Loading [MathJax]/extensions/MathMenu.js
Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007) - Conference Table of Contents | IEEE Xplore
International Workshop on Digital Forensics and Incident Analysis (WDFIA)

Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007)

DOI: 10.1109/IEEECONF13171.2007

27-28 Aug. 2007

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Digital Forensics and Incident Analysis (WDFIA), 2007 2nd Annual Workshop on

Second International Workshop on Digital Forensics and Incident Analysis - Cover

Publication Year: 2007,Page(s):c1 - c1

Second International Workshop on Digital Forensics and Incident Analysis - Cover

Second International Workshop on Digital Forensics and Incident Analysis-Title

Publication Year: 2007,Page(s):i - iii

Second International Workshop on Digital Forensics and Incident Analysis-Title

Second International Workshop on Digital Forensics and Incident Analysis-Copyright

Publication Year: 2007,Page(s):iv - iv

Second International Workshop on Digital Forensics and Incident Analysis-Copyright

Second International Workshop on Digital Forensics and Incident Analysis - TOC

Publication Year: 2007,Page(s):v - v

Second International Workshop on Digital Forensics and Incident Analysis - TOC

Additional reviewers

Publication Year: 2007,Page(s):viii - viii
This paper provides a combined approach on the major issues pertaining to the investigation of cyber crimes and the deployment of Internet forensics techniques. It discusses major issues from a technical and legal perspective and provides general directions on how these issues can be tackled. The paper also discusses the implications of data mining techniques and the issue of privacy protection wi...Show More
The ever growing use of computers and information communication technologies in the world of "e-everything" has opened up a range of new activities for crime to take place through electronic means on a global scale, irrespective of national and transnational borders. The effective combating, investigation and prosecution of such crimes require international cooperation between countries, law enfor...Show More
The first major piece of malicious software, the Morris worm, hit the Internet in November 1988. Since then the Internet has experienced an explosion of malware and virus attacks affecting individuals and organizations alike. More recently the world has seen concerted efforts by organized criminals to commit IT crimes on a global scale. In order to effectively deal with criminal activities such as...Show More
Recent serious security incidents reported several attackers employing IP spoofing to massively exploit recursive name servers to amplify DDoS attacks against numerous networks. DNS amplification attack scenarios utilize DNS servers mainly for performing bandwidth consumption DoS attacks. This kind of attack takes advantage of the fact that DNS response messages may be substantially larger than DN...Show More
Despite the existence of a number of advanced authentication mechanisms such as two- factor tokens, biometrics etc., the use of passwords is still the most popular means of authenticating users in a computing system. Consequently, we need to generate and remember a large number of passwords, and these passwords need to be as strong as the assets they protect. During the course of a forensic examin...Show More
The objective of context honeypot is to identify a probable privacy violator before he actually succeeds in capturing desired precious information. We believe that in the environment of robust implementation of privacy policy, privacy breaches can occur only through masquerading. Success of context honeypot depends on efficient luring (by using lure messages) of probable privacy violator. Lure mes...Show More
The Respect Private Information of Non Abusers (RPINA) protocol allows users to communicate anonymously while the corresponding server ensures that the identity of the user will be revealed by a third party, called Directory Service (DS), should the user attempt a malicious attack. However, malicious co-operation between the server and the DS is the major vulnerability of the RPINA protocol. In th...Show More
Today, nearly all computer forensic analyses are done on stand-alone computers. The fundamental reason is that analysis software are not developed for parallel processing. This paper describes a feasibility study in building a Linux based high-performance computing cluster (HPC-cluster) cluster and the development of a parallelised password cracker application using the Message Passing Interface (...Show More

Author index

Publication Year: 2007,Page(s):83 - 83

Proceedings

The proceedings of this conference will be available for purchase through Curran Associates.

Digital Forensics and Incident Analysis (WDFIA), 2007 2nd Annual Workshop on