skip to main content
10.1145/2598918.2615725acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
invited-talk

Security investigation in wireless networks(invited talk)

Published: 03 June 2014 Publication History

Abstract

Most of the theoretical techniques of digital investigation provided in the literature are neither able to cope with attacks in wireless networks, nor able to investigate anti-forensic attacks. In this talk, I will describe a formal approach for digital investigation of security attacks in wireless networks, and I will provide a model for describing attack scenarios in a wireless environment, and evidence generated at the system and network layers. In this talk, an inference system that integrates the two types of evidence, handles the incompleteness and duplication of information in them, will be provided. It allows generating and proving potential and provable forms of actions and attack scenarios. The last part of the talk will be related to the investigation of anti-forensic attacks. A formal approach, based on a novel theory of Hierarchical Visibility, will be provided for the forensic investigation of security incidents, which are conducted over complex systems and integrate anti-forensic attacks.

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SFCS '14: Proceedings of the 2nd international workshop on Security and forensics in communication systems
June 2014
62 pages
ISBN:9781450328029
DOI:10.1145/2598918
  • General Chairs:
  • Noureddine Boudriga,
  • Slim Rekhis
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 03 June 2014

Check for updates

Author Tags

  1. anti-forensic attacks
  2. formal digital investigation
  3. formal proof
  4. network security

Qualifiers

  • Invited-talk

Conference

ASIA CCS '14
Sponsor:

Acceptance Rates

SFCS '14 Paper Acceptance Rate 6 of 10 submissions, 60%;
Overall Acceptance Rate 6 of 10 submissions, 60%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • 0
    Total Citations
  • 162
    Total Downloads
  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Feb 2025

Other Metrics

Citations

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media