Loading...
Please wait, while we are loading the content...
Similar Documents
Security investigation in wireless networks(invited talk)
| Content Provider | ACM Digital Library |
|---|---|
| Author | Rekhis, Slim |
| Abstract | Most of the theoretical techniques of digital investigation provided in the literature are neither able to cope with attacks in wireless networks, nor able to investigate anti-forensic attacks. In this talk, I will describe a formal approach for digital investigation of security attacks in wireless networks, and I will provide a model for describing attack scenarios in a wireless environment, and evidence generated at the system and network layers. In this talk, an inference system that integrates the two types of evidence, handles the incompleteness and duplication of information in them, will be provided. It allows generating and proving potential and provable forms of actions and attack scenarios. The last part of the talk will be related to the investigation of anti-forensic attacks. A formal approach, based on a novel theory of Hierarchical Visibility, will be provided for the forensic investigation of security incidents, which are conducted over complex systems and integrate anti-forensic attacks. |
| Starting Page | 1 |
| Ending Page | 2 |
| Page Count | 2 |
| File Format | |
| ISBN | 9781450328029 |
| DOI | 10.1145/2598918.2615725 |
| Language | English |
| Publisher | Association for Computing Machinery (ACM) |
| Publisher Date | 2014-06-03 |
| Publisher Place | New York |
| Access Restriction | Subscribed |
| Subject Keyword | Formal digital investigation Formal proof Anti-forensic attacks Network security |
| Content Type | Text |
| Resource Type | Article |