<?xml version='1.0' encoding='UTF-8'?><?xml-stylesheet href="http://www.blogger.com/styles/atom.css" type="text/css"?><feed xmlns='http://www.w3.org/2005/Atom' xmlns:openSearch='http://a9.com/-/spec/opensearchrss/1.0/' xmlns:blogger='http://schemas.google.com/blogger/2008' xmlns:georss='http://www.georss.org/georss' xmlns:gd="http://schemas.google.com/g/2005" xmlns:thr='http://purl.org/syndication/thread/1.0'><id>tag:blogger.com,1999:blog-762893744118596832</id><updated>2024-10-31T23:27:47.253-07:00</updated><category term="Information Security"/><category term="My Life through Words"/><category term="PhD Journey"/><category term="Publications"/><category term="RSSP Workshops - Y3"/><category term="Teaching &amp; Education"/><category term="RSSP Workshops - Y1"/><category term="RSSP Workshops - Y2"/><category term="Cuentos"/><category term="Reports"/><title type='text'>D. A. Flores</title><subtitle type='html'>My research, my interests, and my life journey... Bienvenidos!</subtitle><link rel='http://schemas.google.com/g/2005#feed' type='application/atom+xml' href='http://denys-flores.blogspot.com/feeds/posts/default'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/-/Publications'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/search/label/Publications'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><generator version='7.00' uri='http://www.blogger.com'>Blogger</generator><openSearch:totalResults>15</openSearch:totalResults><openSearch:startIndex>1</openSearch:startIndex><openSearch:itemsPerPage>25</openSearch:itemsPerPage><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-2916421295773408772</id><published>2020-01-23T21:30:00.000-08:00</published><updated>2020-01-23T21:30:25.122-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing (Article)</title><content type='html'>The18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE)&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Database audit records are important for investigating suspicious 
actions against transactional databases. Their admissibility as digital 
evidence depends on satisfying Chain of Custody (CoC) properties during 
their generation, collection and preservation in order to prevent their 
modification, guarantee action accountability, and allow third-party 
verification. However, their production has relied on auditing 
capabilities provided by commercial database systems which may not be 
effective if malicious users (or insiders) misuse their privileges to 
disable audit controls, and compromise their admissibility. Hence, in 
this paper, we propose a forensically-aware distributed database 
architecture that implements CoC properties as functional requirements 
to produce admissible audit records. The novelty of our proposal is the 
use of hybrid logical clocks, which compared with a previous centralised
 vector-clock architecture, has evident advantages as it (i) allows for 
more accurate provenance and causality tracking of insider actions, (ii)
 is more scalable in terms of system size, and (iii) although latency is
 higher (as expected in distributed environments), 70 per cent of user 
transactions are executed within acceptable latency intervals.&lt;br /&gt;
&lt;br /&gt;
DOI: https://doi.org/10.1109/TrustCom/BigDataSE.2019.00038 </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2916421295773408772'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2916421295773408772'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2020/01/hybrid-logical-clocks-for-database_23.html' title='Hybrid Logical Clocks for Database Forensics: Filling the Gap between Chain of Custody and Database Auditing (Article)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-680436453800549489</id><published>2018-07-27T22:18:00.000-07:00</published><updated>2020-07-27T22:19:28.328-07:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><category scheme="http://www.blogger.com/atom/ns#" term="Reports"/><title type='text'>PhD Annual Progress Report - Y3</title><content type='html'>&lt;div style=&quot;text-align: left;&quot;&gt;
This is my last research report before submission 😀😉&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/Mcd2fiPR0LKCi8&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt;&lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/680436453800549489'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/680436453800549489'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2018/07/phd-annual-progress-report-y3.html' title='PhD Annual Progress Report - Y3'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-45846168265779054</id><published>2017-09-11T03:26:00.000-07:00</published><updated>2018-01-18T04:55:14.918-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Article)</title><content type='html'>The 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17, 2 August 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
During forensic database investigations, audit
records become a crucial evidential element; particularly, when
certain events can be attributed to insider activity. However,
traditional reactive forensic methods may not be suitable, urging
the adoption of proactive approaches that can be used to ensure
accountability through audit records whilst satisfying Chain of
Custody (CoC) requirements for forensic purposes.
In this paper, role segregation, evidence provenance, event time-
liness and causality are considered as CoC requirements in order
to implement a forensically ready architecture for the proactive
generation, collection and preservation of database audit records
that can be used as digital evidence for the investigation of
insider activity. Our proposal implements triggers and stored
procedures as forensic routines in order to build a vector-clock-
based timeline for explaining causality in transactional events
recorded in audit tables. We expect to encourage further work
in the ﬁeld of proactive digital forensics and forensic readiness;
in particular, for justifying admissibility of audit records under
CoC restrictions.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;b&gt;&lt;/b&gt;
    &lt;a class=&quot;ng-binding ng-isolate-scope&quot; href=&quot;https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.299&quot; target=&quot;_blank&quot;&gt;10.1109/Trustcom/BigDataSE/ICESS.2017.299&lt;/a&gt; </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/45846168265779054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/45846168265779054'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/10/implementing-chain-of-custody.html' title='Implementing Chain of Custody Requirements in Database Audit Records for Forensic Purposes (Article)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-3251928021906603942</id><published>2017-07-06T13:28:00.001-07:00</published><updated>2018-01-18T05:23:25.829-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Proactive Database Forensics: Chain of Custody Requirements for Database Audit Records (WPCCS-17)</title><content type='html'>Presented in &lt;a href=&quot;http://www2.warwick.ac.uk/fac/sci/dcs/research/wpccs/wpccs17/&quot; target=&quot;_blank&quot;&gt;WPCCS-17&lt;/a&gt; on 30 June 2017.&lt;br /&gt;
&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;div class=&quot;separator&quot; style=&quot;clear: both; text-align: center;&quot;&gt;
&lt;a href=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoW-u-ByRPuYLZrYv45p4DybRlJHOm5AE9d-5lmlRNiwa10kpzYMDmz45nnQoUAMq12PSu4byHoN3aV-g8z5G9aXCsZfPizhr0mgyEW0Cb-MDGKQmAt22PXsWm7wptXuW50vwaox1MZQDV/s1600/wpccs-17-dflores.jpg&quot; imageanchor=&quot;1&quot; style=&quot;margin-left: 1em; margin-right: 1em;&quot;&gt;&lt;img border=&quot;0&quot; data-original-height=&quot;1067&quot; data-original-width=&quot;1600&quot; height=&quot;213&quot; src=&quot;https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoW-u-ByRPuYLZrYv45p4DybRlJHOm5AE9d-5lmlRNiwa10kpzYMDmz45nnQoUAMq12PSu4byHoN3aV-g8z5G9aXCsZfPizhr0mgyEW0Cb-MDGKQmAt22PXsWm7wptXuW50vwaox1MZQDV/s320/wpccs-17-dflores.jpg&quot; width=&quot;320&quot; /&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;b&gt;&lt;br /&gt;&lt;/b&gt;
&lt;b&gt;Abstract: &lt;/b&gt;In forensic database investigations, audit records are important 
evidence for analysing malicious activities carried out by trusted 
employees or insiders who may have misused their privileged access to 
sensitive transactional information. Our research proposes a proactive 
forensic approach for the generation, collection and preservation of 
audit records related to insider activity in order to ensure 
accountability whilst satisfying Chain of Custody (CoC) requirements. 
Hence, role segregation, evidence provenance, event timeliness and 
causality are considered as functional requirements for the 
implementation of a forensically ready architecture to proactively 
investigate insider activity. This architecture implements triggers and 
stored procedures as forensic routines for building a vector-clock-based
 timeline in order to explain causality in suspicious transactional 
events that can be attributed to malicious insiders.&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe align=&quot;middle&quot; allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;511&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/wc3xuNqnDwWwdV&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;479&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/wc3xuNqnDwWwdV&quot; target=&quot;_blank&quot; title=&quot;WPCCS-17 Poster&quot;&gt;WPCCS-17 Poster&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3251928021906603942'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3251928021906603942'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/07/proactive-database-forensics-chain-of.html' title='Proactive Database Forensics: Chain of Custody Requirements for Database Audit Records (WPCCS-17)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author><media:thumbnail xmlns:media="http://search.yahoo.com/mrss/" url="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhoW-u-ByRPuYLZrYv45p4DybRlJHOm5AE9d-5lmlRNiwa10kpzYMDmz45nnQoUAMq12PSu4byHoN3aV-g8z5G9aXCsZfPizhr0mgyEW0Cb-MDGKQmAt22PXsWm7wptXuW50vwaox1MZQDV/s72-c/wpccs-17-dflores.jpg" height="72" width="72"/></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-788527032626053502</id><published>2017-02-09T09:09:00.000-08:00</published><updated>2018-01-18T05:25:32.465-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="PhD Journey"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Article)</title><content type='html'>The 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 25 August 2016.&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Mobile device consumerisation has introduced the Bring-Your-Own-Device (BYOD) trend to the organisational context, allowing employees to work using their personal devices. However, as personal mobile devices are perceived as less secure than those provided by the organisation, BYOD has risen security concerns about corporate information being accessed by mobile devices from inside and outside the corporate perimeter. Moreover, this uncontrolled mobile device activity makes it difficult to differentiate external (outsider) malicious activity from reckless/naive employee (insider) behaviour, preventing effective correlation of unauthorised actions with the perpetrators. In this paper, a STRIDE-based BYOD Threat Model is proposed to analyse BYOD Threat Interactions from inside and outside the corporate perimeter. Our research contributes to a better understanding and awareness about the influence of BYOD Threats on disclosure and contamination of corporate information, encouraging future work in the field of BYOD security and digital forensics in order to protect information and manage an increasing number of evidence sources.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;a class=&quot;ng-binding&quot; href=&quot;https://doi.org/10.1109/TrustCom.2016.0169&quot; target=&quot;_blank&quot;&gt;10.1109/TrustCom.2016.0169&lt;/a&gt; </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/788527032626053502'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/788527032626053502'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2017/02/bring-your-own-disclosure-analysing.html' title='Bring Your Own Disclosure: Analysing BYOD Threats to Corporate Information (Article)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-7302921863046138043</id><published>2015-12-04T20:00:00.000-08:00</published><updated>2016-11-21T08:36:50.753-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>An integrated model for ICT Governance and Management applied to the Council for Evaluation, Accreditation and Quality Assurance of Higher Education Institutions in Ecuador (CEAACES)</title><content type='html'>IEEE International Conference on Computing, Communication and Security (ICCCS), 4 December 2015&lt;br /&gt;
Authors: C. W. Montenegro, D. A. Flores&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
As an effect of the modernization policy in the administrative processes inside the Ecuadorean Central Government, the usage of Information and Communication Technologies (ICTs) has increased during the last years within more than 300 of the most important and high-ranked public institutions. Likewise, the citizen access to Internet and e-Government services has grown due to the democratization of the governmental ICT platform to ensure access to the most important public services, including those offered by Higher Education Institutions (HEIs). However, the applicable regulatory and legal framework in the public sector has very little compliance with governance and management considerations. Our work develops a combined model for ICT governance and management based on academic models for governance and strategic alignment, aided by professional practices in the field, fully compliant with the regulatory mechanisms that operate within the Central Government of Ecuador. Also, our work analyzes the results, limitations and future work regarding the applicability of this model inside the Council for Evaluation, Accreditation and Quality Assurance of Higher Education Institutions (CEAACES) in order to support the process of continuous improvement of public higher education in Ecuador.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;a href=&quot;http://ieeexplore.ieee.org/document/7374158/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;10.1109/CCCS.2015.7374158&lt;/a&gt; &lt;br /&gt;
&lt;br /&gt;
&lt;br /&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7302921863046138043'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7302921863046138043'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2015/12/an-integrated-model-for-ict-governance.html' title='An integrated model for ICT Governance and Management applied to the Council for Evaluation, Accreditation and Quality Assurance of Higher Education Institutions in Ecuador (CEAACES)'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-7572875558587388018</id><published>2015-07-24T20:00:00.000-07:00</published><updated>2016-11-21T09:36:27.664-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><category scheme="http://www.blogger.com/atom/ns#" term="Teaching &amp; Education"/><title type='text'>Conozca cómo evadir el ataque de los ‘hackers&#39;</title><content type='html'>Diario el Comercio (ECU), 24 July 2015&lt;br /&gt;
&amp;nbsp;&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;714&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/Mlv9lglVyqlxFZ&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;668&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/DenysAFlores/conozca-cmo-evadir-el-ataque-de-los-hackers&quot; target=&quot;_blank&quot; title=&quot;Conozca cómo evadir el ataque de los hackers&quot;&gt;Conozca cómo evadir el ataque de los hackers&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7572875558587388018'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7572875558587388018'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2015/07/conozca-como-evadir-el-ataque-de-los.html' title='Conozca cómo evadir el ataque de los ‘hackers&#39;'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-3849858461384062203</id><published>2014-11-18T07:45:00.000-08:00</published><updated>2016-11-21T09:37:01.258-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><category scheme="http://www.blogger.com/atom/ns#" term="Teaching &amp; Education"/><title type='text'>Memories 2014 - Campus Party Quito 4</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;714&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/gBGanH5EXWQDm&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;668&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/DenysAFlores/memorias-del-campus-party-quito-2014&quot; target=&quot;_blank&quot; title=&quot;Memorias del Campus Party Quito 2014&quot;&gt;Memorias del Campus Party Quito 2014&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3849858461384062203'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3849858461384062203'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2014/11/memories-campus-party-quito-4.html' title='Memories 2014 - Campus Party Quito 4'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-5365622583045201071</id><published>2014-03-21T20:00:00.000-07:00</published><updated>2016-11-21T09:37:26.464-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>An Authentication and Audit Architecture for Enhancing Security on eGovernment Services</title><content type='html'>IEEE 1st International Conference on eDemocracy &amp;amp; eGovernment - ICEDEG 2014, 21 March 2014&lt;br /&gt;
&lt;br /&gt;
Author: D. A. Flores&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
eGovernment deploys governmental information and services for citizens 
and general society. As the Internet is being used as underlying 
platform for information exchange, these services are exposed to data 
tampering and unauthorised access as main threats against citizen 
privacy. These issues have been usually tackled by applying controls at 
application level, making authentication stronger and protecting 
credentials in transit using digital certificates. However, these 
efforts to enhance security on governmental web sites have been only 
focused on what malicious users can do from the outside, and not in what
 insiders can do to alter data straight on the databases. In fact, the 
lack of security controls at back-end level hinders every effort to find
 evidence and investigate events related to credential misuse and data 
tampering. Moreover, even though attackers can be found and prosecuted, 
there is no evidence and audit trails on the databases to link illegal 
activities with identities. In this article, a Salting-Based 
Authentication Module and a Database Intrusion Detection Module are 
proposed as enhancements to eGovernment security to provide better 
authentication and auditing controls.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;a href=&quot;http://ieeexplore.ieee.org/document/6819952/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;10.1109/ICEDEG.2014.6819952&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/5365622583045201071'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/5365622583045201071'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2014/03/an-authentication-and-audit.html' title='An Authentication and Audit Architecture for Enhancing Security on eGovernment Services'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-4676498069004340513</id><published>2013-09-12T07:32:00.000-07:00</published><updated>2016-11-21T09:37:55.233-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="My Life through Words"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><category scheme="http://www.blogger.com/atom/ns#" term="Teaching &amp; Education"/><title type='text'>Memories 2013 - Campus Party Quito 3</title><content type='html'>&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;714&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;//www.slideshare.net/slideshow/embed_code/key/feQuI2BIAxYFzr&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;668&quot;&gt; &lt;/iframe&gt; &lt;br /&gt;
&lt;div style=&quot;margin-bottom: 5px;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/DenysAFlores/memorias-del-campus-party-quito-2013&quot; target=&quot;_blank&quot; title=&quot;Memorias del Campus Party Quito 2013&quot;&gt;Memorias del Campus Party Quito 2013&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt; &lt;/div&gt;
</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4676498069004340513'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/4676498069004340513'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2013/09/memories-2013-campus-party-quito-3.html' title='Memories 2013 - Campus Party Quito 3'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-2061665204642620222</id><published>2013-07-05T20:00:00.000-07:00</published><updated>2016-11-21T09:38:16.855-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>A Social Engineering Discussion about Privacy Attacks and Defences in Web Browsers and Social Networks</title><content type='html'>8th Congress of Science and Technology - ESPE 2013 - ISSN 1390-4663, 05 July 2013&lt;br /&gt;
Author: D. A. Flores&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Social engineering is the human side of hacking involving deliberate actions to violate privacy by persuading an individual to disclose private information. On the other hand, even when technical hacking and social engineering techniques are viewed as two different threats, hackers use the technology available to create sophisticated privacy attacks, like the Man-In-The-Middle attack, by combining technical skills and psychological techniques. Hence, this article reviews previous work in the field of security and privacy, and explores the technical and psychological aspects of social engineering in order to discuss their implication in social-engineering-based privacy&lt;br /&gt;
attacks and defences considering web browsers and social networks.&lt;br /&gt;
&lt;a href=&quot;http://ciencia.espe.edu.ec/wp-content/uploads/2013/05/COM66.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;
&lt;a href=&quot;http://ciencia.espe.edu.ec/wp-content/uploads/2013/05/COM66.pdf&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Full Access&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2061665204642620222'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/2061665204642620222'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2013/07/a-social-engineering-discussion-about.html' title='A Social Engineering Discussion about Privacy Attacks and Defences in Web Browsers and Social Networks'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-1814892271895572131</id><published>2013-02-27T09:23:00.000-08:00</published><updated>2016-11-21T09:38:33.490-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>An Anti-Money Laundering Methodology: Financial Regulations, Information Security and  Digital Forensics Working Together</title><content type='html'>Journal of Internet Services and Information Security, February 2013&lt;br /&gt;
Authors: D. A. Flores, O. Angelopoulou, R.J. Self&lt;br /&gt;
&lt;br /&gt;
&lt;b&gt;Abstract&lt;/b&gt;&lt;br /&gt;
&lt;br /&gt;
Analysing large amounts of financial information within databases can be hardly accomplished when dealing with money laundering. The main reason is the lack of digital forensics and proper database analysis procedures within the anti-money laundering strategies of financial institutions. Also, analysing single or grouped financial events related to money laundering is difficult when the Know-Your-Customer Policies in these institutions are not enforced, or even used as evidentiary instruments to gather digital evidence and track suspicious customers through the whole investigation life cycle. Even though the relevant data sources to get information from can be identified and used to create Suspicious Activity Reports, they need to be protected from money laundering events, and by these means, prevent their confiscation. Hence, in this article, we propose a methodology for combining digital forensics and database analysis in order to enhance money laundering detection. Additionally, in order to tackle the lack of synergy between the KYC policies and Information Security requirements, we enhance our previous model by analysing the FATF recommendations, the Basel Frameworks along with the BS ISO/IEC 27001, 27002 and 27037 standards in order to incorporate some of their best-practices into a methodology for money laundering detection model to deliver a set of requirements and activities for customer verification and financial evidence extraction before, during, and after a suspicious activity takes place.&lt;br /&gt;
&lt;a href=&quot;http://isyou.info/jisis/vol3/no12/7.htm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;&lt;br /&gt;&lt;/a&gt;
&lt;a href=&quot;http://isyou.info/jisis/vol3/no12/7.htm&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;Full Access&lt;/a&gt;</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1814892271895572131'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/1814892271895572131'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2013/02/an-anti-money-laundering-methodology.html' title='An Anti-Money Laundering Methodology: Financial Regulations, Information Security and  Digital Forensics Working Together'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-3414124253845661273</id><published>2013-01-05T09:26:00.000-08:00</published><updated>2018-01-18T07:02:40.715-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Detection and Mitigation of MITM Attacks in Storage Cloud Infrastructures</title><content type='html'>CyberSecurity for the Next Generation, Kaspersky International Student Conference, 05 January 2013&lt;br /&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;br /&gt;&lt;/div&gt;
&lt;div style=&quot;text-align: center;&quot;&gt;
&lt;iframe allowfullscreen=&quot;&quot; frameborder=&quot;0&quot; height=&quot;356&quot; marginheight=&quot;0&quot; marginwidth=&quot;0&quot; scrolling=&quot;no&quot; src=&quot;https://www.slideshare.net/slideshow/embed_code/key/rImTs5BntKeNTc&quot; style=&quot;border-width: 1px; border: 1px solid #ccc; margin-bottom: 5px; max-width: 100%;&quot; width=&quot;427&quot;&gt; &lt;/iframe&gt; &lt;/div&gt;
&lt;div style=&quot;margin-bottom: 5px; text-align: center;&quot;&gt;
&lt;b&gt; &lt;a href=&quot;https://www.slideshare.net/secret/rImTs5BntKeNTc&quot; target=&quot;_blank&quot; title=&quot;Kaspersky csng 2013&quot;&gt;Kaspersky csng 2013&lt;/a&gt; &lt;/b&gt; from &lt;b&gt;&lt;a href=&quot;https://www.slideshare.net/DenysAFlores&quot; target=&quot;_blank&quot;&gt;Denys A. Flores&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;
Original Screenshot from www.kaspersky[dot]co[dot]za&lt;br /&gt;
Last Accessed: 18/01/2018&lt;b&gt;&amp;nbsp;&lt;/b&gt; &lt;/div&gt;
&lt;br /&gt;
Authors: J. Carmilema, D. Medrano, D. A. Flores&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
Cloud computing is changing IT service provision around the world, not only within large, but also small enterprises. These are benefited by tremendous advantages in cost reduction and customer satisfaction; however, behind this, there is a constant concern about risk management and vulnerability analysis when IT services are placed in the Cloud with thirdparties managing the security of the core-business infrastructure. Moreover, when moving to the Cloud, providers struggle to ensure high integrity, availability and confidentiality of information because Cloud Services are still exposed to traditional threats due to the inherited protocols working underneath, which have not evolved as quick as these services. In this article, we briefly explain some important concepts of Cloud Computing in order to understand the impact of ARP Spoofing, via a Man-In-The-Middle Attack (MITM) within a small experimental Storage Cloud environment so that a possible way to mitigate this particular problem to guarantee secure connections can be provided.</content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3414124253845661273'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/3414124253845661273'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2013/01/detection-and-mitigation-of-mitm.html' title='Detection and Mitigation of MITM Attacks in Storage Cloud Infrastructures'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-5780967653316397930</id><published>2012-09-01T09:35:00.000-07:00</published><updated>2016-11-21T09:35:51.382-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions</title><content type='html'>1st International Workshop on Cybercrimes and Emerging Web Environments (CEWE-2012), conj.with the 3rd International Conference on Emerging Intelligent Data and Web Technologies (EIDWT-2012), Bucharest, Romania. 19 - 21 September 2012&lt;br /&gt;
Authors: D. A. Flores, O. Angelopoulou, R. J. Self&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
Digital forensics is the science that identify, preserve, collect, 
validate, analyse, interpret, and report digital evidence that may be 
relevant in court to solve criminal investigations. Conversely, money 
laundering is a form of crime that is compromising the internal policies
 in financial institutions, which is investigated by analysing large 
amount of transactional financial data. However, the majority of 
financial institutions have adopted ineffective detection procedures and
 extensive reporting tasks to detect money laundering without 
incorporating digital forensic practices to handle evidence. Thus, in 
this article, we propose an anti-money laundering model by combining 
digital forensics practices along with database tools and database 
analysis methodologies. As consequence, admissible Suspicious Activity 
Reports (SARs) can be generated, based on evidence obtained from 
forensically analysing database financial logs in compliance with 
Know-Your-Customer policies for money laundering detection.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;a class=&quot;ng-binding&quot; href=&quot;http://ieeexplore.ieee.org/document/6354745/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;10.1109/EIDWT.2012.22&lt;/a&gt; </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/5780967653316397930'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/5780967653316397930'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2012/09/combining-digital-forensic-practices.html' title='Combining Digital Forensic Practices and Database Analysis as an Anti-Money Laundering Strategy for Financial Institutions'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry><entry><id>tag:blogger.com,1999:blog-762893744118596832.post-7185845569899497054</id><published>2012-06-27T09:42:00.000-07:00</published><updated>2016-11-21T09:43:25.970-08:00</updated><category scheme="http://www.blogger.com/atom/ns#" term="Information Security"/><category scheme="http://www.blogger.com/atom/ns#" term="Publications"/><title type='text'>CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection</title><content type='html'>3rd International Symposium on Mobile and Wireless Network Security (MWNS-12) in conj. with TrustCom 2012: The 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, 25-27th June 2012.&lt;br /&gt;
&lt;br /&gt;
Authors: D. J. Day, D. A. Flores, H. S. Lallie&lt;br /&gt;
&lt;br /&gt;
Abstract&lt;br /&gt;
&lt;br /&gt;
Intrusion Detection Systems are an accepted and very useful option to 
monitor, and detect malicious activities. However, Intrusion Detection 
Systems have inherent limitations which lead to false positives and 
false negatives; we propose that combining signature and anomaly based 
IDSs should be examined. This paper contrasts signature and 
anomaly-based IDSs, and critiques some proposals about hybrid IDSs with 
signature and heuristic capabilities, before considering some of their 
contributions in order to include them as main features of a new hybrid 
IDS named CONDOR (COmbined Network intrusion Detection ORientate), which
 is designed to offer superior pattern analysis and anomaly detection by
 reducing false positive rates and administrator intervention.&lt;br /&gt;
&lt;br /&gt;
DOI: &lt;a href=&quot;http://ieeexplore.ieee.org/document/6296072/&quot; rel=&quot;nofollow&quot; target=&quot;_blank&quot;&gt;10.1109/TrustCom.2012.110&lt;/a&gt; </content><link rel='edit' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7185845569899497054'/><link rel='self' type='application/atom+xml' href='http://www.blogger.com/feeds/762893744118596832/posts/default/7185845569899497054'/><link rel='alternate' type='text/html' href='http://denys-flores.blogspot.com/2012/06/condor-hybrid-ids-to-offer-improved.html' title='CONDOR: A Hybrid IDS to Offer Improved Intrusion Detection'/><author><name>D. A. Flores</name><uri>http://www.blogger.com/profile/11235159781731864901</uri><email>noreply@blogger.com</email><gd:image rel='http://schemas.google.com/g/2005#thumbnail' width='32' height='32' src='//blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_556xNNOduCK-W5Lg0HcgHwF9MGsJpt9DtCLR_DHnVTCOIE7_VnbbTfarbVZy2Gmw3ZHYV28QRwXn_Oo-VnSsNBRH7YFG8jqI8lmr7q0tIRGzgJ9g525wgGC8mASkGw/s113/16174712_10211799977060011_2920076991317735253_n.jpg'/></author></entry></feed>