SDIWC Digital Library
The aim of SDIWC digital library is to deliver a free full text access to published papers of SDIWC and other organizations. If you want to include the papers of your conference or journal, please contact us. The inclusion is Free.
The Second International Conference on Cyber Security, Cyber Peacefare and Digital Forensic (CyberSec2013)
-
A REPLAY ATTACK RESISTANCE DRM SCHEME BASED ON PHYSICAL LEVEL FILE LOCATION
This paper tackles the problem of resisting the replay attack in digital rights management (DRM) systems. Commonly used measures rely on continuous online connection from the client to a trusted ...Authors: Cheng Qu, Yinyan Yu, Zhi Tang, Xiaoyu Cui
Year Published: 2013 | 1-11 | CyberSec2013 -
EFFECTIVE CORPORATE GOVERNANCE: COMBINING AN ICT SECURITY INCIDENT AND ORGANISATIONAL LEARNING
The importance of applying good governance principles has grown over the past decade and many studies have been performed to investigate the role and impact of such principles. One of the ...Authors: WD Kearney, HA Kruger
Year Published: 2013 | 12-21 | CyberSec2013 -
INFORMATION SECURITY MANAGEMENT BEYOND CERTIFICATION AND ACCREDITATION
Traditional information security approaches rely too heavily on system certification and accreditation (C&A) to ensure that a system is sufficiently secure. Such approaches inadequately address ...Authors: John Anderson, Vijay Rachamadugu
Year Published: 2013 | 22-32 | CyberSec2013 -
A MULTI-SERVERS REMOTE USER AUTHENTICATION SCHEME USING A SMARTER SMART CARD
To most Internet users, multiple combinations of accounts and passwords are hard to manage and they simply stick to one password for all accounts. However, it will cause a higher risk for those user ...Authors: Yu-Yi Chen, Jun-Chao Lu, Jinn-Ke Jan
Year Published: 2013 | 33-42 | CyberSec2013 -
EPSILON2 VIRTUAL INFORMATION SECURITY TESTING SYSTEM MARK II
Epsilon2 is a remodeling of the old Epsilon system. It utilizes virtualization technology in simulating physical networks resulting to effectively reducing resource consumption. The simulated ...Authors: Lin De Luna, Patrick Kevin Detera, Samuel David Guerrero, Hiro Mejia, Miguel Alberto Gomez
Year Published: 2013 | 43-48 | CyberSec2013 -
DIGITAL VIDEO WATERMARKING ON CLOUD COMPUTING ENVIRONMENTS
Due to the need of rapidly distribute digital video, the use of digital watermarking to protect the digital copyright has become very crucial in the era of the Internet. Further, the process for ...Authors: Chu-Hsing Lin, Chen-Yu Lee, Shih-Pei Chien
Year Published: 2013 | 49-53 | CyberSec2013 -
A PROPOSAL AND IMPLEMENTATION OF THE SHOULDER-SURFING ATTACK RESISTANT AUTHENTICATION METHOD USING TWO SHIFT FUNCTIONS
Recently, mobile terminals such as smartphones have come to be widely used. Most of such mobile terminals store several types of important data, such as personal information. Therefore, it is ...Authors: Yoshihiro Kita, Fumio Sugai, MiRang Park, Naonobu Okazaki
Year Published: 2013 | 54-59 | CyberSec2013 -
AN ENTERPRISE-GRADE SECURE DATA STORAGE AND SHARING SYSTEM
This paper presents SafeStorage, an enterprise-grade secure data storage and sharing system designed to be layered over untrusted server and open commination channel. SafeStorage assumes a ...Authors: Xu Meng, Liu Fang, Ng Wee Keong
Year Published: 2013 | 60-68 | CyberSec2013 -
APPLICATION OF SECRET SHARING TECHNIQUES ON CONFIDENTIAL FORENSIC INVESTIGATION
How to capture digital evidence is crucial for counteracting against the computer and cyber crimes. However, in a large sharing system (e.g. in a data center or even in a cloud system), cloning the ...Authors: Shuhui Hou, Siuming Yiu, Tetsutaro Uehara, Ryoichi Sasaki
Year Published: 2013 | 69-76 | CyberSec2013 -
COMPUTER FORENSICS INVESTIGATION AN APPROACH TO EVIDENCE IN CYPERSPACE
In the recent years, analysing a computer or a digital device has become a necessity in the field of criminal investigations. However, during the forensic analysis some ordinary mistakes are often ...Authors: Gianni Fenu, Fabrizio Solinas
Year Published: 2013 | 77-88 | CyberSec2013 -
MALWARE PROOF ON MOBILE PHONE EXHIBITS BASED ON GSM/GPRS TRACES
This paper presents a system for proving the existence of malware on mobile phones that are exhibits in a criminal investigation. The system masquerades as legitimate GSM/GPRS network and thus is ...Authors: Philip Schutz, Michael Breuer, Hans Hofken, Marko Schuba
Year Published: 2013 | 89-96 | CyberSec2013 -
A NOVEL EVIDENCE INTEGRITY PRESERVATION FRAMEWORK (EIPF) FOR VIRTUALISED ENVIRONMENTS: A DIGITAL FORENSIC APPROACH
Virtualisation technologies have established their importance as core components of modern digital communications. With the increasing trend towards outsourcing and cloud services, virtualisation ...Authors: Uchenna Peter Daniel Ani, Gregory Epiphaniou, Tim French
Year Published: 2013 | 97-106 | CyberSec2013 -
PASSIVE APPROACH FOR VIDEO FORGERY DETECTION AND LOCALIZATION
In this paper, we present a passive approach for effective detection and localization of forgery from video sequences. Our approach analyzes spatio-temporal slices from 3-D video volumes to detect ...Authors: Cheng-Shain Lin, Jyh-Jong Tsay
Year Published: 2013 | 107-112 | CyberSec2013 -
ON THE SELECTION OF WRITE BLOCKERS FOR DISK ACQUISITION: A COMPARATIVE PRACTICAL STUDY
Digital Forensics (DF) is an evolutionary field with evolving techniques. One major step in DF Framework is the acquisition phase, where a copy or an image of a suspect disk is preserved with no ...Authors: Mousa Al Falayleh, Jamal Al-Karaki
Year Published: 2013 | 113-123 | CyberSec2013 -
VOICE -OVER -IP (VOIP) BANDWIDTH OPTIMIZATION: A SURVEY OF SCHEMES AND TECHNIQUES
Voice over Internet Protocol (VoIP) is a voice communication system that proffers the transmission and reception of audio (voice) signal and (or) data over the internet. One very crucial problem in a ...Authors: Uchenna Peter Daniel Ani
Year Published: 2013 | 124-129 | CyberSec2013 -
EFFICIENT LOCAL RECODING ANONYMIZATION FOR DATASETS WITHOUT ATTRIBUTE HIERARCHICAL STRUCTURE
Privacy is one of the main concerns in data publishing especially when releasing datasets involving human subjects contain sensitive information. Hence, to protect the privacy of individuals, a model ...Authors: Mohammad Rasool Sarrafi Aghdam, Noboru Sonehara
Year Published: 2013 | 130-140 | CyberSec2013 -
FUZZY DESCRIPTION OF SECURITY REQUIREMENTS FOR INTRUSION TOLERANT WEB-SERVICES
Performing security analysis in the early stages of web-services development is a major engineering trend. However, it is not always possible to entirely identify and mitigate the security threats ...Authors: Davoud Mougouei, Wan Nurhayati Wan Ab. Rahman
Year Published: 2013 | 141-147 | CyberSec2013 -
DIGITAL BANKING SECURITY, RISK AND CREDIBILITY CONCERNS IN SOUTH AFRICA
This paper addresses aspects of security in the following digital banking delivery channels: Internet, cellphone and Automated Teller Machine (ATM). South African banks use these delivery channels ...Authors: Rabelani Dagada
Year Published: 2013 | 148-161 | CyberSec2013 -
INDUSTRIAL ESPIONAGE THREATS IN CORPORATE SOUTH AFRICA
The widespread presence of industrial espionage in South Africa could be an indicator that domestic corporate security frameworks have so far failed to neutralize the threat. It is nevertheless ...Authors: Rabelani Dagada, Seth Mukwevho
Year Published: 2013 | 162-169 | CyberSec2013 -
CANARY FILES: GENERATING FAKE FILES TO DETECT CRITICAL DATA LOSS FROM COMPLEX COMPUTER NETWORKS
This paper introduces two concepts: Canary Files and a Canary File management system. A Canary File is a fake computer document that is placed amongst real documents in order to aid in the early ...Authors: Ben Whitham
Year Published: 2013 | 170-179 | CyberSec2013 -
AUTOMATED MALWARE DETECTION FOR ANDROID AMDA
The Android platform is the fastest growing market in smartphone operating systems to date. As such, it has become the most viable target of security threats. The reliance of the Android Market ...Authors: Kevin Joshua Abela, Jan Raynier Delas Alas, Don Kristopher Angeles, Robert Joseph Tolentino, Miguel Alberto Gomez
Year Published: 2013 | 180-188 | CyberSec2013 -
RAM FORENSICS AGAINST CYBER CRIMES INVOLVING FILES
Cyber crimes are explosively increasing as a result of the wide deployment of the Internet. Breaking into others' machines to steal their valuable information (such as credit card numbers) or execute ...Authors: Mohammed Al-Saleh, Ziad Al-Sharif
Year Published: 2013 | 189-197 | CyberSec2013 -
AUTOMATED SIGNATURE CREATOR FOR A SIGNATURE BASED INTRUSION DETECTION SYSTEM (PANCAKES)
A Signature-based Intrusion Detection System (IDS) helps in maintaining the integrity of data in a network controlled environment. Unfortunately, this type of IDS depends on predetermined intrusion ...Authors: Frances Bernadette De Ocampo, Trisha Mari Del Castillo, Miguel Alberto Gomez
Year Published: 2013 | 198-205 | CyberSec2013 -
EMPIRICAL ASSESSMENT OF DATA PROTECTION AND CIRCUMVENTION TOOLS AVAILABILITY IN MOBILE NETWORKS
The paper provides an insight on the risks and vulnerabilities of the mobile smartphone. It analyzes the technologies available regarding their capacity to protect the user privacy and to combat ...Authors: Cormac Callanan, Borka Jerman-Blazic, Hein Dries-Ziekenheiner
Year Published: 2013 | 206-220 | CyberSec2013 -
INHERENT ID: A NOVEL APPROACH TO DETECT COUNTERFEIT CONSUMER GOODS USING PRODUCT INHERENT FEATURES
Product-Piracy or counterfeiting is a well known problem which leads to economic damage that affects in particular countries that use advanced production and manufacturing processes based on ...Authors: Christian Horn, Matthias Blankenburg, Jorg Kruger
Year Published: 2013 | 221-230 | CyberSec2013 -
ADAPTIVE SECURITY AND TRUST
In this paper we discuss ongoing work in an ambitious DARPA funded effort to develop new ways of achieving cyber security. The broad approach taken by the project is for the network to be self-aware ...Authors: Paul Robertson, Robert Laddaga
Year Published: 2013 | 231-239 | CyberSec2013 -
THE CYBER DOGS OF WAR: JOINT EFFORTS OF FUTURE WORLD LEADERS IN THE PREVENTION OF CYBERWARFARE
Cyberwarfare is best viewed as “old wine in a new bottle” as the exigencies of the traditional laws of war remain unchanged. Using this paradigm, this article analyzes the challenges of warfare ...Authors: Nadiya Kostyuk, Marielle Ali
Year Published: 2013 | 240-251 | CyberSec2013 -
AWAKEN THE CYBER DRAGON: CHINA'S CYBER STRATEGY AND ITS IMPACT ON ASEAN
The increase in frequency of cyber attacks launched against the Association of South East Asian Nations (ASEAN) regional bloc that have been attributed to the People’s Republic of China (PRC) sets ...Authors: Miguel Alberto Gomez
Year Published: 2013 | 252-261 | CyberSec2013 -
BLACKLISTING OF MALICIOUS WEB PAGES BY EVALUATION OF DOMAIN REGISTRATION INFORMATION
Malicious web pages that host drive by download exploits have become a popular means by which an attacker delivers malicious contents onto computers across the internet. As a result of the increase ...Authors: Ralph Edem Agbefum, Yoshiaki Hori, Kouichi Sakurai
Year Published: 2013 | 262-273 | CyberSec2013 -
THE METHODOLOGY OF INTERVIEWING PSYCHIATRIC PATIENTS: TO KNOW PATIENT'S PRIVACY CONCERNS IN BEHAVIOR MONITORING SYSTEM
This paper discusses on the methodology of interviewing psychiatric patients as a case study done in a hospital, in Malaysia. The purpose of the interview is to elicit patient’s privacy concern if ...Authors: Rusyaizila Ramli, Nasriah Zakaria, Norlia Mustaffa
Year Published: 2013 | 274-280 | CyberSec2013 -
TULUNGAN: A SELF-PROMOTING- RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILTERING SYSTEMS
Virtualisation technologies have established their importance as core components of modern digital communications. With the increasing trend towards outsourcing and cloud services, virtualisation ...Authors: Alexis Pantola, Susan Pancho-Festin, Florante Salvador
Year Published: 2013 | 281-292 | CyberSec2013