Adopting Hadith Verification Techniques in to Digital Evidence Authentication
|
|
|
- Millicent Jennings
- 10 years ago
- Views:
Transcription
1 Journal of Computer Science 6 (6): , 2010 ISSN Science Publications Adopting Hadith Verification Techniques in to Digital Evidence Authentication Yunus Yusoff, Roslan Ismail and Zainuddin Hassan Department of Software Engineering, College of Information Technology, University Tenaga National, Kajang, Selangor, Malaysia Abstract: Problem statement: The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Without proper classification of digital evidence, the computer forensics investigator may ended up investigating using untrusted digital evidence and ultimately cannot be use to implicate the suspected criminal. Approach: The historical methods of verifying the authenticity of a hadith were studied. The similarities between hadith authentication and digital evidence authentication were identified. Based on the similarities of the identified processes, a new method of authenticating digital evidence was proposed, together with the trust calculation algorithm and evidence classification. Results: The new investigation processes and an algorithm to calculate the trust value of given digital evidence was proposed. Furthermore, a simple classification of evidence, based on the calculated trust values was also proposed. Conclusion/Recommendations: We had successfully extracted the methods to authenticate hadith and mapped it into the digital evidence authentication processes. The trust values of digital evidence were able to be calculated and the evidence can be further classified based on the different level of trust values. The ability to classify evidence based on trust levels can offer great assistance to the computer forensics investigator to plan their works and focus on the evidence that would give them a better chance of catching the criminals. Key words: Computer forensics, digital evidence authentication, hadith authentication INTRODUCTION We are experiencing the explosive growth of the usage of computers in our daily lives, may it be at the personal or corporate levels. A great deal of companies and other organizations are using computers to conduct their businesses. While the astonishing usage of computer facilities and services has brought about great benefits to us, it has also inadvertently attracting attention of the criminals. The needs of computer forensics investigators have been directly influenced by the increasing number of crimes performed using computers. Investigators would be required to analyze the digital evidence with the objective to identify the suspected criminals. It is the responsibility of the investigator to ascertain the authenticity of the collected digital evidence. Unless the evidence can be proven to be authentic and reliable, it would be meaningless to present it in the court of law. As such, it is of a paramount important for the forensic investigator to conduct the investigation process properly and based on acceptable practices. Carrier and Spafford (2002); Noblett et al. (2000); Baryamureeba and Tushabee (2006) and Rogers et al. (2006) have discussed various techniques to conduct computer forensic investigations. Based on their discussions, it is apparent that the computer forensic investigation processes have many areas that can be further improved, especially in the area of digital evidence authentication. We are taking this opportunity to propose a digital investigation techniques derived from extensive work done in another domain i.e., hadith authentication. Our earlier works has been primarily focused on the methodology used by the authenticator of hadith. We have great expectation that the hadith authentication techniques that were developed and improved for over 1000 years ago and stand the test of times can be used to contribute to the body of knowledge in the digital authentication processes. Hadith is referred to the words, deeds, tradition, silent approval and personality of Prophet Muhammad S.A.W. (peace be upon him) (Mahmood, 2006). Ahadith (plural form of a hadith) are regarded as the Corresponding Author: Yunus Yusoff, Department of Software Engineering, College of Information Technology, University Tenaga National, Kajang, Selangor, Malaysia 613
2 2nd authority in Islam after the Al-Quran (Ali, 1996). The people who recorded the hadith, known as muhadith, took a great deal of care when recording and transmitting a hadith. Not only do they look at the content, but also at the people who narrated the hadith. Nevertheless, in the process of acquiring, transmitting and recording the life and conduct of the Prophet S.A.W., the muhadith may have unintentionally committed some mistakes (Yusoff et al., 2008). To make matters worse, there exist devious people who purposely modify and introduce new materials purportedly connected to the Prophet S.A.W. Therefore, the science of hadith was introduced, to ascertain the correctness of every single statement attributed to the Prophet S.A.W. (Azami, 1977). Hadith consist of two parts (Fig. 1) i.e., matn (content) and isnad (the sequence of people who narrated the hadith). In digital realm, matn can be equated to the actual data and isnad can be equated to the path or channel the data is obtained or transmitted. Mapping of hadith authentication onto digital investigation processes: It has been noted that there exist direct similarities between hadith authentication and digital evidence authentication. The similarities can be observed in the following areas namely content verification, transmitters reliability, transmission s reliability and change of custody. Content verification: Hadith authentication requires for the verification of its matn (content). Scholars of hadith study, known as muhadithin, have indeed paid meticulous attention to ascertain the validity of the content of a hadith. In confirming that the matn is valid, the muhadithin employed various techniques. For example, if the content of the hadith contradicted the teaching of Al- Quran, it is then classified as maudu (false/fabricated) and be automatically rejected. Prophet S.A.W. spoke using the words that were normally used by the people during his lifetime. Otherwise, it would be difficult for the people to understand and comprehend what the Prophet S.A.W. said. Therefore, if the words recorded in the hadith are unfamiliar and not normally used by the community during the lifetime of the Prophet S.A.W. then the validity of such hadith can be questioned. The actions described in the hadith must not go against the known behavior of Prophet S.A.W. Such hadith that record un-prophet-like conducts will be automatically rejected. In digital evidence investigation, there exist methods to verify that a text is produced/derived from an individual. The author identification techniques (Chaski, 2005), based on stylometric characteristics are among the various techniques that can be used to verify whether a document is indeed written/produced by the accused. The idea behind this technique is based on the fact that individuals have their own unique style of writing. It is possible to ascertain the original author of a document by analyzing certain characteristics embedded in a document, such as language style, notation used, verbs used. Based on hadith authentication methodology, if for example, the matn contains a vulgar expression or contradictory to the characteristic of Prophet Muhammad S.A.W., the hadith will be immediately rejected without the consideration of the isnad (Suhaib, 2008). Therefore, once the matn check can be proven beyond reasonable doubt that the suspect is not the author of the the checking of isnad (transmitter and transmission of the ) would no longer be required. Reliable transmitter: Even though, the content of a hadith looks acceptable and does not contradict with Al-Quran and the Prophet S.A.W., it is not guaranteed that it is genuine. It must be proven that it has been transmitted by the reliable transmitters. For every hadith, there must be a list of transmitters that can be traced all the way back to the Prophet S.A.W. It is very important for the transmitter to demonstrate that he is capable to recite and transmits the hadith accurately. He should also be proven to have a good retention of memory. Most of the hadith transmissions during the early times were done primarily via the verbal transmission based purely from memory of the narrators (Mahmood, 2006). The transmitters must also be known to have lived a righteous life. Failure of any of the transmitter to adhere to these criteria can make the hadith to be questionable and would bring down the level of validity of the particular hadith. A clear case of forgery by the transmitter would render the transmitted hadith to be outright rejected (Azami, 1977). Fig. 1: Hadith component (Yusoff et al., 2008) Reliable transmission method: Not only the narrator is subjected to scrutiny, the way the narrator transmits the hadith to another narrator is equally important and 614
3 heavily scrutinized. It will bring disrepute to the hadith if the narrator was confirmed to be acceptable, but the method of transmission was not reliable or questionable. One of the hadith transmission criteria is that the transmitter and receiver must live in the same time period. It would be a gross injustice to accept a hadith whereby the transmitter live in one period and the receiver live in a period after the death of the transmitter. In addition to the same lifetime period, the receiver must also be at a rescannable age range to receive a hadith. If the age of the receiver is too young, the transmitted hadith can still be questionable. Relating to digital evidence investigation, the above methods can be equated to the way data is transmitted from one location to another. The investigator needs to ensure that it is indeed possible for the data to move from one component to another, such as images to be transferred from one mobile device to another. The transmission path and the opportunity for the digital transmission to take place must be available. The date of sending and the date of receiving must also be reasonable, so that the possibility of transmission can be acknowledged. In addition to the reasonable transmission timeframe, the capacity/ability of the receiving component must also be examined. If the image size is 1 GB and the size of the memory on the particular hand phone is only 512 MB, it is then safe to conclude that the transmission via that hand phone does not take place. MATERIALS AND METHODS Inline with hadith authentication scenario, we need to state our assumption that the source of the evidence is known. The ultimate objective is to authenticate that the evidence is indeed derived from the suspected source. Yusoff et al. (2008) have demonstrated, a surface level scenario, as to how the technique to check for matn and isnad can be applied into the checking of an coming from a suspected criminal. Figure 2 demonstrates the investigation process based on hadith authentication method. The process started when the victim produced an purportedly sent by the accused. The first step is to check for the validity of the content, which is the matn checking. If it can be proven that it is impossible for the accused to have written such , the investigation process stops and the accused is no longer implicated. matn check can be done via various techniques such as authorship verification and digital signatures. If the matn check showed a positive result that indicated for the possibility of the accused to have written such , the next step is to check for the isnad s validity. The checking for the isnad must cover all transmitters starting from the receiver until the source transmitter. These transmitters must be in a continuous and unbroken chain. Proper change of custody: In digital evidence investigation, maintaining a proper change of custody is a very important criterion that all investigators must adhere to. Throughout the lifecycle of the investigation, the record of the evidence custodianship must be properly kept. Without the proper custodianship it cannot be ascertained that the evidence has not been tainted. The isnad system, by virtue of its concept and implementation, is similar to the concept of chain of custody. For a hadith to be accepted, it must have an unbroken and reliable link of narrators all the way back to the Prophet S.A.W. The strength of the link does depend on the strength of all of the narrators in the link. Any weakness to any one of the narrators would ultimately weaken authenticity level of the hadith (Azami, 1977). Similarly in digital forensic realms, any weakness in any part of the chain of custody would render the evidence to be atrociously challenged in the court of law. 615 Fig. 2: investigation process
4 This isnad checking would encompass the verification and authentication of the receiver s computers, all processing and forwarding servers and finally, the accused computer. There are various techniques currently available to check for the isnad of the such as analysis of the header to ascertain the path and existence of the server(s). It is difficult to get a clear/concrete yes or no answers for both matn and isnad checking. After all, representing trust values in binary format (yes or no) would be too simplistic and unable to represent the true value of trust satisfactorily (Li and Singhal, 2007). As such, we are proposing for the trust values of the range between 0 (completely untrusted) and 1 (completely trusted), be assigned for each of the checks. The overall trust value for digital evidence (in this case, an sent by the accused to the victim) can be calculated based on the proposed formula: If M(x) = 0 or I(x) = 0, thus T(x) = 0 (1) T(x) = The trust value of evidence x M(x) = The trust value of matn check performed on x I(x) = The trust value of isnad check performed on the transmitters of x The trust value of evidence x is the sum of 50% of the trust of matn x and 50% of the trust on isnad x. This is done to show that both matn and isnad checks carries the same weightage. However, should any of the values become 0, the entire formula will be 0, thus the trust value of the evidence x will also be 0 (totally untrusted). If the content check reveals 0 trusts, then there is no need to check the transmission path as the resulting trust value should be zero. The same goes if the value of the transmission path is equals to 0. Should both values become 1, the result of the formula will be 1, thus the trust value of evidence x will also be 1 (completely trusted). M(x) and I(x) of any value between 0 and 1 would bring about the trust values ranging between 0 and 1. The calculation of M(x) would be based on the authorship identification techniques. One such technique is making use of stylometry, which assume that an author has distinctive writing habits and these are exhibited in features like vocabulary used, sentence complexity and phrases used. Since the suspect of the author is known, it is possible to get copies of previous s or other text written by the suspect. Using the known text and the text in the in investigation, it is possible to calculate the trust value of M(x) using any of the currently J. Computer Sci., 6 (6): , available authorship identification techniques (Anderson et al., 2001; De Vel et al., 2001). Based on isnad calculation, the formula for I(x) can be further expanded into the following: I(x) = MIN {I(x 1 ), I(x 2 ),, I(x n th )} (2) The calculation of I(x) is composed of I(x 1 ), I(x 2 ) until I (x n th ), the source transmitter. It is important to note that the trust value of I(x) is based on the lowest value in the chain. This is indeed in line with the hadith authentication concept whereby the strength of the entire chain is the strength of its weakest link. As for the calculation of each I(x i ), we proposed that the value of I(x i ) is based on the penetration test performed on server plus the history of penetration test on the server: I(x i ) = (Pt (x i ) * 0.7) + (Ph (x i ) * 0.3) If Pt(x i ) = 0, thus I (x i ) = 0 (3) Pt(x i ) = The penetration test value on server i Ph(x i ) = The history of penetration test values done on server i The discounted rate of 70% is imposed on value of Pt(x i ) and only 30% is imposed on the value of Ph(x i ). This is to reflect the higher importance of the current penetration test values as compared to the historical values. However, if the current penetration test value is equivalent to 0 (totally entrusted), it is safe to assume that the combine trust of Pt(x i ) and (Ph(x i ) should also be 0. Server that passed all current penetration tests would be considered as achieving the trust value of 1 for Pt(x i ). Ph(x i ) is the storage place for all penetration tests done on server i. Ph(x i ) will be continuously updated whenever a new penetration test is done on server i. Similarly with the hadith authentication methodology, other than checking the matn and reliability of the transmitter(s) in the isnad chain, the way the hadith being transmitted is also equally scrutinized. As such, the transmission of being investigated from the sender to the recipient must also be looked into. With the widely available mobile devices such as notebooks, PDAs, smart-phones, it is quite possible for the data under investigation to have passed through these devices via wireless communication. As such the formula for calculation of isnad can be further extended to: I (x i ) = 0.5((Pt(x i ) * 0.7) + (Ph(x i ) * 0.3)) + 0.5((Tt(x i ) * 0.7) + (Th(x i ) * 0.3)) If Pt(x i ) =0 or Tt(x i ), thus I (x i ) = 0 (4)
5 Tt(x i ) is the trust value of the transmission test between server (i+1) and server I and Th(x i ) is the historical value of the transmission test done on the same two servers. It is important to note that the combination values of (Pt(x i ) + Ht(x i )) and Tt(x i ) + Th(x i ) are averaged out in order to reflect the same level of important between the server reliability and the transmission reliability. However, should Tt(x i ) be 0, the whole I(x i ) value will be set to 0. This is in line with the concept that for an evidence to be accepted, it should be reliably transmitted. Should the reliability of the transmission is 0 (not trusted at all), the evidence should be rejected. As such, the complete formula for the trust of digital evidence x is as follows: Whereby: I(x) = MIN {I(x 1 ), I(x 2 ),, I(x n th )} I (x i ) = 0.5( (Pt(x i ) * 0.7) + (Ph(x i ) * 0.3) ) + 0.5( (Tt(x i ) * 0.7) + (Th(x i ) * 0.3) ) (5) The resulting trust value will be between 0 and 1. Zero being completely untrusted and 1 being fully trusted. When confronted with numerous evidences, the forensic investigator can rank those evidences based on the calculated trust values. The evidence that achieved high trust value (for example 70% or more) can be safely used as evidence in the court of law. This ranking of evidence can assist the forensic investigator to prioritize which evidence that they can further investigate and which ones that they can put on hold or discard altogether. Being able to classify the evidences based on the level of trusts would enable the investigators to efficiently utilize their investigation time. Trust classification: In general, hadith can be classified into 4 categories (Mustafa, 2005) or trust levels namely, Sound (Sahih), Good (Hassan), Weak (Daif) and Bad/Rejected (Maude ). Based on the hadith classifications and mapping it to the calculated trust values, we propose the following classification of the digital evidence: forensic investigators to plan their works and focus on the evidence that would give them a better chance of catching the criminals. The evidence that falls under into the lower level trust category can be disregarded or ignored at least for the time being. The investigators can come back later to these low trust level evidences and use them to provide leads and clues to other evidences. The above trust classifications are still raw and will be subjected to further refinements. We should be able to substantiate and finalize the classifications once we have completed our work on the testing of the case studies. RESULTS AND DISCUSSION Employee A has received a threatening from Employee B. Employee B has denied ever sending such . A computer forensic investigator was called in to investigate the matter (Fig. 3). Based on the initial investigation from the headers and tracing back to the source, the following transmission path was discovered. In order to ascertain the trust of the threatening evidence, the investigator has applied the trust formula i.e.: First of all, the value of M(x) is calculated using authorship identification techniques. The calculated value is then converted to the trust value of between 0 and 1. Assuming that the value of M(x) = 0.25, which is>0, the value of I(x) is then be calculated, starting with Mary s PC and go all the way to John s notebook. At each of the node/isnad, the penetration test Pt(x i ), history test Ht(x i ) and transmission test Tt(x i ) are performed. Assuming that the values of Pt(x i ), Ht(x i ) and Tr(x i ), have already been calculated, the trust value at each node, I(x i ), can then be derived, as shown in Table 1. Level 4: Sound: The trust value of 1.0 Level 3: Good: The trust value of > 0.7 Level 2: Weak: The trust value of > 0.3 Level 1: Bad: The trust value of <= 0.3 The ability to classify the evidence based on the above proposed classifications would enable the Fig. 3: path 617
6 Table 1: Intermediate trust values x Pt (x i ) Ht (x i ) Tt (x i ) Th(x i ) I (x i ) As such, the trust value of evidence x ( from John to Mary) is then calculated as follows: = (0.5*0.25)+(0.5*MIN {0.77, 0.29, 0.74, 0.79, 0.51} = = 0.27 As such, the evidence can be classified as bad as it only obtains a trust value of 0.27 (which is less than 0.30). It is therefore, unlikely that John has send Mary the purported threatening . The computer forensic investigator can disregard or put on hold the investigation using this piece of evidence. They can focus on other evidence that have higher trust values in their quest to prove that John did indeed send the . CONCLUSION We are able to present a noble way of calculating the trust value of a given based on hadith authentication techniques. Even though the calculation presented is based on domain, this formula can be used on other types of evidences. The concept of matn and isnad is general enough to be applied in authenticating various types of digital evidence. The development of case studies based on actual computer forensic investigations is the focus of our current work. A proper classification of the evidence based on the hadith classification such as sahih (fully accepted), hassan (slightly below sahih), dhaif (weak) and maudu (rejected). The next step is to formulate a realistic case scenario so that an acceptable and reasonable trust values can be assigned to matn and isnad checking. This framework can then be applied into digital evidence investigation to assist in ascertaining the trustworthiness of any given digital evidence. Anderson, A., M. Corney, O. De Veland and G. Mohay, Identifying the Authors of Suspect , Computers and Security. r.pdf Carrier, B. and E.H. Spafford, Getting physical with the digital investigative process. Int. J. Digit. Evid., Fall, 1: Baryamureeba, V. and F. Tushabee, The enhanced digital investigation process model. Asian J. Inform. Technol., 5: Chaski, C.E., Who s at the keyboard authorship attribution in digital evidence investigations. Int. J. Digit. Evid., 4: De Vel, O., A. Anderson, M. Corney and G. Mohay, Mining content for author identification forensics. ACM SIGMOD Rec., 30: Li, H. and M. Singhal, Trust management in distributed systems. Computer, 40: DOI: /MC Mahmood, K., Hadith and Its Literary Style. Adam Publishers and Distribution, New Delhi, ISBN: , pp: Mustafa, A.R., Hadith 40 (Translation of 40 Hadiths by Imam Nawawi). Dewan Pustaka Fajar, Kuala Lumpur, ISBN: , pp: Noblett, M.G., M.M. Pollitt and L.A. Presley, Recovering and examining computer forensic evidence. Forensic Sci. Commun., 2: 1-8. Rogers, M.K., J. Goldman, R. Mislan, T. Wedge and S. Debrota, Computer forensics field triage process model. Proceeding of the Conference on Digital Forensics Security and Law, pp: Suhaib, H., An Introduction to the Science of Hadith. hsunnah/scienceofhadith/acov.html Yusoff, Y., R. Ismail, M.Z. Mohd Yusof and A.A. Mat Isa, Conceptual similarities between hadith authentication and digital evidence verification techniques. Proceedings of the 4th International Conference Information Technology and Multimedia, UNITEN, Malaysia, pp: REFERENCES Azami, M.M., Studies in Hadith Methodology and Literature. American Trust Publication, ISBN: , pp: Ali, M., Hadith and Sunnah. Islamic Book Trust, Kuala Lumpur, ISBN: , pp:
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS Yunus Yusoff, Roslan Ismail and Zainuddin Hassan College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia [email protected],
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
Muhadith: A Cloud based Distributed Expert System for Classification of Ahadith
2012 10th International Conference on Frontiers of Information Technology Muhadith: A Cloud based Distributed Expert System for Classification of Ahadith Kashif Bilal North Dakota State University, Fargo,
Islamic Copywork An-Nawawi s Forty Hadith Part 4
~ 1 ~ Islamic Copywork An-Nawawi s Forty Hadith Part 4 Translated by Ezzeddin Ibrahim Denys Johnson-Davies ~ 2 ~ Hadith 31 On the authority of Abu l-abbas Sahl ibn Sa d as-sa idi (may Allah be pleased
A Model of Unforgeable Digital Certificate Document System
A Model of Unforgeable Digital Certificate System Koichi Nozaki *, Hideki Noda **, Eiji Kawaguchi ** and Richard Eason *** *Nagasaki University, **Kyushu Institute of Technology, ***University of Maine
How To Choose An Electronic Signature
Electronic Signature Systems A Guide for IT Personnel Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal. Table of Contents
Security challenges for internet technologies on mobile devices
Security challenges for internet technologies on mobile devices - Geir Olsen [[email protected]], Senior Program Manager for Security Windows Mobile, Microsoft Corp. - Anil Dhawan [[email protected]],
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/
Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Note that not every case goes through all of the steps outlined here. Some states have different procedures. I. Pre-Trial Crimes that would
Automatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
To Catch a Thief: Computer Forensics in the Classroom
To Catch a Thief: Computer Forensics in the Classroom Anna Carlin [email protected] Steven S. Curl [email protected] Daniel Manson [email protected] Computer Information Systems Department California
Security in Ad Hoc Network
Security in Ad Hoc Network Bingwen He Joakim Hägglund Qing Gu Abstract Security in wireless network is becoming more and more important while the using of mobile equipments such as cellular phones or laptops
Review of Computer Engineering Research CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH
Review of Computer Engineering Research ISSN(e): 2410-9142/ISSN(p): 2412-4281 journal homepage: http://www.pakinsight.com/?ic=journal&journal=76 CURRENT TRENDS IN SOFTWARE ENGINEERING RESEARCH Gayatri
Review of Error Detection of Data Link Layer in Computer Network
Middle-East Journal of Scientific Research 18 (8): 1105-1110, 2013 ISSN 1990-9233 IDOSI Publications, 2013 DOI: 10.5829/idosi.mejsr.2013.18.8.11835 Review of Error Detection of Data Link Layer in Computer
IS YOUR DATA WAREHOUSE SUCCESSFUL? Developing a Data Warehouse Process that responds to the needs of the Enterprise.
IS YOUR DATA WAREHOUSE SUCCESSFUL? Developing a Data Warehouse Process that responds to the needs of the Enterprise. Peter R. Welbrock Smith-Hanley Consulting Group Philadelphia, PA ABSTRACT Developing
Domain Specific Cyber Forensic Investigation Process Model
Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015 Domain Specific Cyber Forensic Investigation Process Model Rabail Shafique Satti and Fakeeha Jafari In this paper, a reference model
Checking signatures at postal vote openings
Checking signatures at postal vote openings Introduction This guidance aims to provide practical advice on postal vote opening procedures, with special regard to carrying out manual checking of signatures.
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE
IAPE STANDARDS SECTION 16 DIGITAL EVIDENCE IAPE STANDARD SECTION 16.1 DIGITAL EVIDENCE Standard: Digital evidence is a critical element of modern criminal investigation that should be maintained in strict
(Refer Slide Time: 02:17)
Internet Technology Prof. Indranil Sengupta Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Lecture No #06 IP Subnetting and Addressing (Not audible: (00:46)) Now,
Elements of Security
Elements of Security Dr. Bill Young Department of Computer Sciences University of Texas at Austin Last updated: April 15, 2015 Slideset 8: 1 Some Poetry Mary had a little key (It s all she could export)
On Raising the Hands in Prayer #2
On Raising the Hands in Prayer #2 Discussion Of The Hadith Of Bara a Bin Azib And Ibn Mas ud His saying, "Waki' narrated to us" He is ibn al-jarrah. His saying, "from Sufyan" He is ath-thawri. His saying,
Application of Neural Network in User Authentication for Smart Home System
Application of Neural Network in User Authentication for Smart Home System A. Joseph, D.B.L. Bong, D.A.A. Mat Abstract Security has been an important issue and concern in the smart home systems. Smart
Journal of Digital Forensic Practice
Journal of Digital Forensic Practice Journal of Digital Forensic Practice, 2:57 61, 2008 Copyright Taylor & Francis Group, LLC ISSN: 1556-7281 print / 1556-7346 online DOI: 10.1080/15567280801958464 UDFP
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
A Survey of Online Tools Used in English-Thai and Thai-English Translation by Thai Students
69 A Survey of Online Tools Used in English-Thai and Thai-English Translation by Thai Students Sarathorn Munpru, Srinakharinwirot University, Thailand Pornpol Wuttikrikunlaya, Srinakharinwirot University,
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
An Email Delivery Report for 2012: Yahoo, Gmail, Hotmail & AOL
EmailDirect is an email marketing solution provider (ESP) which serves hundreds of today s top online marketers by providing all the functionality and expertise required to send and track effective email
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
Federation Proxy for Cross Domain Identity Federation
Proxy for Cross Domain Identity Makoto Hatakeyama NEC Corporation, Common Platform Software Res. Lab. 1753, Shimonumabe, Nakahara-Ku, Kawasaki, Kanagawa 211-8666, Japan +81-44-431-7663 [email protected]
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Security Digital Certificate Manager
IBM i Security Digital Certificate Manager 7.1 IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in Notices,
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm
Video Authentication for H.264/AVC using Digital Signature Standard and Secure Hash Algorithm Nandakishore Ramaswamy Qualcomm Inc 5775 Morehouse Dr, Sam Diego, CA 92122. USA [email protected] K.
Two Factor Zero Knowledge Proof Authentication System
Two Factor Zero Knowledge Proof Authentication System Quan Nguyen Mikhail Rudoy Arjun Srinivasan 6.857 Spring 2014 Project Abstract It is often necessary to log onto a website or other system from an untrusted
Multihopping for OFDM based Wireless Networks
Multihopping for OFDM based Wireless Networks Jeroen Theeuwes, Frank H.P. Fitzek, Carl Wijting Center for TeleInFrastruktur (CTiF), Aalborg University Neils Jernes Vej 12, 9220 Aalborg Øst, Denmark phone:
Adversary Modelling 1
Adversary Modelling 1 Evaluating the Feasibility of a Symbolic Adversary Model on Smart Transport Ticketing Systems Authors Arthur Sheung Chi Chan, MSc (Royal Holloway, 2014) Keith Mayes, ISG, Royal Holloway
EP 2 365 669 A1 (19) (11) EP 2 365 669 A1 (12) EUROPEAN PATENT APPLICATION. (43) Date of publication: 14.09.2011 Bulletin 2011/37
(19) (12) EUROPEAN PATENT APPLICATION (11) EP 2 36 669 A1 (43) Date of publication: 14.09.11 Bulletin 11/37 (1) Int Cl.: H04L 12/8 (06.01) (21) Application number: 00243.6 (22) Date of filing:.03. (84)
Objective This howto demonstrates and explains the different mechanisms for fending off unwanted spam e-mail.
Collax Spam Filter Howto This howto describes the configuration of the spam filter on a Collax server. Requirements Collax Business Server Collax Groupware Suite Collax Security Gateway Collax Platform
BUSINESS RULES AND GAP ANALYSIS
Leading the Evolution WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Discovery and management of business rules avoids business disruptions WHITE PAPER BUSINESS RULES AND GAP ANALYSIS Business Situation More
Mapping Process of Digital Forensic Investigation Framework
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 163 Mapping Process of Digital Forensic Investigation Framework Siti Rahayu Selamat 1, Robiah Yusof 2, Shahrin
Electronic Signature Article
Electronic Signature Article ESIGN Electronic Commerce and Electronic Signature Law Clarified Copyright Topaz Systems Inc. All rights reserved. For Topaz Systems, Inc. trademarks and patents, visit www.topazsystems.com/legal.
E-mail Management: A Guide For Harvard Administrators
E-mail Management: A Guide For Harvard Administrators E-mail is information transmitted or exchanged between a sender and a recipient by way of a system of connected computers. Although e-mail is considered
Roles of the Quran and the Hadith in Islamic Law
1 Roles of the Quran and the Hadith in Islamic Law The Quran (which is believed by Muslims to be the word of God) was revealed in stages during the twenty-two years of the prophethood (risalat) of the
COMPARATIVE DIGITAL FORENSIC MODEL
COMPARATIVE DIGITAL FORENSIC MODEL Dr.DhananjayKalbande 1, Nilakshi Jain 2 Head of Department, Dept. Of CSE, SPIT/ Mumbai University, Mumbai, Maharastra, India 1 Assistant Professor, Dept. Of IT, SAKEC/
A Survey on Web Mining From Web Server Log
A Survey on Web Mining From Web Server Log Ripal Patel 1, Mr. Krunal Panchal 2, Mr. Dushyantsinh Rathod 3 1 M.E., 2,3 Assistant Professor, 1,2,3 computer Engineering Department, 1,2 L J Institute of Engineering
Animal Cruelty Investigations: Crime Scene Response Processing and Documentation TYPES OF ANIMAL CRUELTY CRIMES
Animal Cruelty Investigations: Crime Scene Response Processing and Documentation 2015 Tennessee Animal Care & Control Conference Presented by: Kathryn Destreza Director of Investigations Field Investigations
Authentication Application
Authentication Application KERBEROS In an open distributed environment servers to be able to restrict access to authorized users to be able to authenticate requests for service a workstation cannot be
Integrated support system for planning and scheduling... 2003/4/24 page 75 #101. Chapter 5 Sequencing and assignment Strategies
Integrated support system for planning and scheduling... 2003/4/24 page 75 #101 Chapter 5 Sequencing and assignment Strategies 5.1 Overview This chapter is dedicated to the methodologies used in this work
APGO GUIDANCE ON DOCUMENT AUTHENTICATION. Table of Contents
1.0 Introduction Table of Contents 2.0 Document Authentication: The Basics 2.1 The Purpose of the Seal 2.2 The Practice of Authentication 3.0 Document Authentication: Application 3.1 The Authentication
Institute of Chartered Accountants Ghana (ICAG) Paper 2.2 Management Accounting
Institute of Chartered Accountants Ghana (ICAG) Paper. Management Accounting Final Mock Exam Marking scheme and suggested solutions DO NOT TURN THIS PAGE UNTIL YOU HAVE COMPLETED THE MOCK EXAM ii Management
Certificate Revocation Management in VANET
Certificate Revocation Management in VANET Ghassan Samara Department of Computer Science, Faculty of Science and Information Technology, Zarqa University Zarqa, Jordan. [email protected] ABSTRACT Vehicular
Alaa Alhamami, Avan Sabah Hamdi Amman Arab University Amman, Jordan
World of Computer Science and Information Technology Journal (WCSIT) ISSN: 2221-0741 Vol. 5, No. 5, 87-91, 2015 Mobile Secure Transmission Method Based on Audio Steganography Alaa Alhamami, Avan Sabah
Standardization and Its Effects on K-Means Clustering Algorithm
Research Journal of Applied Sciences, Engineering and Technology 6(7): 399-3303, 03 ISSN: 040-7459; e-issn: 040-7467 Maxwell Scientific Organization, 03 Submitted: January 3, 03 Accepted: February 5, 03
What Are Certificates?
The Essentials Series: Code-Signing Certificates What Are Certificates? sponsored by by Don Jones W hat Are Certificates?... 1 Digital Certificates and Asymmetric Encryption... 1 Certificates as a Form
Emails sent to the FaxFinder fax server must meet the following criteria to be processed for sending as a fax:
FaxFinder FFx30 T.37 Store & Forward Fax (T.37) Introduction The FaxFinder implements T.37 Store and Forward Fax (RFC2304) to convert emails into facsimile transmissions. The FaxFinder fax server accepts
MAT-71506 Program Verication: Exercises
MAT-71506 Program Verication: Exercises Antero Kangas Tampere University of Technology Department of Mathematics September 11, 2014 Accomplishment Exercises are obligatory and probably the grades will
Optimised Realistic Test Input Generation
Optimised Realistic Test Input Generation Mustafa Bozkurt and Mark Harman {m.bozkurt,m.harman}@cs.ucl.ac.uk CREST Centre, Department of Computer Science, University College London. Malet Place, London
The Role of Authenticity in the Life Cycle of Digital Documents
The Role of Authenticity in the Life Cycle of Digital Documents Eun G. Park Graduate School of Library & Information Studies McGill University Abstract The concept of authenticity has played a central
Security Digital Certificate Manager
System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure
C R I M E S C E N E. Forensic Science CC 30.07 Spring 2007 Prof. Nehru
C R I M E S C E N E Physical Evidence Crime laboratories run on physical evidence Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link
Overview Keys. Overview
Overview Keys Overview The PGPmail program performs fast, high-security, public-key encrypting (with optional compression), decrypting, and authenticating of electronic messages and files. The program
Computer Network. Interconnected collection of autonomous computers that are able to exchange information
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
CHAPTER 6 QUALITY ASSURANCE MODELING FOR COMPONENT BASED SOFTWARE USING QFD
81 CHAPTER 6 QUALITY ASSURANCE MODELING FOR COMPONENT BASED SOFTWARE USING QFD 6.1 INTRODUCTION Software quality is becoming increasingly important. Software is now used in many demanding application and
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine
Data Link Layer(1) Principal service: Transferring data from the network layer of the source machine to the one of the destination machine Virtual communication versus actual communication: Specific functions
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development
Analysis of Spam Filter Methods on SMTP Servers Category: Trends in Anti-Spam Development Author André Tschentscher Address Fachhochschule Erfurt - University of Applied Sciences Applied Computer Science
The Enhanced Digital Investigation Process Model
The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe [email protected], [email protected] Institute of Computer Science, Makerere University P.O.Box 7062,
Introduction. Digital Signature
Introduction Electronic transactions and activities taken place over Internet need to be protected against all kinds of interference, accidental or malicious. The general task of the information technology
Data Provenance. Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations. Version 1.
Data Provenance Functional Requirements Document: Developed in Response to the Data Provenance Task Force Recommendations Version 1.0 May 2015 Version History Version Revision Author Description of Change
Data Transfer Technology to Enable Communication between Displays and Smart Devices
Data Transfer Technology to Enable Communication between Displays and Smart Devices Kensuke Kuraki Shohei Nakagata Ryuta Tanaka Taizo Anan Recently, the chance to see videos in various places has increased
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Prediction of DDoS Attack Scheme
Chapter 5 Prediction of DDoS Attack Scheme Distributed denial of service attack can be launched by malicious nodes participating in the attack, exploit the lack of entry point in a wireless network, and
Energy Efficiency in Secure and Dynamic Cloud Storage
Energy Efficiency in Secure and Dynamic Cloud Storage Adilet Kachkeev Ertem Esiner Alptekin Küpçü Öznur Özkasap Koç University Department of Computer Science and Engineering, İstanbul, Turkey {akachkeev,eesiner,akupcu,oozkasap}@ku.edu.tr
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Framework of e-commerce
Framework of e-commerce Alka Arora Lecturer, Department of CSE/IT, Amritsar College of Engg.& Tech,Amritsar.143 001, Punjab, India, E-mail :alka_411 @rediffmail.com. Abstract This paper provides a detailed
Nine Common Types of Data Mining Techniques Used in Predictive Analytics
1 Nine Common Types of Data Mining Techniques Used in Predictive Analytics By Laura Patterson, President, VisionEdge Marketing Predictive analytics enable you to develop mathematical models to help better
STATISTICAL SIGNIFICANCE AND THE STANDARD OF PROOF IN ANTITRUST DAMAGE QUANTIFICATION
Lear Competition Note STATISTICAL SIGNIFICANCE AND THE STANDARD OF PROOF IN ANTITRUST DAMAGE QUANTIFICATION Nov 2013 Econometric techniques can play an important role in damage quantification cases for
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE. Chapter two. ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE
LAW FOR THE ELECTRONIC DOCUMENT AND ELECTRONIC SIGNATURE Prom. SG. 34/6 Apr 2001, amend. SG. 112/29 Dec 2001, amend. SG. 30/11 Apr 2006, amend. SG. 34/25 Apr 2006, amend. SG. 38/11 May 2007 Chapter one.
Anti-Phishing Best Practices for ISPs and Mailbox Providers
Anti-Phishing Best Practices for ISPs and Mailbox Providers Version 2.01, June 2015 A document jointly produced by the Messaging, Malware and Mobile Anti-Abuse Working Group (M 3 AAWG) and the Anti-Phishing
Keywords: Digital evidence, forensically sound evidence
Chapter 1 WHEN IS DIGITAL EVIDENCE FORENSICALLY SOUND? Rodney McKemmish Abstract Forensically sound is a term used extensively in the digital forensics community to qualify and, in some cases, to justify
Mobile Marketing Trends and small businesses
Mobile Marketing Trends and small businesses LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not
Opinion and recommendations on challenges raised by biometric developments
Opinion and recommendations on challenges raised by biometric developments Position paper for the Science and Technology Committee (House of Commons) Participation to the inquiry on Current and future
Strategic White Paper
Strategic White Paper Increase Security Through Signature Verification Technology Takeaway Understand the benefits of automatic signature verification Learn about the types of automatic signature verification
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) Sundresan Perumal 1, and Norita Md Norwawi. 2 1 Universiti Sains Islam Malaysia,[email protected] 2 Universiti Sains Islam Malaysia,
The Direct Marketing Association s (DMA) Power of Direct
Email Deliverability and the Marketer s ROI The connection between deliverability and marketing effectiveness by Dave Lewis The Direct Marketing Association s (DMA) Power of Direct study has consistently
RHODE ISLAND. Electronic Business Transactions (EBT) Standards. for Electronic Data Interchange (EDI) in a Restructured Electric Industry
RHODE ISLAND Electronic Business Transactions (EBT) Standards for Electronic Data Interchange (EDI) in a Restructured Electric Industry PREPARED BY: THE NARRAGANSETT ELECTRIC COMPANY AUGUST 1999 TABLE
Why Cryptosystems Fail. By Ahmed HajYasien
Why Cryptosystems Fail By Ahmed HajYasien CS755 Introduction and Motivation Cryptography was originally a preserve of governments; military and diplomatic organisations used it to keep messages secret.
Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer
IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan
