001440390 000__ 08251cam\a2200757\i\4500 001440390 001__ 1440390 001440390 003__ OCoLC 001440390 005__ 20230309004600.0 001440390 006__ m\\\\\o\\d\\\\\\\\ 001440390 007__ cr\cn\nnnunnun 001440390 008__ 211019s2021\\\\sz\a\\\\o\\\\\100\0\eng\d 001440390 019__ $$a1277140554$$a1277280130$$a1287775797$$a1292518876 001440390 020__ $$a9783030883812$$q(electronic bk.) 001440390 020__ $$a3030883817$$q(electronic bk.) 001440390 020__ $$z9783030883805$$q(print) 001440390 020__ $$z3030883809 001440390 0247_ $$a10.1007/978-3-030-88381-2$$2doi 001440390 035__ $$aSP(OCoLC)1277149647 001440390 040__ $$aGW5XE$$beng$$erda$$epn$$cGW5XE$$dYDX$$dEBLCP$$dOCLCF$$dDCT$$dN$T$$dOCLCO$$dDKU$$dAUD$$dOCLCO$$dOCLCQ$$dCOM$$dOCLCO$$dUKAHL$$dOCLCQ 001440390 049__ $$aISEA 001440390 050_4 $$aQA76.9.A25 001440390 08204 $$a005.8$$223 001440390 1112_ $$aIFIP International Conference on Digital Forensics$$n(17th :$$d2021 :$$cOnline) 001440390 24510 $$aAdvances in digital forensics XVII :$$b17th IFIP WG 11.9 International Conference, Virtual event, February 1-2, 2021, Revised selected papers /$$cGilbert Peterson, Sujeet Shenoi (eds.). 001440390 2463_ $$aAdvances in digital forensics 17 001440390 264_1 $$aCham, Switzerland :$$bSpringer,$$c2021. 001440390 300__ $$a1 online resource (xiv, 267 pages) :$$billustrations 001440390 336__ $$atext$$btxt$$2rdacontent 001440390 337__ $$acomputer$$bc$$2rdamedia 001440390 338__ $$aonline resource$$bcr$$2rdacarrier 001440390 347__ $$atext file 001440390 347__ $$bPDF 001440390 4901_ $$aIFIP advances in information and communication technology,$$x1868-422X ;$$v612 001440390 5050_ $$aIntro -- Contents -- Contributing Authors -- Preface -- I THEMES AND ISSUES -- Chapter 1 DIGITAL FORENSIC ACQUISITION KILL CHAIN -- ANALYSIS AND DEMONSTRATION -- 1. Introduction -- 2. Related Work -- 3. Digital Forensic Acquisition Kill Chain -- 3.1 Background -- 3.2 Kill Chain Overview -- 3.3 Kill Chain Phases -- 4. Case-Motivated Kill Chain Example -- 5. Conclusions -- Acknowledgement -- References -- Chapter 2 ENHANCING INDUSTRIAL CONTROL SYSTEM FORENSICS USING REPLICATION-BASED DIGITAL TWINS -- 1. Introduction -- 2. Background -- 2.1 Digital Twin -- 2.2 Digital Twin Security 001440390 5058_ $$a2.3 Digital Forensics -- 3. Related Work -- 4. Replication Using Digital Twins -- 4.1 Replication and Replay Theorems -- 4.2 Conceptual Framework -- 5. Implementation and Evaluation -- 5.1 Implementation and Experimental Setup -- 5.2 Results and Evaluation -- 6. Discussion -- 7. Conclusions -- Acknowledgement -- References -- Chapter 3 COMPARISON OF CYBER ATTACKS ON SERVICES IN THE CLEARNET AND DARKNET -- 1. Introduction -- 2. Background -- 3. Common Targets and Attacks -- 4. Related Work -- 5. Honeypot Deployment -- 5.1 Security Considerations -- 5.2 Deployment Process 001440390 5058_ $$a6. Implementation Details -- 6.1 Virtual Machine Architectures -- 6.2 Honeypot Services -- 7. Experiments and Results -- 7.1 Service Deployments -- 7.2 Announcements -- 7.3 Observed Web Requests -- 7.4 Observed SSH and Telnet Access -- 7.5 Observed SMTP Requests -- 7.6 Observed FTP Requests -- 7.7 Discussion -- 8. Conclusions -- Acknowledgement -- References -- II APPROXIMATE MATCHING TECHNIQUES -- Chapter 4 USING PARALLEL DISTRIBUTED PROCESSING TO REDUCE THE COMPUTATIONAL TIME OF DIGITAL MEDIA SIMILARITY MEASURES -- 1. Introduction -- 2. Previous Work -- 3. Jaccard Indexes of Similarity 001440390 5058_ $$a3.1 Jaccard Index -- 3.2 Jaccard Index with Normalized Frequency -- 4. Jaccard Index with Split Files -- 5. Results and Validation -- 6. Conclusions -- References -- Chapter 5 EVALUATION OF NETWORK TRAFFIC ANALYSIS USING APPROXIMATE MATCHING ALGORITHMS -- 1. Introduction -- 2. Foundations and Related Work -- 2.1 Current State of Approximate Matching -- 2.2 Approximate Matching Algorithms -- 3. Controlled Study -- 3.1 All vs. All Evaluation -- 3.2 Evaluation Methodology -- 4. Experimental Results and Optimizations -- 5. Conclusions -- Acknowledgement -- References 001440390 5058_ $$aIII ADVANCED FORENSIC TECHNIQUES -- Chapter 6 LEVERAGING USB POWER DELIVERY IMPLEMENTATIONS FOR DIGITAL FORENSIC ACQUISITION -- 1. Introduction -- 2. USB Power Delivery Protocol -- 3. Research Methodology -- 4. Results -- 4.1 Information Gathering -- 4.2 Passive Monitoring -- 4.3 Firmware Files -- 4.4 Firmware Reverse Engineering -- 4.5 Apple Vendor-Defined Protocol -- 4.6 Firmware Modification and Rollback -- 5. Conclusions -- Acknowledgements -- References -- Chapter 7 DETECTING MALICIOUS PDF DOCUMENTS USING SEMI-SUPERVISED MACHINE LEARNING -- 1. Introduction -- 2. Background and Related Work 001440390 506__ $$aAccess limited to authorized users. 001440390 520__ $$aADVANCES IN DIGITAL FORENSICS XVII Edited by: Gilbert Peterson and Sujeet Shenoi Digital forensics deals with the acquisition, preservation, examination, analysis and presentation of electronic evidence. Computer networks, cloud computing, smartphones, embedded devices and the Internet of Things have expanded the role of digital forensics beyond traditional computer crime investigations. Practically every crime now involves some aspect of digital evidence; digital forensics provides the techniques and tools to articulate this evidence in legal proceedings. Digital forensics also has myriad intelligence applications; furthermore, it has a vital role in cyber security -- investigations of security breaches yield valuable information that can be used to design more secure and resilient systems. Advances in Digital Forensics XVII describes original research results and innovative applications in the discipline of digital forensics. In addition, it highlights some of the major technical and legal issues related to digital evidence and electronic crime investigations. The areas of coverage include: ¨ Themes and Issues ¨ Approximate Matching Techniques ¨ Advanced Forensic Techniques ¨ Novel Applications ¨ Image Forensics This book is the seventeenth volume in the annual series produced by the International Federation for Information Processing (IFIP) Working Group 11.9 on Digital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in digital forensics. The book contains a selection of thirteen edited papers from the Seventeenth Annual IFIP WG 11.9 International Conference on Digital Forensics, a fully-remote event held in the winter of 2021. Advances in Digital Forensics XVII is an important resource for researchers, faculty members and graduate students, as well as for practitioners and individuals engaged in research and development efforts for the law enforcement and intelligence communities. Gilbert Peterson is a Professor of Computer Engineering at the Air Force Institute of Technology, Wright-Patterson Air Force Base, Ohio, USA. Sujeet Shenoi is the F.P. Walter Professor of Computer Science and a Professor of Chemical Engineering at the University of Tulsa, Tulsa, Oklahoma, USA. 001440390 588__ $$aOnline resource; title from PDF title page (SpringerLink, viewed October 19, 2021). 001440390 650_0 $$aDigital forensic science$$vCongresses. 001440390 650_0 $$aComputer science$$vCongresses. 001440390 650_0 $$aComputer security$$vCongresses. 001440390 650_0 $$aData encryption (Computer science)$$vCongresses. 001440390 650_0 $$aApplication software$$vCongresses. 001440390 650_0 $$aComputers and civilization$$vCongresses. 001440390 650_6 $$aInformatique$$vCongrès. 001440390 650_6 $$aSécurité informatique$$vCongrès. 001440390 650_6 $$aChiffrement (Informatique)$$vCongrès. 001440390 650_6 $$aLogiciels d'application$$vCongrès. 001440390 650_6 $$aOrdinateurs et civilisation$$vCongrès. 001440390 655_7 $$aConference papers and proceedings.$$2fast$$0(OCoLC)fst01423772 001440390 655_7 $$aConference papers and proceedings.$$2lcgft 001440390 655_7 $$aActes de congrès.$$2rvmgf 001440390 655_0 $$aElectronic books. 001440390 7001_ $$aPeterson, Gilbert,$$d1969-$$eeditor. 001440390 7001_ $$aShenoi, Sujeet,$$eeditor. 001440390 77608 $$iPrint version:$$z3030883809$$z9783030883805$$w(OCoLC)1266896159 001440390 830_0 $$aIFIP advances in information and communication technology ;$$v612.$$x1868-422X 001440390 852__ $$bebk 001440390 85640 $$3Springer Nature$$uhttps://univsouthin.idm.oclc.org/login?url=https://link.springer.com/10.1007/978-3-030-88381-2$$zOnline Access$$91397441.1 001440390 909CO $$ooai:library.usi.edu:1440390$$pGLOBAL_SET 001440390 980__ $$aBIB 001440390 980__ $$aEBOOK 001440390 982__ $$aEbook 001440390 983__ $$aOnline 001440390 994__ $$a92$$bISE