in variety and in computational abilities have given birth to a concept in the corporate world known as Bring Your Own Device (BYOD). Under this concept, Employees ...Authors: Francis Nwebonyi Nwebonyi, Uchenna P. Daniel Ani
Year Published: 2015 | 272-289 | IJCSDF | Vol. 4 No. 1 -
A Framework for Effectiveness of Cyber Security Defenses, a case of the United Arab Emirates (UAE).
Cyberspace has become the new frontier for countries to demonstrate power. Nations that have developed defense tools or those that can successfully launch attacks against adversaries will become the ...Authors: Abdulla Al Neaimi, Tago Ranginya, Philip Lutaaya
Year Published: 2015 | 290-301 | IJCSDF | Vol. 4 No. 1 -
Online Handwritten Signature Recognition by Length Normalization using Up-Sampling and Down-Sampling
With the rapid advancement of capture devices like tablet or smart phone, there is a huge potential for online signature applications that are expected to occupy a large field of researches in ...Authors: Fahad Layth Malallah, Sharifah Mumtazah Syed Ahmad, Wan Azizun Wan Adnan, Olasimbo Ayodeji Arigbabu, Vahab Iranmanesh, Salman Yussof
Year Published: 2015 | 302-313 | IJCSDF | Vol. 4 No. 1 -
A Comparative Legal Analysis of Online Defamation in Malaysia, Singapore and the United Kingdom
The rapid development and emergence of various forms of Internet based publications, which include social networking sites (Facebook, Twitter etc), web logs (blogs), chat groups, newsgroups and many ...Authors: Khairun-Nisaa Asari, Nazli Ismail Nawang
Year Published: 2015 | 314-326 | IJCSDF | Vol. 4 No. 1 -
Development and Evaluation of a Continuity Operation Plan Support System for an Information Technology System
Because organizations need to be able to deliver products and services at acceptable predefined levels, even in the wake of disruptive incidents, the number of enterprises implementing business ...Authors: Ichiro Matsunaga, Ryoichi Sasaki
Year Published: 2015 | 327-338 | IJCSDF | Vol. 4 No. 2 -
Analysis of Slow Read DoS Attack and Countermeasures on Web servers
The ideas and techniques of DoS (Denial of Service) and DDoS (Distributed DoS) Attack strategies become more effective and more complex. In this paper, we focus on a Slow Read DoS Attack which is one ...Authors: Junhan Park, Keisuke Iwai, Hidema Tanaka and Takakazu Kurokawa
Year Published: 2015 | 339-353 | IJCSDF | Vol. 4 No. 2 -
Characterising File Sharing and its Protection, the Insider Threat Case
File sharing has become an indispensable part of our daily lives. Some of the shared files are sensitive, thus, their confidentially, integrity and availability should be protected. This paper ...Authors: Rakan Alsowail, Ian Mackie
Year Published: 2015 | 354-379 | IJCSDF | Vol. 4 No. 2 -
A Secure Non-Repudiable General Proxy Signature
A threshold proxy signature scheme allows any or more proxy signers to cooperatively sign messages on behalf of an original signer, but or fewer proxy signers cannot. In this paper, in order to adapt ...Authors: Samaneh Mashhadi, Maryam Abdi
Year Published: 2015 | 380-389 | IJCSDF | Vol. 4 No. 2 -
Anti-Forensics: A Practitioner Perspective
With the increase in cybercrime, digital evidence is becoming an integral part of the judicial system. Digital evidence is to be found everywhere from computers, to mobile phones, ATMs and ...Authors: Jean-Paul Van Belle, Richard de Beer, Adrie Stander
Year Published: 2015 | 390-403 | IJCSDF | Vol. 4 No. 2 -
Overconfidence: Personal Behaviors Regarding Privacy that Allows the Leakage of Information in Private Browsing Mode
A growing concern of users about confidentiality and privacy in web related tasks presses companies to present more secure solutions that respect the right to individual privacy. However, as some ...Authors: Rodrigo de S. Ruiz, Fernando Pompeo Amatte, Kil Jin Brandini Park D. Sc. , Rogério Winter
Year Published: 2015 | 404-416 | IJCSDF | Vol. 4 No. 3 -
A Method to Encrypt Information with DNA-Based Cryptography
DNA cryptography is a relatively new paradigm that has attracted great interest in the field of information security. Although there are many problems in DNA cryptography, scientists are trying to ...Authors: Mohammadreza Najaftorkaman, Nazanin Sadat Kazazi
Year Published: 2015 | 417-426 | IJCSDF | Vol. 4 No. 3 -
Using Decision Trees to Extract IDS Rules from Honeypot Data
It has been almost two decades since the first honeypot was proposed. Despite that, although there are several studies involving network traffic data, few are those ded-icated to extract knowledge ...Authors: Pedro Henrique Matheus da Costa Ferreira, Leandro Nunes de Castro
Year Published: 2015 | 427-441 | IJCSDF | Vol. 4 No. 3 -
A Proposal and Evaluation of User Centric Trusted Log Archival Architecture
Internet services of numerous types are widely implemented at countless sites in today’s worldwide computing environment, which is on-premises or cloud computing, and the generated system and ...Authors: Takashi Shitamichi, Ryoichi Sasaki
Year Published: 2015 | 442-452 | IJCSDF | Vol. 4 No. 3 -
Multimedia Implementations for SOHO Networks and Their Security Issues: Opening Pandora’s Box with Sonos and SonosNet
Multimedia devices for Small Office Home Office (SOHO) environments often use proprietary technologies but also a variety of commercially available technologies for their operation. Exploiting ...Authors: Stylianos Kavalaris, Emmanouil Serrelis
Year Published: 2015 | 453-468 | IJCSDF | Vol. 4 No. 3 -
Defending Against Android Malware that Uses Tor as Their Covert Communications Medium
The introduction of any new technology can pose various threats to the users of its applications. More specifically, the usage of the Tor network, has introduced a new malware paradigm that could ...Authors: Fragkiskos – Emmanouil Kioupakis, Emmanouil Serrelis
Year Published: 2015 | 469-481 | IJCSDF | Vol. 4 No. 4 -
Cyber Warfare Awareness in Lebanon: Exploratory Research
Many believe that the coming war is a cyber-war that revolves around cyber weapons; to many others, the world is already at the core of this war. Names like Stuxnet, Duqu, Gauss and Flame have become ...Authors: Hussin J. Hejase, Ale J. Hejase, Jose A. Hejase
Year Published: 2015 | 482-497 | IJCSDF | Vol. 4 No. 4 -
A Framework for Integrating Multimodal Biometrics with Digital Forensics
Multimodal biometrics represents various categories of morphological and intrinsic aspects with two or more computerized biological characteristics such as facial structure, retina, keystrokes ...Authors: Victor R. Kebande, Nickson M. Karie
Year Published: 2015 | 498-507 | IJCSDF | Vol. 4 No. 4 -
Complementing Blacklists: An Enhanced Technique to Learn Detection of Zero-Hour Phishing URLs
Increased phishing attacks despite existing anti-phishing tools suggests that the tools are not catching up with the attacks technically. Majority of the tools depend on blacklists which are way ...Authors: Thomas Nagunwa
Year Published: 2015 | 508-520 | IJCSDF | Vol. 4 No. 4 -
The Exploitation of Cyber Domain as Part of Warfare: Russo-Ukrainian War
Cyber warfare is a hot topic. The problem is that precedents are few. At the same time nation-states are strongly developing their cyber capabilities, cyber and physical worlds are increasingly ...Authors: Jarno Limnéll
Year Published: 2015 | 521-532 | IJCSDF | Vol. 4 No. 4 -
The Role of the Refrigerator in Identity Crime?
This paper explores how botnets in smart devices are exacerbating identity crime. This paper places the refrigerator at the heart of this discussion of the Internet of things that has become ...Authors: Eric Holm
Year Published: 2016 | 1-9 | IJCSDF | Vol. 5 No. 1 -
A Discrete Wavelet Transform Approach for Enhanced Security in Image Steganography
The magnitude of the growth in the Internet combined with the increase in technological innovations poses serious threats to the process of digital data transmission. The government, military, small ...Authors: Ashley S. Kelsey, Cajetan M. Akujuobi
Year Published: 2016 | 10-20 | IJCSDF | Vol. 5 No. 1 -
Cyber Operation Planning and Operational Design
Improving ICT infrastructure, dramatic increase in internet usage and increasing dependence on networks have carried with cyber risks and threats. Complex, shape shifting and emerging risks and ...Authors: Kerim Goztepe, Muhammer Karaman, Hayrettin Catalkaya, Ahmet Zeki Gerehan
Year Published: 2016 | 21-29 | IJCSDF | Vol. 5 No. 1 -
Enhancing AES using Novel Block Key Generation Algorithm and Key Dependent S-boxes
Security is one of the vital aspects of data communication, a wide acceptance of AES shows its superiority in providing confidentiality to secret information. Several algorithms have been proposed in ...Authors: Harpreet Singh, Paramvir Singh
Year Published: 2016 | 30-45 | IJCSDF | Vol. 5 No. 1 -
Text-Based Age and Gender Prediction for Online Safety Monitoring
This paper explores the capabilities of text-based age and gender prediction geared towards the application of detecting harmful content and conduct on social media. More specifically, we focus on ...Authors: Janneke van de Loo, Guy De Pauw, Walter Daelemans
Year Published: 2016 | 46-60 | IJCSDF | Vol. 5 No. 1 -
Identifying the Mechanisms of Information Security Incidents through Corporate Culture Variables and Sampling
Leakage of secret information has increasingly become a societal problem. Information leaks typically target specific organizations or persons, and a magnitude of risk involved in information ...Authors: Abdullah Almubark, Nobutoshi Hatanaka, Osamu Uchida, Yukiyo Ikeda
Year Published: 2016 | 61-74 | IJCSDF | Vol. 5 No. 2 -
Building Ontologies for Digital Forensic Terminologies
Digital forensics (DF) is a relatively new discipline with a lot of technical and non-technical terminologies that can be hard to comprehend. During a timeintensive digital forensic investigation ...Authors: Nickson M. Karie, Victor R. Kebande
Year Published: 2016 | 75-82 | IJCSDF | Vol. 5 No. 2 -
Performance Measures for Evaluating the Dynamic Authentication Techniques
Authentication is the process of verifying users’ credentials when access to secure IT systems. Today, most of the computer users rely on single factor static authentication. However, many severe ...Authors: Jing-Chiou Liou
Year Published: 2016 | 83-93 | IJCSDF | Vol. 5 No. 2 -
RegForensicTool: Evidence Collection and Analysis of Windows Registry
The Registry works as a configuration database, maintaining the information needed for the running of the Computer System. In addition to this, the Registry is a source of evidence against the cyber ...Authors: Dinesh N. Patil, Bandu B. Meshram
Year Published: 2016 | 94-105 | IJCSDF | Vol. 5 No. 2 -
Enhancing Performance of Intrusion Detection System Against KDD99 Dataset Using Evidence Theory
The rapid growth of internet and its related technology requires an efficient method to detect intrusion or attack in the network. Intrusion detection system is a system that detect an attack and ...Authors: Vrushank Shah, A. K. Aggarwal
Year Published: 2016 | 106-114 | IJCSDF | Vol. 5 No. 2 -
A Novel Taxonomy for Mobile Applications Data
Smartphones are used to perform various types of activities, such as sending emails, transferring money via mobile Internet banking, making calls, texting, web browsing, and playing games. Some of ...Authors: Saud Alotaibi, Steven Furnell, Nathan Clarke
Year Published: 2016 | 115-121 | IJCSDF | Vol. 5 No. 3 -
SBBox: A Tamper-Resistant Digital Archiving System
Reliable forensic data (kernel, socket, audit, other user defined data, etc.) is imperative when investigating cybercrimes. While static and dynamic forensic data collection techniques have already ...Authors: Monjur Alam, Zhe Cheng Lee, Chrysostomos Nicopoulos, Kyu Hyung Lee, Jongman Kim, Junghee Lee
Year Published: 2016 | 122-131 | IJCSDF | Vol. 5 No. 3 -
Enhancing the Security of Electronic Medical Records Using Forward Secure Secret Key Encryption Scheme
Electronic Medical Records (EMRs) pose a number of security challenges. Conventional cryptographic solutions have been used to protect the patients EMRs but with one major weakness; in an event where ...Authors: Kosmas Kapis, Edwin Kambo
Year Published: 2016 | 132-141 | IJCSDF | Vol. 5 No. 3 -
Phorecasting Phishing Attacks: A New Approach for Predicting the Appearance of Phishing Websites
Phishing is a multi-billion dollar business. The antiphishing industry continues to pursue new strategies to thwart and investigate phishing attacks. Detection strategies include algorithms to detect ...Authors: Brad Wardman, Dan Clemens, Joseph Wolnski
Year Published: 2016 | 142-154 | IJCSDF | Vol. 5 No. 3 -
Proposal and Evaluation of Method for Establishing Consensus on Combination of Measures Based on Cybersecurity Framework
Due to the development of our information society in recent years, the number of companies depending on IT systems has increased. However, it has been noticed that executives have not implemented ...Authors: Shota Fukushima, Ryoichi Sasaki
Year Published: 2016 | 155-165 | IJCSDF | Vol. 5 No. 3 -
Method for Detecting a Malicious Domain by using only Well-known Information
Damage caused by targeted attacks is a serious problem. It is not enough to prevent only the initial infections, because techniques for targeted attacks have become more sophisticated every year, ...Authors: Masahiro Kuyama, Yoshio Kakizaki, Ryoichi Sasaki
Year Published: 2016 | 166-174 | IJCSDF | Vol. 5 No. 4 -
Digital Forensic Analysis of Ubuntu File System
A file system of Ubuntu operating system can conserve and manage a lot of configuration information and the information with forensic importance. Mining and analyzing the useful data of the Ubuntu ...Authors: Dinesh N. Patil, Bandu B. Meshram
Year Published: 2016 | 175-186 | IJCSDF | Vol. 5 No. 4 -
A Preferential Analysis of Existing Password Managers from End-Users' View Point
Existing Password Managers which are generally classified into Desktop, Online and Mobile are used for enhancing security and handling memorability of passwords by different categories of users. ...Authors: S. Agholor, A. S. Sodiya, A. T. Akinwale, O. J. Adeniran and D. O. Aborisade
Year Published: 2016 | 187-196 | IJCSDF | Vol. 5 No. 4 -
Intrusion Detection System with Spectrum Quantification Analysis
Intrusion Detection System (IDS) is a countermeasure against network attacks. There are mainly two types of detections; signature-based and anomaly based. Signature-based IDS detects intrusion ...Authors: Yusuke Tsuge, Hidema Tanaka
Year Published: 2017 | 197-207 | IJCSDF | Vol. 5 No. 4 -
The Unwitting Danger Within - Detection, Investigation and Mitigation of a Compromised Network
The war on cyber security issues has exploded exponentially. Persistent attacks are on the rise routinely penetrating perimeter defenses and bypassing antivirus technologies to successfully launch ...Authors: Emmanuel U Opara, Oredola A. Soluade
Year Published: 2016 | 208-222 | IJCSDF | Vol. 5 No. 4 -
Cloud Computing Security and Forensics Issues and Awareness of Cloud Storage Users in Malaysia
Cloud storage services are widely getting acceptance and gaining popularity, since it is used mostly by companies and students in Malaysian higher learning institutions. While cloud storage services ...Authors: Yee Say Keat, Babak Bashari Rad, Mohammad Ahmadi
Year Published: 2017 | 1-13 | IJCSDF | Vol. 6 No. 1 -
HTTP Flood Mitigation Using Gateway Inspection and Second Chance Approach Analysis
Nowadays, Internet is the main standard for communication which is being used by quantity of users through the world. At the same time, its profitable nature is producing increasing exposure to ...Authors: Ismaila Idris, Ogidiagba Jones Tobi, Victor O. Waziri, John K. Alhassan, Ojeniyi Joseph
Year Published: 2017 | 14-22 | IJCSDF | Vol. 6 No. 1 -
Numerical and Statistical Analysis on Information Security Using R: Interoperability Perspective
Over the past two decades, information and communication technology (ICT) have gained enormous effect on social-business life more than ever. ICT has become increasingly important not only for life ...Authors: Kerim Goztepe
Year Published: 2017 | 23-34 | IJCSDF | Vol. 6 No. 1 -
Software Simulation of Variable Size Message Encryption Based RSA CryptoAlgorithm Using Ms. C#. NET
RSA Crypto-Algorithm is well-known and widely used public key cryptographic algorithm due to the prominent level of proven security which depends on the difficulty of large integer factorization ...Authors: Emmanuel U Opara, Oredola A. Soluade
Year Published: 2017 | 35-43 | IJCSDF | Vol. 6 No. 1 -
Compressed Sensing Video Streaming for Internet of Multimedia Things
Multimedia over the Internet of Things (IoT) is posing challenges and opportunities for multimedia transmission. An essential test for supporting interactive multimedia applications in the Internet ...Authors: Ahmed Elshafeey, Neamat S.Abd Elkader, M.zorkany
Year Published: 2017 | 44-53 | IJCSDF | Vol. 6 No. 1 -
The Communication Error Message: Managing Best Practice Ideas and the Cyber Threat. A Precursor to Communication Themes
This publication explores the phenomenon of communication through the contextual lens of cyberspace operations. Using the cyberspace category and characteristics approach (C3A), this preliminary ...Authors: Robert D. Boyd
Year Published: 2017 | 54-61 | IJCSDF | Vol. 6 No. 2 -
An Overview of Corporate Cybercrime in India and US
Cybercrime perpetrated by pockets of citizens is posing a serious threat to international security and economy. Recognizing the lack of any global cooperation on this issue, this paper provides a ...Authors: Tanya Syngle
Year Published: 2017 | 62-72 | IJCSDF | Vol. 6 No. 2 -
Onto-Engineering: A Conceptual framework for Integrating Requirement Engineering Process with scientifically tuned Digital Forensics Ontologies
A framework for integrating Requirement Engineering (RE) with scientifically tuned Digital Forensics Ontologies (SDFO) envisages a semantic web-driven approach that is able to provide a shared ...Authors: Victor R. Kebande, Lindiwe M. Maake, Nickson M. Karie
Year Published: 2017 | 73-83 | IJCSDF | Vol. 6 No. 2 -
An Analysis of Inadvertent Data Disclosure Incidents, 2005-2017
End-user error remains a very serious security problem. Inadvertent data disclosures account for a large percentage of end-user error. This article reports on a detailed analysis of the unintended ...Authors: John W. Coffey
Year Published: 2017 | 84-91 | IJCSDF | Vol. 6 No. 2 -
A Novel Framework for Secure E-Commerce Transactions
E-commerce is now a trend and a must in many business sectors. In line with this eCommerce trend, many businesses use the internet to transact their business and to share information among trading ...Authors: Kenneth L. Mlelwa, Zaipuna O. Yonah
Year Published: 2017 | 92-100 | IJCSDF | Vol. 6 No. 2 -
Manual Analysis Phase for (PIFPM): Platform Independent Forensics Process Model for Smartphones
In this paper, the Apple iPhone, HTC Aria, and HTC TouchPro 6850 was used in an effort to generate the average change in file content by device while applying XRYv6.1 and DiffMerge in Experiment 2. ...Authors: F. Chevonne Thomas Dancer
Year Published: 2017 | 101-108 | IJCSDF | Vol. 6 No. 3 -
Monitoring Government Web Portals in Cameroon
This research aims to analyse the most frequent vulnerabilities of Cameroonian governmental web portals and to suggest a suitable monitoring infrastructure. In fact, the technological evolution and ...Authors: Paul Dayang, Theodore Efoumena and Franklin Tchakounte
Year Published: 2017 | 109-120 | IJCSDF | Vol. 6 No. 3 -
Learning Maliciousness in Cybersecurity Graphs
Statistical relational learning is concerned with inferring patterns from data explicitly modeled as graphs. In this work, we present an approach to learning latent topological and attribute features ...Authors: Liz Maida, Connor Walsh, Akshay Rangamani, Sam Gottlieb
Year Published: 2017 | 121-125 | IJCSDF | Vol. 6 No. 3 -
Promoting cybersecurity awareness and resilience approaches, capabilities and actions plans against cybercrimes and frauds in Africa
The rapidly growing broadband internet and mobile applications penetration and uptake provide immense opportunities and challenges across Africa. There is an increasing concern to national and ...Authors: Ernest Tambo, Kazienga Adama
Year Published: 2017 | 126-138 | IJCSDF | Vol. 6 No. 3 -
An attempt toward Authorship Analysis of Obfuscated .NET Binaries
This research aims at identifying obfuscation resistant features of .NET binaries. This study is an attempt toward facilitating the authorship attribution of an unknown .NET executable. The primary ...Authors: Kamran Morovati
Year Published: 2017 | 139-154 | IJCSDF | Vol. 6 No. 3 -
A New Method of Image Steganography: StegBlender
This article presents a new method for hiding data within existing image data. The technique falls into the category of steganography, which is an approach of hiding data within other data sets. ...Authors: Richard C. Leinecker
Year Published: 2017 | 155-161 | IJCSDF | Vol. 6 No. 4 -
Enhancing AES with Time-Bound and Feedback Artificial Agent Algorithms for Security and Tracking of Multimedia Data on Transition
Unsecured information travelling over the network from a source to an intended destination are very vulnerable to cyber attacks. Millions of information have been hijacked and stolen across the globe ...Authors: A.O Isah, J.K Alhassan, S.S Olanrewaju, Enesi Femi Aminu
Year Published: 2017 | 162-178 | IJCSDF | Vol. 6 No. 4 -
Deception in Web Application Honeypots: Case of Glastopf
Honeypots are special tools designed to help track and understand attacker?s motives and their attack methods. In web applications, several honeypots have been developed and some have since been ...Authors: Banyatsang Mphago, Dimane Mpoeleng, Shedden Masupe
Year Published: 2017 | 179-185 | IJCSDF | Vol. 6 No. 4 -
Preserving Confidentiality and Privacy of Sensitive Data in e-Procurement System
With the inclusion of direct purchases by Government in e-Procurement System, several security agencies are joining it but they expect their sensitive data to remain hidden. So they expect such ...Authors: Rajesh Narang, Tanmay Narang
Year Published: 2017 | 186-197 | IJCSDF | Vol. 6 No. 4 -
Forensic Investigation Technique on Android’s Blackberry Messenger using NIST Framework
In the past few years, there has been a rapid increase in the number of smartphone users. this can be seen with various brands and platforms of smartphones that sold almost every week. One of ...Authors: Imam Riadi, Sunardi, Arizona Firdonsyah
Year Published: 2017 | 198-205 | IJCSDF | Vol. 6 No. 4 -
A Mathematical Model for Resolving Minimum Password Length Controversy
Information Security has become one of the most pressing issues facing businesses in today’s competitive e-commerce that is driven by online transactions. User authentication serves as the first ...Authors: S. Agholor, A. S. Sodiya and D. O. Aborisade
Year Published: 2018 | 1-9 | IJCSDF | Vol. 7 No. 1 -
Knowledge Management as a Strategic Asset in Digital Forensic Investigations
While conducting a Digital Forensic Investigation (DFI), detectives make use of specialised skills and knowledge to capture, manage and analyse enormous amounts of Potential Digital Evidence (PDE) ...Authors: Nickson M. Karie, Victor R. Kebande
Year Published: 2018 | 10-20 | IJCSDF | Vol. 7 No. 1 -
Cyber Autoimmune Disease When the Virtual Life Imitates the Real Life
Viruses are a major threat to the health of people because can trigger diseases. With regard to cybersecurity, viruses that attack computers and they are difficult problems to solve. Computer ...Authors: Rogério Winter, Rodrigo Ruiz
Year Published: 2018 | 21-30 | IJCSDF | Vol. 7 No. 1 -
Implication of Cyber Warfare on the Financial Sector. An Exploratory Study
The cyber domain is constantly evolving, providing both new opportunities and challenges for financial services institutions. The implication of cyber warfare on the financial sector is serious where ...Authors: Sohail Razi Khan
Year Published: 2018 | 31-37 | IJCSDF | Vol. 7 No. 1 -
Empirical Survey on Advances of Network Forensics in the Emerging Networks
In the modern world, where most of the population is connected to the internet via smart devices, the surface for committing crimes and being attacked by hackers have been increased drastically. ...Authors: A R Jayakrishnan, V. Vasanthi
Year Published: 2018 | 38-46 | IJCSDF | Vol. 7 No. 1 -
Critical Analysis of Hash Based Signature Schemes
Active work is being done to create and develop quantum computers. Traditional digital signature systems that are used in practice are vulnerable to quantum computers attacks. The security of these ...Authors: A. Gagnidze, M. Iavich, N. Inasaridze, G. Iashvili, V.Vyalkova
Year Published: 2018 | 47-55 | IJCSDF | Vol. 7 No. 1 -
Improvement the Wireless Network Security by Requiring the News Cryptographic Primitives
Wireless network is an efficient solution involving a robust security equivalent to wired network when strong encrypton and mutual authentications are used. It requires lightweight, dynamic and ...Authors: Younes ASIMI, Ahmed ASIMI, Zakariae TBATOU, Azidine GUEZZAZ and Yassine SADQI
Year Published: 2018 | 56-62 | IJCSDF | Vol. 7 No. 1 -
A Virtual Environment Forensic Tool
Virtual Environment Forensics is the process of performing the digital forensics in virtual environment. In recent time, virtualization technology has become one of the most important and popular ...Authors: Danish K. Chaus, Aayush Pathak, Akshay J. Boramani, Shagufta Rajguru, Rakhi Kalantri
Year Published: 2018 | 63-71 | IJCSDF | Vol. 7 No. 1 -
MALWARE ANALYSIS OF BACKDOOR CREATOR : FATRAT
Malwares have become the new vector of cyber crime and hackers are finding new ways to propagate these in all available platforms. Hackers are using social media to propagate backdoors to install it ...Authors: Rakesh Singh Kunwar, Priyanka sharma, K. V. Ravi kumar
Year Published: 2018 | 72-79 | IJCSDF | Vol. 7 No. 1 -
Audio Steganography via Cloud Services: Integrity Analysis of Hidden File
Steganography is implemented by manipulating data within a carrier file, such as on audio files. Audio Steganography is one of the techniques used for transmitting hidden information by modifying or ...Authors: Ashar Neyaz, Cihan Varol
Year Published: 2018 | 80-86 | IJCSDF | Vol. 7 No. 1 -
Forensics Analysis of Skype, Viber and WhatsApp Messenger on Android Platform
The vast usage of mVoIP applications on Android devices has made it easier to share information between smartphone users which heavily increased the amount of data and traffic transferred on these ...Authors: Peter E. Onovakpuri
Year Published: 2018 | 119-131 | IJCSDF | Vol. 7 No. 2 -
Digital Forensic Analysis of Hard Disk for Evidence Collection
As the Computers have become a common things ranging from house to the industry, the crimes which are associated with it also have increased tremendously. By performing the digital forensic analysis, ...Authors: Bandu B. Meshram, Dinesh N. Patil
Year Published: 2018 | 100-110 | IJCSDF | Vol. 7 No. 2 -
A research study: Usage of RC4 stream cipher in SSL configurations of web servers used by Sri Lankan Financial Institutes
The security of the Internet is mainly based on Secure Socket Layer (SSL) or its successor Transport Layer Security (TLS). To secure the on-line transactions, the organizations widely use the ...Authors: Tharindu D.B Weerasinghe, Chamara Disanayake
Year Published: 2018 | 111-118 | IJCSDF | Vol. 7 No. 2 -
Cyber Intelligence and OSINT: Developing Mitigation Techniques Against Cybercrime Threats on Social Media
Open Source Intelligence (OSINT) involve the collection or processes of gathering data and profiling of publicly available private and public sector information sources about individuals and business ...Authors: Abel Yeboah-Ofori, Allan Brimicombe
Year Published: 2018 | 87-98 | IJCSDF | Vol. 7 No. 1 -
The process of recovering image and web page artifacts from the GPU
The purpose of this research is to perform a graphics recovery process on the GPU in line with the principles of computer forensics. The research tested the possibility of recovering artifacts of ...Authors: Yazeed Albabtain, Baijian Yang
Year Published: 2018 | 132-141 | IJCSDF | Vol. 7 No. 2 -
Moving Towards Cloud Analyzing the Drivers and Barriers to the Adoption of Cloud Computing in HE (Higher Education) institution in UK: An Exploratory Study with Proposed Solution
Cloud computing is a relatively new phenomenon and its implementation in various sectors is having far reaching impacts. The requirements to have dynamic education environment in higher education ...Authors: Sohail Razi Khan, Luis Borges Gouveia
Year Published: 2018 | 142-154 | IJCSDF | Vol. 7 No. 2 -
PRINCIPAL COMPONENT ANALYSIS-BASED INVESTIGATION INTO THE CAUSAL FACTORS OF FINANCIAL CRIME
This paper proposes twenty investigative indices that were freely considered by the authors as relevant for the determination and evaluation of the causal factors of financial crimes in Nigeria. The ...Authors: Gabriel Babatunde Iwasokun, Raphael Olufemi Akinyede, Catherine Folake Fadamiro
Year Published: 2018 | 155-165 | IJCSDF | Vol. 7 No. 2 -
Utilization of Statistical Control Charts for DoS Network Intrusion Detection
The present work proposes a new method for denial of service (DoS) intrusion detection, by utilizing two types of statistical control charts on the UDP and ICMP source bytes. The utilized control ...Authors: Dimitris Sklavounos, Aloysius Edoh, George Paraskevopoulos
Year Published: 2018 | 166-174 | IJCSDF | Vol. 7 No. 2 -
Acquisition of Browser Artifacts from Android Devices
, Internet Explorer, Mozilla Firefox, Opera, and Apple’s Safari. Due to increased usage of the web storage, it has become a research topic of interest to forensic investigators. In 2015, Mendoza ...Authors: Emrah Sariboz, Cihan Varol
Year Published: 2018 | 175-182 | IJCSDF | Vol. 7 No. 2 -
A New Scheme to Secure Communication and Data, based on the Integration of Cryptography and Steganography
Today, data and communication security have become challenging issues. Since in cryptography, encrypted messages are available to eavesdroppers, security is the subject of concern and the need for ...Authors: Massoud Hadian Dehkordi, Amin Asgari, Ali Moradian
Year Published: 2018 | 183-188 | IJCSDF | Vol. 7 No. 2 -
A Naïve Bayes Based Pattern Recognition Model for Detection and Categorization of Structured Query Language Injection Attack
In the recent times, information sharing and delivery of services is done over the internet through different platform of web applications and various attacks are performed against these applications ...Authors: Morufu Olalere, Raji Abdullahi Egigogo, Ojeniyi Joseph A., Ismaila Idris, Rasheed Gbenga Jimoh
Year Published: 2018 | 189-199 | IJCSDF | Vol. 7 No. 2 -
Survey and Analysis of Regional Characteristics of Unmanaged Stray IoT devices
Recently, various devices, such as automobiles, and medical and industrial systems, have been connected to the Internet, and this network is referred to as the Internet of Things (IoT). IoT devices ...Authors: Yuki Nakazawa, Ryoichi Sasaki, Atsuo Inomata
Year Published: 2018 | 200-208 | IJCSDF | Vol. 7 No. 3 -
Cloud Computing Service Level Agreement Issues and Challenges: A Bibliographic Review
Cloud Computing provides parallel computing and emerged as an efficient technology to meet the challenges of rapid growth of data. With the number of benefits come serious challenges related to poor ...Authors: Sohail Razi Khan, Luis Borges Gouveia
Year Published: 2018 | 209-229 | IJCSDF | Vol. 7 No. 3 -
Application of RC4 Cryptography Method to Support XML Security on Digital Chain of Custody Data Storage
Chain of custody is a key process of disclosure of cyber crime cases. Chain of custody contains information about the identity of electronic evidence and the digital evidence which obtained from ...Authors: Krisna Widatama, Yudi Prayudi, Bambang Sugiantoro
Year Published: 2018 | 230-237 | IJCSDF | Vol. 7 No. 3 -
Data Mining Classification Approaches for Malicious Executable File Detection
Classification technique has many applications in executable files detection. The classification method is one of the most popular data mining technique to detect and predict the behavior of ...Authors: Hassan Najadat, Assem Alhawari, Huthifh Al_Rushdan
Year Published: 2018 | 238-242 | IJCSDF | Vol. 7 No. 3 -
A Study of the Effects of Heartbleed Vulnerability in Bangladesh
One of the most critical and talked about Open Secure Socket Layer (SSL) and Transport Layer Security (TLS) threats is Heartbleed vulnerability. This vulnerability affects the “Heartbeat ...Authors: Moniruz Zaman, Delwar Alam, Touhid Bhuiyan Tanjila Farah
Year Published: 2018 | 243-247 | IJCSDF | Vol. 7 No. 3 -
An Approach to Authenticate Magnetic Stripe Bank Card Transactions at POS terminals
Abstract— Magnetic stripe card technology has been deployed for more than six decades worldwide and is extensively used in banking. Data embedded in them are often relied upon as a benchmark for ...Authors: Kishor Krishnan Nair, Albert Helberg, Johannes van der Merwe
Year Published: 2018 | 248-255 | IJCSDF | Vol. 7 No. 3 -
Secure Timing Advance Based Context-Aware Handover Protocol for Vehicular Ad-Hoc Heterogeneous Networks
Heterogeneous networks and their applications introduce new shortcomings in terms of access control and confidentiality during handover process. Unfortunately, implementing stronger security ...Authors: Vincent Omollo Nyangaresi, Silvance O. Abeka and Anthony Rodgrigues
Year Published: 2018 | 256-274 | IJCSDF | Vol. 7 No. 3 -
Comparison of Attribute Based Access Control (ABAC) Model and Rule Based Access (RBAC) to Digital Evidence Storage (DES)
Digital Evidence Storage (DES) should have been established not only using simple authentication and authorization methods, namely authentication and authorization processes of username and password ...Authors: Moh Fadly Panende, Yudi Prayudi, Imam Riadi
Year Published: 2018 | 275-282 | IJCSDF | Vol. 7 No. 3 -
Encryption and Tokenization-Based System for Credit Card Information Security
Existing methods for promoting credit card information security have exhibited confidentiality, privacy and integrity failures. In most cases, sensitive and classified data or information is ...Authors: Gabriel Babatunde Iwasokun, Taiwo Gabriel Omomule, Raphael Olufemi Akinyede
Year Published: 2018 | 283-293 | IJCSDF | Vol. 7 No. 3 -
Digital Forensics Workflow as A Mapping Model for People, Evidence, and Process in Digital Investigation
Digital forensic investigations must have references and procedures, and so many digital forensic models are developed according to different needs and focus. The average model focuses on the Phases ...Authors: Subekti Ningsih, Yudi Prayudi, Imam Riadi
Year Published: 2018 | 294-304 | IJCSDF | Vol. 7 No. 3 -
ANALYSIS AND EVALUATION DIGITAL FORENSIC INVESTIGATION FRAMEWORK USING ISO 27037:2012
The important thing that every digital forensic investigator must take into account in carrying out digital forensics activities is the following steps and procedures in digital forensics. These ...Authors: Didik Sudyana, Yudi Prayudi, Bambang Sugiantoro
Year Published: 2019 | 1-14 | IJCSDF | Vol. 8 No. 1 -
WhatsApp Messenger Forensic Analysis Based on Android Using Text Mining Method
The development of telecommunications has increased very rapidly since instant internet-based instant messaging services to Indonesia. However, on the other hand, many people abuse WhatsApp for ...Authors: Anang Marfianto, Imam Riadi
Year Published: 2018 | 319-327 | IJCSDF | Vol. 7 No. 3 -
Analysis of Forensic Video in Storage Data Using Tampering Method
In the legal world, a evidence of video recording has a high level of confidence and is often the evidence. This raises the issue of ensuring an original video or engineering result in digital ...Authors: Amirul Putra Justicia, Imam Riadi
Year Published: 2018 | 328-335 | IJCSDF | Vol. 7 No. 3 -
Examination of Digital Evidence on Android-based LINE Messenger
During the last decade, the number of Android smartphone users has been increased rapidly. Cybercrime is also increasing since internet was established. Instant messenger is one of internet-based ...Authors: Imam Riadi, Sunardi, Ammar Fauzan
Year Published: 2018 | 336-343 | IJCSDF | Vol. 7 No. 3 -
Development and Evaluation of Intelligent Network Forensic System LIFT Using Bayesian Network for Targeted Attack Detection and Prevention
Recently, the number of cyber attacks targeting companies or government departments has been increasing. Although such organizations are required to prepare countermeasures against targeted attacks, ...Authors: Ryoichi Sasaki, Hiroshi Yamaki, Yoshio Kakizaki, Kazuki Shimazaki, Masato Terada, Tetsutaro Uehara
Year Published: 2018 | 344-353 | IJCSDF | Vol. 7 No. 4 -
A UML-Based Approach for Analysing Potential Digital Forensic Evidence
This paper introduces the reader to a Unified Modeling Language (UML)-based approach that can be used to model a digital forensic analysis of Potential Digital Evidence (PDE). Additionally, this ...Authors: Victor R. Kebande, Nickson M. Karie
Year Published: 2018 | 354-362 | IJCSDF | Vol. 7 No. 4 -
Using Multiple Profiles to Protect Privacy in Web-Based Social Networks
Being a member of a Web-based social network has become an integral part in the lives of millions of individuals. People make new friends, reconnect with old ones, and chronicle their life events ...Authors: Lila Ghemri, Sabrina Shahnaj, Emma Hamilton
Year Published: 2018 | 363-372 | IJCSDF | Vol. 7 No. 4 -
Analysis of Secure Hash Algorithm (SHA) 512 for Encryption Process on Web Based Application
The login mechanism in web-based applications implements the MD5 hash function as a form of password encryption that proves to have weaknesses in the form of Collision Attack that is likely to have ...Authors: Meiliana Sumagita, Imam Riadi
Year Published: 2018 | 373-381 | IJCSDF | Vol. 7 No. 4 -
Network Forensics for Detecting Flooding Attack on Internet of Things (IoT) Device
Today is the era of the Internet of Things (IoT), millions of devices such as smart city, smart home, smart retail, automotive, automatic car tracking, smartphone detection, smart lighting, ...Authors: Randi Rizal, Imam Riadi, Yudi Prayudi
Year Published: 2018 | 382-390 | IJCSDF | Vol. 7 No. 4 -
Critical Thinking Skills and Best Practices for Cyber Security
This research work focuses on critical thinking and its impact on cyber security. This research is based on two strong premises about critical thinking viz., (1) critical thinking skills outsmart the ...Authors: Srinivas Nowduri
Year Published: 2018 | 391-409 | IJCSDF | Vol. 7 No. 4 -
Forensic Investigation on Whatsapp Web Using Framework Integrated Digital Forensic Investigation Framework Version 2
WhatsApp Web is a computer-based extension connected to WhatsApp on smartphones. The handling of crime cases on computers or smartphones has four main stages, namely preparation, Case Place Event, ...Authors: Bery Actoriano, Imam Riadi
Year Published: 2018 | 410-419 | IJCSDF | Vol. 7 No. 4 -
Identity-Based Encryption Technique with Ranking for Multi-Keywords Search in Cloud (IDERMKS)
Cloud providers use virtualization technologies combined with self-service capabilities for computing resources via network infrastructure. In recent time, massive growth in big data generated ...Authors: Regina Esi Turkson, Yongjian Liao, Edward Yeallakuor
Year Published: 2018 | 305-316 | IJCSDF | Vol. 7 No. 3 -
Cryptocurrency and the Blockchain: A Discussion of Forensic Needs
The authors discuss matters concerning Cryptocurrencies in a global context. We also describe what a cryptocurrency is and provide a history of the currencies and their differences with government ...Authors: Douglas A. Orr, Drew M. Lancaster
Year Published: 2018 | 420-435 | IJCSDF | Vol. 7 No. 4 -
Network Forensics for Detecting SQL Injection Attacks Using NIST Method
SQL Injection is a technique to exploit web applications that use the database as data storage. By being able to influence what will be forwarded to the database, the attacker can exploit the syntax ...Authors: Arif Roid Caesarano, Imam Riadi
Year Published: 2018 | 436-443 | IJCSDF | Vol. 7 No. 4 -
Survey on Intrusion Detection System Types
Intrusion detection system (IDS) is one of amongst the most essential consideration of cyber-security that can discover intrusion before and/or after attack occur. An Intrusion detection system is ...Authors: Suad Mohammed Othman, Nabeel T.Alsohybe, Fadl Mutaher Ba-Alwi, Ammar Thabit Zahary
Year Published: 2018 | 444-462 | IJCSDF | Vol. 7 No. 4 -
Privacy protection of Users’ Data in Social Network Systems based on Homomorphic Cryptography Techniques
The use of social network systems (SNS) for interacting and sharing information across the globe has led to new vulnerabilities and cyber threats which results to privacy violation in SNS such as ...Authors: Kosmas Kapis, Maduhu Mshangi
Year Published: 2018 | 463-479 | IJCSDF | Vol. 7 No. 4 -
A Peer Pressure Method for Helping End-Users Generate Strong Passwords
Passwords have continued to play dominant role in online authentication systems. Consequently, it has become a great target for hackers. To mitigate these attacks, various websites have device means ...Authors: S. Agholor, I. O. Akinyemi
Year Published: 2018 | 480-487 | IJCSDF | Vol. 7 No. 4 -
Discovering P2P Botnets Behaviors in Skype Application using Machine Learning Approach
Skype is one of the most used P2P applications on the Internet: VoIP calls, instant messaging, SMS and other features are provided at a low cost to millions of users. Although Skype is a closed ...Authors: Raihana Syahirah Abdullah, Faizal M.A., Anis Farhani
Year Published: 2019 | 15-22 | IJCSDF | Vol. 8 No. 1 -
A Behaviour Profiling Based Technique for Network Access Control Systems
The emergence of the Internet of Things (IoT) has lead to a technological transformation that integrates several technologies to represent the future of computing and communications. IoT is the ...Authors: Musa Abubakar Muhammad, Aladdin Ayesh
Year Published: 2019 | 23-30 | IJCSDF | Vol. 8 No. 1 -
Computer Forensics: A Linux Case Study Applied to Pedophilia Crime Investigation in Brazil
This paper presents the main concepts of computer forensics and describes the techniques and tools used in digital forensics. The application of the concepts, tools, and techniques was performed by ...Authors: Jeferson dos Santos Almeida, Leonardo de Santana Nascimento, Diógenes Antonio Marques José
Year Published: 2019 | 31-42 | IJCSDF | Vol. 8 No. 1 -
Cybercrime and Risks for Cyber Physical Systems
Cyber Physical Systems (CPS) is the integration of computation and physical systems that make a complete system such as the network, software, embedded systems, and physical components. Major ...Authors: Abel Yeboah-Ofori, Jamal-Deen Abdulai, Ferdinand Katsriku
Year Published: 2019 | 43-57 | IJCSDF | Vol. 8 No. 1 -
Analysis of Security Virtual Private Network (VPN) Using OpenVPN
Data transmission on the network of Informatics Engineering Research Laboratory Universitas Ahmad Dahlan using an unsecured public internet network, in order to be able to access the network from ...Authors: Muhammad Iqbal, Imam Riadi
Year Published: 2019 | 58-65 | IJCSDF | Vol. 8 No. 1 -
Network Forensics Analysis of Man in the Middle Attack Using Live Forensics Method
The security of based internet information system is a must to care about. Because the network which is public and global basically are not safe. When the data sent from a personal computer to ...Authors: Dedy Saputra, Imam Riadi
Year Published: 2019 | 66-73 | IJCSDF | Vol. 8 No. 1 -
Forensics Analysis of Router On Computer Networks Using Live Forensics Method
One of hardware which is used for connecting two different networks is the Router. Router is a tool for sending data packets through a network or the internet in order to reach its object. In this ...Authors: Nita Hildayanti, Imam Riadi
Year Published: 2019 | 74-81 | IJCSDF | Vol. 8 No. 1 -
Statistical Process Control Method for Cyber Intrusion Detection (DDoS, U2R, R2L, Probe)
A new method of cyber intrusion detection is proposed in the present work. A statistical process control technique with a significant potential has been utilized for this purpose, namely the ...Authors: Dimitris Sklavounos, Alexandros Leondakianakos, Aloysius Edoh
Year Published: 2019 | 82-88 | IJCSDF | Vol. 8 No. 1 -
Forensic Analysis of Android-based WhatsApp Messenger Against Fraud Crime Using The National Institute of Standard and Technology Framework
Mobile devices developed very rapidly along with the development of technology. Improved service users instant messenger applications such as WhatsApp would be very susceptible to crime. Some crimes ...Authors: Helmy Trisnasenjaya, Imam Riadi
Year Published: 2019 | 89-97 | IJCSDF | Vol. 8 No. 1 -
Detection of Phishing Emails with Email Forensic Analysis and Machine Learning Techniques
This research is an attempt to investigate the effectiveness of email forensic analysis and text mining techniques in identifying phishing emails. The dataset that is used for this experiment consist ...Authors: Kamran Morovati, Sanjay S.Kadam
Year Published: 2019 | 98-107 | IJCSDF | Vol. 8 No. 2 -
Towards Cross-platform Detection of Cyberattacks Using Micro-agents
Recent cyber attacks are growing more and more sophisticated and diversified. With the advent of IoT, more and more devices are connected to a system, and the task to protect heterogeneous endpoints ...Authors: Xinxing Zhao, Chandra Sekar Veerappan, Peter Loh, Caleb Wee
Year Published: 2019 | 108-119 | IJCSDF | Vol. 8 No. 2 -
Detecting Shill Bidding Using eBay’s 30-Day Bid Summary
Shill bidding is a fraudulent act whereby a seller places bids on his/her own auction to drive up the final price for the winning bidder. eBay currently masks bidder usernames in auctions and has ...Authors: Nathan Fisher, Jarrod Trevathan, Heather Gray
Year Published: 2019 | 120-133 | IJCSDF | Vol. 8 No. 2 -
Anti-Qrishing Real-Time Technique on the QR Code Using the Address Bar-Based and Domain-Based Approach on Smartphone
Phishing is a technique of cybercrime that commits fraud by masquerading as trusted entity. The focus of phishing is to get sensitive information. At present, the development of phishing has used QR ...Authors: Kurniadin Abd. Latif, Bambang Sugiantoro, Yudi Prayudi
Year Published: 2019 | 134-143 | IJCSDF | Vol. 8 No. 2 -
Preventing IP Spoofing Attacks in a Shared Resources Network
Network intruders may spoof IP packets by modifying headers of the IP packets to fool people believe that the transmissions are originating from the trusted source. Consequently, various defence ...Authors: Hussein Sudi Lema, Fatuma Simba
Year Published: 2019 | 144-151 | IJCSDF | Vol. 8 No. 2 -
Security Modeling for Protecting Electronic Patients’ Consent
The adoption of Health Information System (HIS) has emerged as a significant element in the healthcare domain. HIS comprises of Electronic Patient Records (EPR) whose confidentiality is crucial. ...Authors: Kosmas Kapis, Emmanuel Damas
Year Published: 2019 | 152-165 | IJCSDF | Vol. 8 No. 2 -
Cyber SecurityPlatform Solution Based on the Facial Image and Fingerprint
The recognition system based on the iris images are costly and required high resolution optical sensors and camera system beside the presence of the individual at the time of authentication and ...Authors: Sulaiman Alshebli, Fatih Kurugollu, Mahmoud Shafik
Year Published: 2019 | 166-176 | IJCSDF | Vol. 8 No. 2 -
Analysis of Android Malware Detection Techniques: A Systematic Review
The emergence and rapid development in complexity and popularity of Android mobile phones has created proportionate destructive effects from the world of cyber-attack. Android based device platform ...Authors: Moses Ashawa, Sarah Morris
Year Published: 2019 | 177-187 | IJCSDF | Vol. 8 No. 3 -
Computer Aided Diagnosis for Chronic Kidney Disease Using Data Mining
Chronic Kidney Disease ( CKD) is a gradual disorder of kidney tasks over time. CKD early detection could reduce the impacts and harms by offering the necessary treatment. Nowadays, data mining can ...Authors: Mohammad Ashraf Ottom, Khalid M. Nahar
Year Published: 2019 | 188-193 | IJCSDF | Vol. 8 No. 3 -
A Comparative Study of Analysis and Extraction of Digital Forensic Evidences from exhibits using Disk Forensic Tools
Digital exhibits such as USB drive, external hard disks etc. found at the crime scene contain evidences of essential value. Forensic Imaging of exhibits, which is an indispensable part of digital ...Authors: Kumarshankar Raychaudhuri
Year Published: 2019 | 194-205 | IJCSDF | Vol. 8 No. 3 -
Forensic Authentication of WhatsApp Messenger Using the Information Retrieval Approach
The development of telecommunications has increased very rapidly since the internet-based instant messaging service has spread rapidly to Indonesia. WhatsApp is the most popular instant messaging ...Authors: Nuril Anwar, Supriyanto
Year Published: 2019 | 206-212 | IJCSDF | Vol. 8 No. 3 -
Framework Analysis of IDFIF V2 in WhatsApp InvestigationProcess on Android Smartphones
The development of technology that is increasing rapidly, may cause problems for users of the technology itself. One of the problems of abuse of technology like WhatsApp is used as a communication ...Authors: Rahadhian Dinnur Rahman, Imam Riadi
Year Published: 2019 | 213-222 | IJCSDF | Vol. 8 No. 3 -
Forensic Analysis WhatsApp Mobile Application On Android-Based Smartphones Using National Institute of Standard and Technology (NIST) Framework
The Whatsapp application is an alternative to exchange messages because of its ease of use. The number of WhatsApp users and security features is available, allowing WhatsApp to be used as a ...Authors: Vindy Arista Yuliani, Imam Riadi
Year Published: 2019 | 223-231 | IJCSDF | Vol. 8 No. 3 -
Cloud Forensics Investigation in Cloud Storage Using IDFIF V2 Method
Virtual storage through the cloud system has continued to grow since 2014.[1] Google Drive is a storage service created by Google on April 24, 2012, with a storage service of 15GB which is provided ...Authors: Ahmad Muhammad Ridho, Nuril Anwar
Year Published: 2019 | 232-240 | IJCSDF | Vol. 8 No. 3 -
Existing Cyber Laws and Their Role in Legal Aspects of Cybercrime in Pakistan
A vast variety of users include information technology by using electronic devices in their daily life for business and personal tasks. This era is device dominating and every data and information is ...Authors: Asif Kamran, Qamar ul Arafeen, Asad Ali Shaikh
Year Published: 2019 | 241-249 | IJCSDF | Vol. 8 No. 3 -
A Comparative Study of the Performance of Open-Source and Proprietary Disk Forensic Tools in Recovery of Anti-Forensically Doctored Data
Digital Forensics is the technique used for the investigation of crimes related to computers and other digital or electronic devices such as mobile phones, tablets etc. It includes different stages ...Authors: Sonu Mandecha, Kumarshankar Raychaudhuri, M. George Christopher
Year Published: 2019 | 250-261 | IJCSDF | Vol. 8 No. 4 -
A Digital Forensic Approach for Examination and Analysis of Frozen Hard Disk of Virtual Machine
There are software tools in the open market which help in safeguarding the computer system from malware, viruses and other unintentional changes to the users Operating System. Faronics’ Deep Freeze ...Authors: M. George Christopher, Kumarshankar Raychaudhuri
Year Published: 2019 | 262-272 | IJCSDF | Vol. 8 No. 4 -
Network Attack Detection Method Based on Their Time - Frequency Decomposition
In the last few years, attack detection has become a powerful methodology for network protection and network security measures. The present work presents a new detection scheme for data recorded over ...Authors: Dimitris Sklavounos, Spiros Chountasis, Aloysius Edoh
Year Published: 2019 | 273-278 | IJCSDF | Vol. 8 No. 4 -
Recognizing Illegitimate Access Points Based on Static Features: a Case Study in a Campus Wifi Network
Wireless networks are useful to disseminate information across an institution. However, access points are often abandoned with vulnerable security protocols and the network is maliciously infiltrated ...Authors: Franklin Tchakounte, Michael Nakoe, Blaise Omer Yenke, Kalum Priyanath Udagepola
Year Published: 2019 | 279-291 | IJCSDF | Vol. 8 No. 4 -
Forensic Analysis in Cloud Storage with Live Forensics in Windows (Adrive Case Study)
Digital era such as now, cloud technology can not be released in our lives. Cloud computing has also become one of the fastest-growing and transformative technologies. In addition to some convenience ...Authors: Tri Rochmadi, Dadang Heksaputra
Year Published: 2019 | 292-297 | IJCSDF | Vol. 8 No. 4 -
A Study on Metasploit Payloads
This research paper used the Kali-Linux operating system, to create a platform remotely which allows to control the device Android and Windows operating system using the malicious payload through ...Authors: Afrozulla Khan Z, Balajinarayan B
Year Published: 2019 | 298-307 | IJCSDF | Vol. 8 No. 4 -
GUTI-Based Multi-Factor Authentication Protocol for De-synchronization Attack Prevention in LTE Handovers
The motivations behind the long term evolution (LTE) networks are low latency, high bandwidths and high data rates. The low latency requirement is tricky and cumbersome to achieve during handovers ...Authors: Vincent Omollo Nyangaresi, Silvance O. Abeka, Anthony J. Rodrigues
Year Published: 2020 | 1-11 | IJCSDF | Vol. 9 No. 1 -
Factors Related to Small Business Cyber-Attack Protection in the United States
The purpose of this quantitative predictive correlational study was twofold. First, the study attempted to identify whether there is a predictive relationship between company characteristics (i.e. ...Authors: Michael Udofot, Ruzanna Topchyan
Year Published: 2020 | 12-25 | IJCSDF | Vol. 9 No. 1 -
Integrated Intrusion Detection Scheme using Agents
Misuse based Intrusion Detection System (IDS) employs various signature matching techniques against stored databases to find intrusions in a network. Anomaly-based Intrusion Detection System does ...Authors: Kajal Rai, Ajay Guleria, M. Syamala Devi
Year Published: 2020 | 26-33 | IJCSDF | Vol. 9 No. 1 -
A Survey of Artificial Intelligence Techniques for Cybersecurity Improvement
In the last years, cybersecurity has become the most important issue. Many researchers have investigated the development of cybersecurity tools, and several solutions have proposed to protect ...Authors: Athari M. Alrajhi
Year Published: 2020 | 34-41 | IJCSDF | Vol. 9 No. 1 -
Mobile Forensic Process and Associated Key Challenges
Surge of smartphones in criminal activities has made mobile forensics an integral part of digital forensic investigation. However, there are several deterrents to the forensics of these smartphones. ...Authors: Vijaya S. Waghmare, B. B. Meshram
Year Published: 2020 | 42-54 | IJCSDF | Vol. 9 No. 1 -
Comparative Malware Testing Analyses for Android Mobile Apps
In various malware-based cyber security research endeavors, it is not uncommon to rely on free online static and dynamic [mobile] analyzers to determine whether an application is vulnerable or holds ...Authors: Ileana Palesi, Paolina Centonze
Year Published: 2020 | 55-70 | IJCSDF | Vol. 9 No. 1 -
Investigating Intrusion Detection Security Techniques in Cloud-Based Networks
Cloud Computing Technology, with its abundant advantages, has created new progress in the world of computing and has pushed Information Technology (IT) Industry a step forward. Therefore, that great ...Authors: Meisam Sharifi Sani
Year Published: 2020 | 71-88 | IJCSDF | Vol. 9 No. 2 -
A Secure and Efficient Public Key Authenticated Encryption with Multi-keywords Search Scheme against Inside Keyword Guessing Attack
How to securely and efficiently search encrypted messages over the networked servers becomes a thorny problem. To solve it, Public Key Encryption with Keyword Search (PEKS) was firstly introduced in ...Authors: Yang Ma, Hassan Kazemian
Year Published: 2020 | 90-101 | IJCSDF | Vol. 9 No. 2 -
Blueprint Key: A Tool for a Novel Layer of XML Encryption
In this paper, we expand upon the robust security mechanisms of XML data. There are many methodologies for XML security, such as XML encryption and XML signature, which are W3C recommendations. ...Authors: Jason Meza, Paolina Centonze
Year Published: 2020 | 102-112 | IJCSDF | Vol. 9 No. 2 -
IPv6 Issues and Benefits
It has been almost 10 years since IPv6 was supposed to become the de facto Internet of the world. Indifference and incomprehensive have prevailed. Many universities, organizations have not ...Authors: Yves Delphin
Year Published: 2020 | 113-125 | IJCSDF | Vol. 9 No. 2 -
Proceduralization in Cybersecurity: A Socio-Technical Systems Perspective
Cyberdefense is a difficult, multifaceted endeavor involving humans and technology. Complex Sociotechnical Systems (CSTS) theory espouses simultaneous optimization of both human behavior and systems, ...Authors: John W. Coffey
Year Published: 2020 | 126-138 | IJCSDF | Vol. 9 No. 3 -
Security Implementation Using RSA and Enhanced RSA
Today, RSA calculation is the most broadly utilized open key cryptosystem around the globe. It is utilized for security in everything from internet shopping to phones. In any case, the essential RSA ...Authors: Vanitha Kumar, Varada Sandeep Kumar, Dara Anil Kumar Dara
Year Published: 2020 | 139-146 | IJCSDF | Vol. 9 No. 3 -
Reviewing the Existing Methodologies and Tools of Cloud Forensics: Challenges and Solutions
Cloud computing is relatively a new technological advancement which has speedily become part of the important technological improvements for computer science. Cloud computing as technological ...Authors: Khalid A Alattas, Magdy Bayoumi
Year Published: 2020 | 147-154 | IJCSDF | Vol. 9 No. 4 -
Network Intrusion Detection Using Deep Learning and Machine Learning for Multinomial Classification
The paper utilizes several cutting-edge machine learning and artificial intelligence technologies for data mining IP network traffic data in order to classify network intrusion anomalies. A novel ...Authors: Thomas A. Woolman, Sanghyun “Philip” Lee
Year Published: 2020 | 155-181 | IJCSDF | Vol. 9 No. 4 -
The Growing Attention on the Growth of Digital Forensics
The current modern society highly depends on information technology (IT), communication networks, information and communication technologies (ICT), and the internet of things (IoT). In the same way, ...Authors: Thowg Alrasheed
Year Published: 2021 | 1-9 | IJCSDF | Vol. 10 No. 1 -
A Proposed System Design of Deleted Image Metadata Recovery Software
This paper describes the design and implementation features of Deleted Image Metadata Recovery Software which can automatically extract deleted image metadata so that important information of the ...Authors: Tabu S. Kondo
Year Published: 2021 | 10-16 | IJCSDF | Vol. 10 No. 1 -
A Comparative Study of Different Image Encryption and Decryption Techniques
Currently the digital communication generates millions of digital data in the form of digital images. These confidential images must be protected from intruders over transmission in network ...Authors: Yash Raj, Simriti Koul, Simran Koul
Year Published: 2021 | 17-27 | IJCSDF | Vol. 10 No. 1 -
A Comparative Analysis between Technical and Non-Technical Phishing Defences
Phishing attacks are a form of social engineering attacks which are designed to extract sensitive information through email and are a growing problem in today’s world. The cost of falling victim to ...Authors: Joseph C. Brickley, Kutub Thakur, Abu S. Kamruzzaman
Year Published: 2021 | 28-41 | IJCSDF | Vol. 10 No. 1 -
A Process for Performance Monitoring and Measuring in Safety and Security
It can be difficult to measure the performance of a management system as organisations may not know what to monitor and measure or understand the quality of the information they are receiving and ...Authors: Robert Kemp, Richard Smith
Year Published: 2021 | 42-54 | IJCSDF | Vol. 10 No. 1 -
High-Performance Intrusion Detection System using Deep Learning in Packet and Flow-Based Networks
The information revolution, extensive cloud computing, and enormous network traffic have made the security of systems from threats and attack more crucial. Continuous monitoring of the system and ...Authors: Kaniz Farhana, Maqsudur Rahman, Muhammad Anwarul Azim, Md. Tofael Ahmed
Year Published: 2021 | 55-66 | IJCSDF | Vol. 10 No. 2 -
Authentication of MP4 Video Using File Containers and Metadata Features
The authentication of video recording plays a very important role in forensic science as well as for other crime investigation purposes. The field of forensic examination of digital videos is ...Authors: D.P Gangwar
Year Published: 2021 | 67-77 | IJCSDF | Vol. 10 No. 2 -
Comparative Analysis of Forensic Softwares for Android-based Blackberry Messenger Using NIJ Framework and NIST Measurements
The increasing number of digital crime cases that occured makes digital forensics becoming one of the most popular terms. Digital forensics techniques are performed by doing some analytical ...Authors: Arizona Firdonsyah
Year Published: 2021 | 78-90 | IJCSDF | Vol. 10 No. 2 -
Towards a Multidimensional Model to Represent Human Behaviour on Online Social Networks
Online social networks have been growing exponentially. Everyday loads of new users are immersed into this environment, sharing and interacting using many different methods, tools and devices. ...Authors: T. Viana, J. Hemns and J. Paterson
Year Published: 2021 | 91-99 | IJCSDF | Vol. 10 No. 3 -
Prevention Technique for Social Engineering based Internet Banking
Financial institutions, including banks in the public and private sector, play an essential role in a country’s economic development. As Known, the Indian banking sector is observing the IT ...Authors: Purnima Ahirao, Srijan Das, Rishabh Rupani and Suyash Jadhav
Year Published: 2021 | 100-108 | IJCSDF | Vol. 10 No. 3 -
A Study of Situational Crime, Work From Home (WFH), Vulnerabilities, Threats, and Measures
This is the age of information; its security is very essential. The biggest of the biggest corporates to a common individual possesses data that needs confidentiality and security. Many IT companies ...Authors: Varshith Sadula
Year Published: 2021 | 100-111 | IJCSDF | Vol. 10 No. 4 -
Policy of Least Privilege and Segregation of Duties, their Deployment, Application, & Effectiveness
With the risk of insider threats on the rise, organizations should deploy the policy of least privilege and Segregation of Duties (SOD) as a safeguard against malicious exposure of information from ...Authors: Joseph C. Brickley, Kutub Thakur
Year Published: 2021 | 112-119 | IJCSDF | Vol. 10 No. 4 -
Impediments to High-Accuracy Breach Severity Reporting
Accurate assessment and reporting of data breach impacts on individuals whose data is breached is highly desirable. The goal of this article is to address the point of whether or not, in the general ...Authors: John W. Coffey, Caroline S. John, Ezhil Kalaimannan
Year Published: 2022 | 1-10 | IJCSDF | Vol. 11 No. 1 -
3D Printing Security: Using UUID-based Text Watermarking to Secure GCODE Files
3D printing is a powerful method of new technology in the field of manufacturing. It uses the layering of melted materials such as plastic or metal to create 3D shapes that harden when the materials ...Authors: Timothy Strowbridge, Paolina Centonze
Year Published: 2022 | 11-19 | IJCSDF | Vol. 11 No. 2 -
Enhanced Crime and Threat Intelligence Hunter with Named Entity Recognition and Sentiment Analysis
Collecting cybercrime evidence on the Internet typi-cally involves reconnaissance and analyses of infor-mation extracted. Scouring the Internet, especially the Deep Web, often requires manual effort ...Authors: James H. Ng, Peter K.K. Loh
Year Published: 2022 | 20-33 | IJCSDF | Vol. 11 No. 2 -
Analysis of Digital Document Engineering Forensic with NIJ
Digital forensics can assist in digitally collecting evidence to be presented in court in accordance with applicable law. One example of digital forensic science is image forensics, which aims to ...Authors: Arizona Firdonsyah, Danur Wijayanto
Year Published: 2022 | 34-39 | IJCSDF | Vol. 11 No. 2