17 research outputs found

    New improvement in digital forensic Standard Operating Procedure (SOP)

    Get PDF
    In today’s digital forensic investigation, there are hundreds of specific and unique application software packages and hardware device that could be used in the investigation. Even with all this yet there are quite number of failure in SOP that being practiced by the current digital forensic investigator.In this research paper an improved SOP is being proposed. This proposed SOP will be flexible rather than being limited to a particular process of an investigation

    Complete Security Package for USB Thumb Drive

    Get PDF
    This paper is devoted to design and implement a complete security platform for USB flash disks due to the popularity of this device in exchanging data, it is a complete system security solution as it concerns the thumb drive due to the manipulation of I/O operation not the file system.  USB flash disks have been the major threat for computer system beside the internet threats where viruses can spread from computer to computer or from computer to network. USB complete security system presented by this paper is composed of three essential elements: kernel filter driver which will be installed in USB device driver stack to intercept all exchanged packets and send it to encryption unit, kernel level encryption/decryption unit and configuration unit. In contrary to most USB security modules the system presented by this paper will store only the round number of the key generator with the encrypted data. Round number will be coded using MD5 algorithm to increase the immunity of attacking data stored in the flash disks. Keywords: USB protection, kernel driver, device stack, encryption/decryption, filter driver, MD5.

    NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)

    Get PDF
    ABSTRACT. In today's digital forensic investigation, there are hundreds of specific and unique application software packages and hardware device that could be used in the investigation .Even with all this yet there are quite number of failure in SOP that being practiced by the current digital forensic investigator .In this research paper an improved SOP is being proposed. This proposed SOP will be flexible rather than being limited to a particular process of an investigation

    The success model of evolution from government to e-governance

    Get PDF
    As the world is streaming into the electronic world there are still huge communities which don’t understand the revolution of government which already switch into the era of e-government.There are still a huge community which till now does not understand what is actually e-government and e –governance. And at the same time they don’t understand what is actually the transmission between the old government and the new e government framework model. The actual positive idea to develop this model is to understand the e-governance better and at the same time this will avoid from possible problem during the period of transition. Towards introducing the new model we also will identify new model we also will identify few unique cases of e-government. As fast as WWW (World Wide Web) concern it grows beyond the limitation line, this made a considerable attention to be focused on the adoption of web-based technology to the business to business (B2B) and business to consumer (B2C) sector. As the heat of this sector goes on another few are also entering into the picture whereby involving government such as government to business (G2B) and government to citizen (G2C) this wont be a shocking if the government whether local, regional, national, or even supranational have been slower to clamber onto the web enabled bandwagon. The concepts of the traditional government are more conservative entity,slower to change into new initiatives, than operators in the commercial fields

    Preventive measures for cross site request forgery attacks on web-based applications

    Get PDF
    Today's contemporary business world has incorporated Web Services and Web Applications in its core of operating cycle nowadays and security plays a major role in the amalgamation of such services and applications with the business needs worldwide. OWASP (Open Web Application Security Project) states that the effectiveness of security mechanisms in a Web Application can be estimated by evaluating the degree of vulnerability against any of the nominated top ten vulnerabilities, nominated by the OWASP. This paper sheds light on a number of existing tools that can be used to test for the CSRF vulnerability. The main objective of the research is to identify the available solutions to prevent CSRF attacks. By analyzing the techniques employed in each of the solutions, the optimal tool can be identified. Tests against the exploitation of the vulnerabilities were conducted after implementing the solutions into the web application to check the efficacy of each of the solutions. The research also proposes a combined solution that integrates the passing of an unpredictable token through a hidden field and validating it on the server side with the passing of token through URL

    Query translation for multilingual content with semantic technique

    Get PDF
    Cross-lingual information retrieval (CLIR) allows user query in a different language from the language of target resources. Thus, translation is the key element in the query processing. There are three translation approaches: query, document, or hybrid query-document. However, query translation is very challenging due to the polysemy problem. Different linguistic nature of the languages will lead to ambiguity of meaning subsequently user’s true intention could be misinterpreted. This paper presents a semantic technique on query translation for a multilingual knowledge repository to improve the query processing. Offline translated documents or parallel corpora in English, Arabic, and Malay language including Jawi text was used as the data. Set of keywords were constructed preidentified by expert related to prophetic food. These keywords were annotated with the relevant Quranic verses, Hadith texts, Manuscript text images and scientific article determined by expert. The synonym and context-based translation was annotated together with the specific keyword. A query will do a three-way pattern match based on the keyword indexing list that link to the relevant documents. A one-stop knowledge repository on prophetic food was developed as a proof of concept using sources are from al-Quran, Hadith, classical manuscript, and scientific articles verified by experts to ensure the content authenticity and integrity

    Comprehensive literature review on delay tolerant network (DTN) framework for improving the efficiency of internet connection in rural regions of Malaysia

    Get PDF
    This paper brief in detail the technology reviews of current available technologies and literature reviews that starts with the history of the Internet and the understanding of the working of the Internet through a conceptual model of TCP/IP and OSI models, the numerous technologies developed to cater for different connectivity environments and recent popular topics in the field of communication technologies. Detailed review is done on the subject of Delay-Tolerant Networking (DTN), the chosen technology from which the intended framework can be proposed for improving the efficiency of internet connections. From these literatures, comparisons are made to find the best possible combinations of technologies to design a mini- mum viable product, followed by a generic DTN framework

    Proposed data quality evaluation method for a transportation agency

    Get PDF
    The data quality evaluation is essential towards designing a data assessment method for any company because data is an important asset. Therefore, the purpose of this study is to develop the data quality evaluation method for a transportation agency in Malaysia in order to quantify the quality of data in the SIKAP licensing system. This can benefit the transportation agency to improve the quality of data for the use of reporting, forecasting business operations and data integration with other agency’s systems. The relevant data evaluation dimensions have been identified from literature study and relative data evaluation framework which are necessarily required by the transportation agency to maintain high data quality in the SIKAP system. The process design for the proposed method involves data dimension identification, capturing the relevant database structure, subjective evaluation with a questionnaire and objective evaluation with data profiling. From the design process, the result shows that data evaluation method for a transportation agency must have a minimum of six data quality dimensions. SIKAP, the legacy system is in the process to revamp into a new system. Thus, this research contributes to enhance the current system’s data quality during revamping process and data migration into the new system

    An Effectual Secured Approach Against Sybil Attacks in Wireless Networks

    No full text
    In both wireless and mobile ad hoc networks, assaults can come from a variety of different sources. The terms "active attack" and "passive attack" describe these two types of attacks. In the network community, the Sybil attack is one of the most often used and deployed techniques for sniffing identities and repurposing them. Multiple identities or Sybil attacks have recently sparked a lot of interest in the research community. The algorithms and networks on which they are tested are vastly different among the many methods that have been offered. Since researchers can't evaluate these systems side by side or test their efficacy on real-world social networks with a variety of structural features, it's difficult to say whether there are any other (perhaps more efficient) methods of Sybil protection. In the event of a Sybil attack, the gatecrasher subverts the system framework's notoriety arrangement by creating a large number of pseudonymous individuals and then using them to add an enormously imbalanced influence. Three factors determine a notoriety framework's susceptibility to a Sybil attack: how quickly personalities can be generated, how much the notoriety framework accepts inputs from substances that lack a chain of trust, and if the notoriety framework handles all components equally. A large-scale Sybil ambush in Bittorrent Mainline may be accomplished in a cheap and effective manner, according to confirmation. A substance on a distributed system is a piece of software that has access to the resources of the local community. By displaying a character, a distributed system element reveals itself to the world. A single chemical can have an impact on more than one character. Numerous characters can be assigned to a single element. The personalities of substances in shared systems are used for the objectives of repetition, asset transfer, reliability, and trustworthiness, among other reasons. For remote elements to be aware of characters without necessarily being aware of the personality-to-neighborhood correlation, distributed systems make use of the character as a decision. Each different identification is normally considered to be associated with a separate local entity by convention. A single local entity may have several identities in actuality. In order to avoid and identify Sybil assaults, an empirical technique is used in this study. According to the base paper, any nodes with RSS greater than the provided threshold are regarded to be attackers under the present approach. A centralized way to monitor the mobile nodes is required to prevent this assault. As the server agent assumes full control of the ad-hoc network, malevolent nodes or selfish nodes are fully eliminated from the system
    corecore