Advances in digital forensics XVII : 17th IFIP WG 11.9 International Conference, Virtual event, February 1-2, 2021, Revised selected papers / Gilbert Peterson, Sujeet Shenoi (eds.)

ADVANCES IN DIGITAL FORENSICS XVII Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things hav...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Springer)
Corporate Author: IFIP International Conference on Digital Forensics Online
Other Authors: Peterson, Gilbert, 1969- (Editor), Shenoi, Sujeet (Editor)
Other title:Advances in digital forensics 17.
Format: Conference Proceeding eBook
Language:English
Published: Cham, Switzerland : Springer, 2021.
Series:IFIP advances in information and communication technology ; 612.
Subjects:

MARC

LEADER 00000cam a2200000xi 4500
001 b12086158
003 CoU
005 20220201213020.0
006 m o d
007 cr |||||||||||
008 211019s2021 sz a o 100 0 eng d
019 |a 1277140554  |a 1277280130  |a 1287775797  |a 1292518876 
020 |a 9783030883812  |q (electronic bk.) 
020 |a 3030883817  |q (electronic bk.) 
020 |z 9783030883805  |q (print) 
020 |z 3030883809 
024 7 |a 10.1007/978-3-030-88381-2 
035 |a (OCoLC)spr1277149647 
035 |a (OCoLC)1277149647  |z (OCoLC)1277140554  |z (OCoLC)1277280130  |z (OCoLC)1287775797  |z (OCoLC)1292518876 
037 |a spr978-3-030-88381-2 
040 |a GW5XE  |b eng  |e rda  |e pn  |c GW5XE  |d YDX  |d EBLCP  |d OCLCF  |d DCT  |d N$T  |d OCLCO  |d DKU 
049 |a GWRE 
050 4 |a QA76.9.A25 
111 2 |a IFIP International Conference on Digital Forensics  |n (17th :  |d 2021 :  |c Online) 
245 1 0 |a Advances in digital forensics XVII :  |b 17th IFIP WG 11.9 International Conference, Virtual event, February 1-2, 2021, Revised selected papers /  |c Gilbert Peterson, Sujeet Shenoi (eds.) 
246 3 |a Advances in digital forensics 17. 
264 1 |a Cham, Switzerland :  |b Springer,  |c 2021. 
300 |a 1 online resource (xiv, 267 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
347 |a text file  |b PDF  |2 rda. 
490 1 |a IFIP advances in information and communication technology,  |x 1868-422X ;  |v 612. 
505 0 |a Intro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN -- ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security. 
505 8 |a 2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process. 
505 8 |a 6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity. 
505 8 |a 3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files -- 5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References. 
505 8 |a III ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work. 
520 |a ADVANCES IN DIGITAL FORENSICS XVII Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: ¨ Themes and Issues ¨ Approximate Matching Techniques ¨ Advanced Forensic Techniques ¨ Novel Applications ¨ Image Forensics This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, a fully-remote event held in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA. 
588 0 |a Online resource; title from PDF title page (SpringerLink, viewed October 19, 2021) 
650 0 |a Digital forensic science  |v Congresses. 
650 0 |a Computer science  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101220. 
650 0 |a Computer security  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008101458. 
650 0 |a Data encryption (Computer science)  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2008102033. 
650 0 |a Application software  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2007101201. 
650 0 |a Computers and civilization  |v Congresses.  |0 http://id.loc.gov/authorities/subjects/sh2009120889. 
650 7 |a Application software.  |2 fast  |0 (OCoLC)fst00811706. 
650 7 |a Computer science.  |2 fast  |0 (OCoLC)fst00872451. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
650 7 |a Computers and civilization.  |2 fast  |0 (OCoLC)fst00872888. 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935. 
650 7 |a Digital forensic science.  |2 fast  |0 (OCoLC)fst02000600. 
655 7 |a Conference papers and proceedings.  |2 fast  |0 (OCoLC)fst01423772. 
700 1 |a Peterson, Gilbert,  |d 1969-  |e editor.  |0 http://id.loc.gov/authorities/names/no2010108820  |1 http://isni.org/isni/0000000082854632. 
700 1 |a Shenoi, Sujeet,  |e editor.  |0 http://id.loc.gov/authorities/names/no2003120832  |1 http://isni.org/isni/0000000121197277. 
776 0 8 |i Print version:  |z 3030883809  |z 9783030883805  |w (OCoLC)1266896159. 
830 0 |a IFIP advances in information and communication technology ;  |v 612.  |0 http://id.loc.gov/authorities/names/no2009175546. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-88381-2  |z Full Text (via Springer) 
907 |a .b120861586  |b 03-01-22  |c 02-04-22 
998 |a web  |b 02-28-22  |c b  |d b   |e -  |f eng  |g sz   |h 0  |i 1 
907 |a .b120861586  |b 02-28-22  |c 02-04-22 
944 |a MARS - RDA ENRICHED 
915 |a I 
956 |a Springer e-books 
956 |b Springer Computer Science eBooks 2021 English+International 
999 f f |i 1bde6431-dcbd-5bfa-9ab8-458d776982b5  |s 821245a1-4019-57f5-9fad-ca9661ec97e0 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25  |h Library of Congress classification  |i Ebooks, Prospector  |n 1