Scheduled System Maintenance:
On Wednesday, July 29th, IEEE Xplore will undergo scheduled maintenance from 7:00-9:00 AM ET (11:00-13:00 UTC). During this time there may be intermittent impact on performance. We apologize for any inconvenience.
By Topic

Digital Forensics and Incident Analysis, 2007. WDFIA 2007. Second International Workshop on

Date 27-28 Aug. 2007

Filter Results

Displaying Results 1 - 16 of 16
  • Second International Workshop on Digital Forensics and Incident Analysis - Cover

    Publication Year: 2007 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (49 KB)  
    Freely Available from IEEE
  • Second International Workshop on Digital Forensics and Incident Analysis-Title

    Publication Year: 2007 , Page(s): i - iii
    Save to Project icon | Request Permissions | PDF file iconPDF (58 KB)  
    Freely Available from IEEE
  • Second International Workshop on Digital Forensics and Incident Analysis-Copyright

    Publication Year: 2007 , Page(s): iv
    Save to Project icon | Request Permissions | PDF file iconPDF (59 KB)  
    Freely Available from IEEE
  • Second International Workshop on Digital Forensics and Incident Analysis - TOC

    Publication Year: 2007 , Page(s): v
    Save to Project icon | Request Permissions | PDF file iconPDF (29 KB)  
    Freely Available from IEEE
  • Welcome message

    Publication Year: 2007 , Page(s): vi
    Save to Project icon | Request Permissions | PDF file iconPDF (21 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • Technical Program Committee

    Publication Year: 2007 , Page(s): vii
    Save to Project icon | Request Permissions | PDF file iconPDF (20 KB)  
    Freely Available from IEEE
  • Additional reviewers

    Publication Year: 2007 , Page(s): viii
    Save to Project icon | Request Permissions | PDF file iconPDF (18 KB)  
    Freely Available from IEEE
  • Internet Forensics: Legal and Technical Issues

    Publication Year: 2007 , Page(s): 3 - 12
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (183 KB) |  | HTML iconHTML  

    This paper provides a combined approach on the major issues pertaining to the investigation of cyber crimes and the deployment of Internet forensics techniques. It discusses major issues from a technical and legal perspective and provides general directions on how these issues can be tackled. The paper also discusses the implications of data mining techniques and the issue of privacy protection wi... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • International Cooperation to Fight Transnational Cybercrime

    Publication Year: 2007 , Page(s): 13 - 27
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    The ever growing use of computers and information communication technologies in the world of "e-everything" has opened up a range of new activities for crime to take place through electronic means on a global scale, irrespective of national and transnational borders. The effective combating, investigation and prosecution of such crimes require international cooperation between countries, law enfor... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Cybercrime Investigation Training and Specialist Education for the European Union

    Publication Year: 2007 , Page(s): 28 - 37
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (208 KB) |  | HTML iconHTML  

    The first major piece of malicious software, the Morris worm, hit the Internet in November 1988. Since then the Internet has experienced an explosion of malware and virus attacks affecting individuals and organizations alike. More recently the world has seen concerted efforts by organized criminals to commit IT crimes on a global scale. In order to effectively deal with criminal activities such as... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Fair Solution to DNS Amplification Attacks

    Publication Year: 2007 , Page(s): 38 - 47
    Cited by:  Papers (7)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (339 KB) |  | HTML iconHTML  

    Recent serious security incidents reported several attackers employing IP spoofing to massively exploit recursive name servers to amplify DDoS attacks against numerous networks. DNS amplification attack scenarios utilize DNS servers mainly for performing bandwidth consumption DoS attacks. This kind of attack takes advantage of the fact that DNS response messages may be substantially larger than DN... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Cognitive Model for the Forensic Recovery of End-User Passwords

    Publication Year: 2007 , Page(s): 48 - 54
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (196 KB) |  | HTML iconHTML  

    Despite the existence of a number of advanced authentication mechanisms such as two- factor tokens, biometrics etc., the use of passwords is still the most popular means of authenticating users in a computing system. Consequently, we need to generate and remember a large number of passwords, and these passwords need to be as strong as the assets they protect. During the course of a forensic examin... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Luring: A framework to induce a suspected user into Context Honeypot

    Publication Year: 2007 , Page(s): 55 - 64
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (148 KB) |  | HTML iconHTML  

    The objective of context honeypot is to identify a probable privacy violator before he actually succeeds in capturing desired precious information. We believe that in the environment of robust implementation of privacy policy, privacy breaches can occur only through masquerading. Success of context honeypot depends on efficient luring (by using lure messages) of probable privacy violator. Lure mes... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Applying a cryptographic scheme in the RPINA protocol

    Publication Year: 2007 , Page(s): 65 - 74
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (267 KB) |  | HTML iconHTML  

    The Respect Private Information of Non Abusers (RPINA) protocol allows users to communicate anonymously while the corresponding server ensures that the identity of the user will be revealed by a third party, called Directory Service (DS), should the user attempt a malicious attack. However, malicious co-operation between the server and the DS is the major vulnerability of the RPINA protocol. In th... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Parallel Password Cracker: A Feasibility Study of Using Linux Clustering Technique in Computer Forensics

    Publication Year: 2007 , Page(s): 75 - 82
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (184 KB) |  | HTML iconHTML  

    Today, nearly all computer forensic analyses are done on stand-alone computers. The fundamental reason is that analysis software are not developed for parallel processing. This paper describes a feasibility study in building a Linux based high-performance computing cluster (HPC-cluster) cluster and the development of a parallelised password cracker application using the Message Passing Interface (... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Author index

    Publication Year: 2007 , Page(s): 83
    Save to Project icon | Request Permissions | PDF file iconPDF (19 KB)  
    Freely Available from IEEE