Volume 8 Number 1 March 2017

    
A Lightweight Software Write-blocker for Virtual Machine Forensics

Patrick Tobin, Nhien-An Le-Khac, M-Tahar Kechadi

https://doi.org/

Abstract The integrity of any original evidence is fundamental to a forensic examination. Preserving the integrity of digital evidence is vitally important as changing just one bit among perhaps gigabits of data, will irrevocably alter that data and cast doubt on any evidence extracted. In traditional digital forensics write-blockers are used to preserve the integrity of that evidence and prevent changes from occurring, but... Read More


Cyber-Attack for BGP Systems Using Stochastic Game Nets Model

Abdelali EL BOUCHTI

https://doi.org/

Abstract With the rise of cyber-attack activities in the recent years, research in this area has gained immense emphasis. One of such research efforts is modeling of cyber-attacks. In this context, several modeling approaches have been developed, such as approaches based on attack trees (AT). In this paper, we propose a novel modeling, Stochastic Game Nets (SGN) and use it to model and analyze... Read More


Rough Set Significant Reduct and Rules of Intrusion Detection System

Noor Suhana Sulaiman, Rohani Abu Bakar

https://doi.org/

Abstract Intrusion Detection System deals with huge amount of data which contains irrelevant and redundant features causing slow training and testing process, also higher resource consumption as well as poor detection rate. It is not simply removing these irrelevant or redundant features due to deteriorate the performance of classifiers. Furthermore, by choosing the effective and important features, the classification mode and the classification performance... Read More