8 research outputs found

    Cloud Digital Forensics Evaluation and Crimes Detection

    Get PDF
    © 2018, ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering. Cloud computing is one of the significant topics of today’s era; due to the enhancement it brings to the Information Technology world. This transformation lead to its rapid adoption by different sectors, ranging from enterprise to personal usage. Organizations are constantly looking for ways to increase productivity with optimum cost; which derived the need for Cloud environments and its underlying virtualized infrastructure. With the increase usage of Cloud based infrastructure, criminals utilized its anonymity factor to hide their criminal activities; escaping from legal actions. This paper highlights the obstacles experienced during Cloud virtual layer forensics acquisition and analysis, due to lack of specialized forensics tools. We have developed a framework to aid in assessing the virtual environment readiness for forensics investigation and examine the applicability of existing state-of-the-art forensics tools to Cloud environment. The paper reveals the need for having specialized forensics tools for Cloud infrastructure forensics

    Forensic analysis of xbox one and playstation 4 gaming consoles

    Get PDF
    © 2016 IEEE. This paper highlights the challenges faced due to non-Availability of trusted specialized forensic tools for conducting investigation on gaming consoles. We have developed a framework to examine existing state-of-The-Art forensic acquisition and analysis tools by exploring their applicability to eighth generation gaming consoles such as the Xbox One and PlayStation 4. The framework is used to validate the acquired images, compare the retrieved artifacts before and after restoring the console to the factory settings, and to conduct network forensics on both devices. The paper reveals the need of specialized forensic tools for forensic analysis of these devices

    Evaluation of Linux SMTP server security aspects - A case study

    Get PDF
    © 2016 IEEE. Humans communication and interaction have dramatically changed in the last century with the introduction of advanced technologies. One important form of communication are electronic mails (email), as it is not only used for personal purposes but also used on a professional level. With the increase of electronic communication, spams have widely increased targeting individuals, having a doubtful intention such as stealing personal information to be misused or even to paralyze the Email system by injecting viruses. Therefore, to protect email users from spams and viruses, it is crucial to protect our SMTP server. In this paper, a case study is raised by configuring two SMTP servers and 6 different scenarios, for the purpose of evaluating and addressing email security issues. Various anti-spam and filtering techniques were highlighted and analyzed, along with reporting and visualizing functionalities to further assist system administrators to control and monitor SMTP server

    Analysis of cloud computing attacks and countermeasures

    Get PDF
    © 2016 Global IT Research Institute (GiRI). Business enterprises are competing to get their applications up and running faster with improved manageability and less maintenance by reassigning the ability to IT specialists to adjust resources in order to meet business fluctuating needs. This can be achieved through utilizing the Cloud Computing Model which is distinguished by \u27pay as you go\u27 model. The model offers solutions of storage, convenient and on-demand access to a shared pool of configurable computing resources. As with any novel technology, Cloud Computing is subject to security threats and vulnerabilities including network threats, information threats and underlying infrastructure threats. In this paper, we present a framework by which penetration testing is conducted to highlight possible vulnerabilities within our private Cloud Computing infrastructure, simulate attacks to exploit discovered vulnerabilities such as Denial of Service (DoS) and Man-in-the-Cloud attacks, apply countermeasures to prevent such attacks, and then to exemplify a recommended best practice protection mechanism which will contribute to the Cloud Computing security

    Comparison of resting and adenosine-free pressure indices with adenosine-induced hyperemic fractional flow reserve in intermediate coronary lesions

    No full text
    Objective: Fractional flow reserve (FFR) using adenosine has been the gold standard in the functional assessment of intermediate coronary stenoses in the catheterization laboratory. We aim to study the correlation of adenosine-free indices such as whole cycle Pd/Pa [the ratio of mean distal coronary pressure (Pd) to the mean pressure observed in the aorta (Pa)], instantaneous wave-free ratio (iFR), and contrast-induced submaximal hyperemia (cFFR) with FFR. Methods: This multicenter, prospective, observational study included patients with stable angina or acute coronary syndrome (>48 h since onset) with discrete intermediate coronary lesions (40–70% diameter stenosis). All patients underwent assessment of whole cycle Pd/Pa, iFR, cFFR, and FFR. We then evaluated the correlation of these indices with FFR and assessed the diagnostic efficiencies of them against FFR ≤0.80. Results: Of the 103 patients from three different centers, 83 lesions were included for analysis. The correlation coefficient (r value) of whole cycle Pd/Pa, iFR, and cFFR in relation to FFR were +0.84, +0.77, and +0.70 (all p values < 0.001), respectively, and the c-statistic against FFR ≤0.80 were 0.92 (0.86–0.98), 0.89(0.81–0.97), and 0.91 (0.85–0.97) (all p values < 0.001), respectively. The best cut-off values identified by receiver–operator characteristic curve for whole cycle Pd/Pa, iFR, and cFFR were 0.94, 0.90, and 0.88, respectively, for an FFR ≤0.80. By the concept of “adenosine-free zone” (iFR = 0.86–0.93), 59% lesions in this study would not require adenosine. Conclusion: All the three adenosine-free indices had good correlation with FFR. There is no difference in the diagnostic accuracies among the indices in functional evaluation of discrete intermediate coronary stenoses. However, further validation is needed before adoption of adenosine-free pressure parameters into clinical practice. Keywords: Intermediate coronary stenosis, Fractional flow reserve, Instantaneous wave-free ratio, Whole cycle Pd/Pa, Contrast FF

    When metal–organic framework mediated smart drug delivery meets gastrointestinal cancers

    No full text
    corecore