4 research outputs found

    A Regular Pattern of Timestamps Between Machines with Built-in System Time

    Get PDF
    This paper studied the effect of 15.6 ms time resolution where the collected timestamps are in a form of parallel dotted lines, instead of one straight line like in classical case. The dotted lines made the clock skew measurement of two devices to become incorrect as the measurement which normally follow the cluster of offsets but now follow the parallel dotted lines. Dotted lines pattern is required in order to understand how to correct the clock skew measurement on data containing dotted lines. To model the dotted lines pattern is through Dotted lines Grouping Method, a tools to find the characteristics of the dotted lines. The dotted lines grouping method was then tested data obtained from wired and wireless communication of two similar devices. The dotted line grouping method results equal maximum number of dot of 10 for both data, which indicated the robustness of the dotted lines grouping method

    An examination of the Asus WL-HDD 2.5 as a nepenthes malware collector

    No full text
    The Linksys WRT54g has been used as a host for network forensics tools for instance Snort for a long period of time. Whilst large corporations are already utilising network forensic tools, this paper demonstrates that it is quite feasible for a non-security specialist to track and capture malicious network traffic. This paper introduces the Asus Wireless Hard disk as a replacement for the popular Linksys WRT54g. Firstly, the Linksys router will be introduced detailing some of the research that was undertaken on the device over the years amongst the security community. It then briefly discusses malicious software and the impact this may have for a home user. The paper then outlines the trivial steps in setting up Nepenthes 0.1.7 (a malware collector) for the Asus WL-HDD 2.5 according to the Nepenthes and tests the feasibility of running the malware collector on the selected device. The paper then concludes on discussing the limitations of the device when attempting to execute Nepenthes
    corecore