5 research outputs found
SocialStegDisc: Application of steganography in social networks to create a file system
The concept named SocialStegDisc was introduced as an application of the
original idea of StegHash method. This new kind of mass-storage was
characterized by unlimited space. The design also attempted to improve the
operation of StegHash by trade-off between memory requirements and computation
time. Applying the mechanism of linked list provided the set of operations on
files: creation, reading, deletion and modification. Features, limitations and
opportunities were discussed.Comment: 5 pages, 5 figure
Methods for Information Hiding in Open Social Networks
This paper summarizes research on methods for information hiding in Open Social Networks. The first contribution is the idea of StegHash, which is based on the use of hashtags in various open social networks to connect multimedia files (such as images, movies, songs) with embedded hidden data. The proof of concept was implemented and tested using a few social media services. The experiments confirmed the initial idea. Next, SocialStegDisc was designed as an application of the StegHash method by combining it with the theory of filesystems. SocialStegDisc provides the basic set of operations for files, such as creation, reading or deletion, by implementing the mechanism of a linked list. It establishes a new kind of mass-storage characterized by unlimited data space, but limited address space where the limitation is the number of the hashtags' unique permutations. The operations of the original StegHash method were optimized by trade-offs between the memory requirements and computation time. Features and limitations were identified and discussed. The proposed system broadens research on a completely new area of threats in social networks
Forensic Analysis in Linux OS
Práce se zabĂ˝vá rozborem moĹľnostĂ forenznĂ analĂ˝zy pĹ™i vyšetĹ™ovánĂ na operaÄŤnĂch systĂ©mech Linux. PouĹľitĂm distribuce BackTrack a obsaĹľenĂ˝ch nástrojĹŻ je provedeno forenznĂ vyšetĹ™ovánĂ na testovacĂ instalaci operaÄŤnĂho systĂ©mu Xubuntu. Práce je rozdÄ›lena do kapitol, kde postupnÄ› popisuje základy operaÄŤnĂho systĂ©mu Linux, pĹ™es poĹľadavky kladenĂ© na vyšetĹ™ovatele a jeho vybavenĂ aĹľ k seznámenĂ s nástroji pouĹľĂvanĂ˝mi na analĂ˝zu. Všechny porovnávanĂ© nástroje jsou volnÄ› dostupnĂ© a svou velikostĂ sahajĂ od jednoduchĂ˝ch nástrojĹŻ aĹľ po komplexnĂ prostĹ™edĂ. TeoretickĂ© poznatky jsou aplikovány na reálnĂ˝ systĂ©m, kde je ukázáno pouĹľitĂ analyzovanĂ˝ch nástrojĹŻ. Práce je zakonÄŤena shrnutĂm nálezĹŻ vyšetĹ™ovánĂ do forenznĂho posudku.This thesis deals with possibilities of forensic analysis on Linux operating system investigation. Forensic investigation is performed on test installation of Xubuntu using BackTrack distribution and tools included on it. The thesis is divided into chapters, starting with operating system Linux basics, continuing with requirements for investigator and his equipment to tools used for analysis. All discussed tools are available for free, their size vary from simple and small tools to complex frameworks. Theoretical knowledge is applied to real system and usage of tools is shown. This thesis ends with forensic report, which summarizes all findings gathered during investigation.
An Evaluation of Forensic Tools for Linux : Emphasizing EnCase and PyFlag
Denne masteroppgaven gir en vurdering og sammenligning av flere datakriminaltekniske verktøy, med et spesielt fokus på to spesifikke verktøy. Det første kalles EnCase Forensics og er et kommersielt tilgjengelig verktøy som blir benyttet av politi og myndigheter flere steder i verden. Det andre kalles PyFlag og er et open source alternativ som ble benyttet i det vinnende bidraget til Digital Forensics Research Workshop (DFRWS) i 2008. Selv om verktøyene blir evaluert i sin helhet, vil hovedfokuset ligge på viktig søkefunksjonalitet.
Tatt i betraktning at mesteparten av forskningen innen området er basert på Microsoft Windows plattformen, mens mindre forskning har blitt utført angående analyse av Linux systemer, så undersøker vi disse verktøyene hovedsakelig i et Linux miljø. Med disse verktøyene utfører vi datakriminalteknisk utvinning og analyse av realistiske data. I tillegg benyttes et verktøy med navn dd, for å utvinne data fra Linux. Denne masteroppgaven inneholder spesifiserte testprosedyrer, problemer vi støtte på under selve testingen, og de endelige resultatene