Server Administrator

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 207 Experts worldwide ranked by ideXlab platform

Hossien Ghodosi - One of the best experts on this subject based on the ideXlab platform.

  • ITNG - A Proactive Approach to Preventing Phishing Attacks Using Pshark
    2009 Sixth International Conference on Information Technology: New Generations, 2009
    Co-Authors: R Shah, W. Read, Jarrod Trevathan, Hossien Ghodosi
    Abstract:

    Phishing is an online scam used to dupe people out of their personal information for the purpose of defrauding them. This paper presents a conceptual design for removing phishing pages that have been uploaded on a website, potentially without knowledge of the website owner or host Server. Initially the system is alerted to the presence of a phishing page upon receiving the Phisher’s solicitation e-mail. Next the system retrieves the location, IP address and contact information of the host Server using a tracking program. Finally, the system sends notification to the Administrator about the phishing page on its Server. It is then up to the host Server Administrator to remove the phishing page from its Server, or face the possibility of criminals continuing to use their site. This approach acts as the basis for further development into proactively (or aggressively) attacking Phishers directly, rather than being a reactionary approach that is common to most email filters and anti-virus software.

  • A Proactive Approach to Preventing Phishing Attacks Using Pshark
    Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on, 2009
    Co-Authors: R Shah, W. Read, Jarrod Trevathan, Hossien Ghodosi
    Abstract:

    Phishing is an online scam used to dupe people out of their personal information for the purpose of defrauding them. This paper presents a conceptual design for removing phishing pages that have been uploaded on a Web site, potentially without knowledge of the Web site owner or host Server. Initially the system is alerted to the presence of a phishing page upon receiving the Phisherpsilas solicitation e-mail. Next the system retrieves the location, IP address and contact information of the host Server using a tracking program. Finally, the system sends notification to the Administrator about the phishing page on its Server. It is then up to the host Server Administrator to remove the phishing page from its Server, or face the possibility of criminals continuing to use their site. This approach acts as the basis for further development into proactively (or aggressively) attacking Phishers directly, rather than being a reactionary approach that is common to most email filters and anti-virus software.

Tetsutaro Uehara - One of the best experts on this subject based on the ideXlab platform.

  • Double Encryption for Data Authenticity and Integrity in Privacy- preserving Confidential Forensic Investigation.
    2020
    Co-Authors: Ryoichi Sasaki, Tetsutaro Uehara
    Abstract:

    It is getting popular that users will put their data in cloud computing services or data centers. It applies to criminals too. In such computing platforms, data will be stored in large Servers. In other words, evidence for crime cases may exist in a large storage media or even distributed in various storage device(s) that may be in different sites. The traditional approach of cloning a copy of data in forensic investigation will not work. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. provided the first solutions to let the Server Administrator (without knowing the investigation subject) to retrieve only the data that is relevant to the cases based on the technique of searching encrypted keywords over encrypted data. In this case, the privacy data of irrelevant users can be protected from disclosing. However, in their solutions, it is no way to confirm the authenticity and integrity of the collected data. This is critical when presenting the evidence to court. In this paper, we try to tackle this problem and provide a solution to verify the authenticity and integrity of the evidence in addition to the security requirements for privacy-preserving confidential forensic investigation. Our solution is based on a “double encryption” scheme. We provide a security analysis of the scheme and we also implemented the proposed scheme based on RSA cryptosystem. Experimental results show that the performance of the scheme is reasonable.

  • Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation
    2013
    Co-Authors: Shuhui Hou, Tetsutaro Uehara, Ryoichi Sasaki, Siu-ming Yiu
    Abstract:

    With the rapid development of cloud computing services, it is common to have a large Server shared by many different users. As the shared Server is involved in a criminal case, it is hard to clone a copy of data in forensic investigation due to the huge volume of data. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. presented a solution to let the Server Administrator (without knowing the investigation subject) cooperate with the investigator in performing forensic investigation. By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing. However, the authenticity and integrity of the collected evidence are not considered there. The authenticity and integrity are two fundamental requirements for the evidence admitted in court. So in this paper, we aim to prove the authenticity and integrity of the evidence collected by the existing work. Based on commutative encryption, we construct a blind signature and propose a “encryption-then-blind signature with designated verifier” scheme to tackle the problem.

  • ICT-EurAsia - Verifying data authenticity and integrity in Server-aided confidential forensic investigation
    Lecture Notes in Computer Science, 2013
    Co-Authors: Ryoichi Sasaki, Tetsutaro Uehara
    Abstract:

    With the rapid development of cloud computing services, it is common to have a large Server shared by many different users. As the shared Server is involved in a criminal case, it is hard to clone a copy of data in forensic investigation due to the huge volume of data. Besides, those users irrelevant to the crime are not willing to disclose their private data for investigation. To solve these problems, Hou et al. presented a solution to let the Server Administrator (without knowing the investigation subject) cooperate with the investigator in performing forensic investigation. By using encrypted keyword(s) to search over encrypted data, they realized that the investigator can collect the necessary evidence while the private data of irrelevant users can be protected from disclosing. However, the authenticity and integrity of the collected evidence are not considered there. The authenticity and integrity are two fundamental requirements for the evidence admitted in court. So in this paper, we aim to prove the authenticity and integrity of the evidence collected by the existing work. Based on commutative encryption, we construct a blind signature and propose a "encryption-then-blind signature with designated verifier" scheme to tackle the problem.

  • Privacy Preserving Multiple Keyword Search for Confidential Investigation of Remote Forensics
    2011 Third International Conference on Multimedia Information Networking and Security, 2011
    Co-Authors: Tetsutaro Uehara, K.p. Chow
    Abstract:

    Remote forensics can help investigators perform investigation without need to ship hard drives or travel to a remote location. With increased use of cloud computing technologies, it is becoming more and more difficult to perform post-event forensic investigation. The difficulty consists in that thousands upon thousands of disparate data from different data owners may be stored on a single storage device (e.g., a remote Server). To clone a copy of data from the storage device is a costly and time consuming task and may not be easy due to the huge volume of data. Even if it is possible to make a clone, investigating all the data one by one will inevitably result in exposing irrelevant data to the investigators while data owners may be unwilling to expose it because it may involve their privacy information. The other alternative is to let the Server Administrator search the relevant information and retrieve the data for the investigators provided a warrant can be provided. However, sometimes, the investigators need to keep the investigation subject confidential due to the confidentiality of the crime or the Server Administrator may be one of the suspects. In this paper, we address how to solve this problem by multiple keyword search over encrypted data, so that the investigators can obtain the necessary evidence while keeping the investigation subject confidential and at the same time, the irrelevant data can be protected from exposing to the investigators.

Vidhya Govindaraju - One of the best experts on this subject based on the ideXlab platform.

  • Strategy-based behavioural biometrics: a novel approach to automated identification
    Journal of Computer Applications in Technology, 2009
    Co-Authors: Roman V. Yampolskiy, Vidhya Govindaraju
    Abstract:

    Behavioural intrusion detection is a frequently used for insuring network security. We expand behaviour based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a behavioural biometric signature can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioural profiles for each player in a game of Poker. Once a behavioural signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behaviour are reported to the game Server Administrator as potential security breaches.

  • Strategy-based behavioural biometrics: a novel approach to automated identification
    International Journal of Computer Applications in Technology, 2009
    Co-Authors: Roman V. Yampolskiy, Vidhya Govindaraju
    Abstract:

    Behavioural intrusion detection is a frequently used for insuring network security. We expend behaviour based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a behavioural biometric signature can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioural profiles for each player in a game of Poker. Once a behavioural signature is generated for a player, it is continuously compared against player’s current actions. Any significant deviations in behaviour are reported to the game Server Administrator as potential security breaches.

  • use of behavioral biometrics in intrusion detection and online gaming
    Society of Photo-Optical Instrumentation Engineers (SPIE) Conference Series, 2006
    Co-Authors: Roman V. Yampolskiy, Vidhya Govindaraju
    Abstract:

    Behavior based intrusion detection is a frequently used approach for insuring network security. We expend behavior based intrusion detection approach to a new domain of game networks. Specifically, our research shows that a unique behavioral biometric can be generated based on the strategy used by an individual to play a game. We wrote software capable of automatically extracting behavioral profiles for each player in a game of Poker. Once a behavioral signature is generated for a player, it is continuously compared against player's current actions. Any significant deviations in behavior are reported to the game Server Administrator as potential security breaches. Our algorithm addresses a well-known problem of user verification and can be re-applied to the fields beyond game networks, such as operating systems and non-game networks security.

Darril Gibson - One of the best experts on this subject based on the ideXlab platform.

  • mcitp windows Server 2008 Server Administrator certification kit
    2008
    Co-Authors: James Chellis, William Panek, Tylor Wentworth, Darril Gibson
    Abstract:

    Prepare yourself for the three required exams necessary to achieve your MCITP: Server Administrator certification with MCITP: Windows Server 2008 Server Administrator Certification Kit, which includes the three study guides that you will need. These guides will provide complete coverage of exam material, exam objectives, real world scenarios, hands-on exercises and challenging review questions both in the books and on accompanying CDs. You will find the MCTS: Windows Server 2008 Active Directory Configuration Study Guide, the MCTS: Windows Server 2008 Network Infrastructure Configuration Study Guide, and the MCITP: Windows Server 2008 Server Administrator Study Guide.

  • mcitp windows Server 2008 Server Administrator study guide
    2008
    Co-Authors: Darril Gibson
    Abstract:

    Master Windows Server 2008 and navigate every detail of Microsofts new MCITP: Windows Server 2008 Server Administrator exam with the information in MCITP: Windows Server 2008 Administration Study Guide (Exam 70-646, with CD). Learn the infrastructure, Web, and IT application Servers and also how to use scripts and batch files to accomplish tasks on a regular basis. As a Server Administrator, you will understand how to manage the Server operating system, file, and directory services, distribute software, patches, and updates, profile and monitor assigned Servers, and troubleshoot.

R Shah - One of the best experts on this subject based on the ideXlab platform.

  • ITNG - A Proactive Approach to Preventing Phishing Attacks Using Pshark
    2009 Sixth International Conference on Information Technology: New Generations, 2009
    Co-Authors: R Shah, W. Read, Jarrod Trevathan, Hossien Ghodosi
    Abstract:

    Phishing is an online scam used to dupe people out of their personal information for the purpose of defrauding them. This paper presents a conceptual design for removing phishing pages that have been uploaded on a website, potentially without knowledge of the website owner or host Server. Initially the system is alerted to the presence of a phishing page upon receiving the Phisher’s solicitation e-mail. Next the system retrieves the location, IP address and contact information of the host Server using a tracking program. Finally, the system sends notification to the Administrator about the phishing page on its Server. It is then up to the host Server Administrator to remove the phishing page from its Server, or face the possibility of criminals continuing to use their site. This approach acts as the basis for further development into proactively (or aggressively) attacking Phishers directly, rather than being a reactionary approach that is common to most email filters and anti-virus software.

  • A Proactive Approach to Preventing Phishing Attacks Using Pshark
    Information Technology: New Generations, 2009. ITNG '09. Sixth International Conference on, 2009
    Co-Authors: R Shah, W. Read, Jarrod Trevathan, Hossien Ghodosi
    Abstract:

    Phishing is an online scam used to dupe people out of their personal information for the purpose of defrauding them. This paper presents a conceptual design for removing phishing pages that have been uploaded on a Web site, potentially without knowledge of the Web site owner or host Server. Initially the system is alerted to the presence of a phishing page upon receiving the Phisherpsilas solicitation e-mail. Next the system retrieves the location, IP address and contact information of the host Server using a tracking program. Finally, the system sends notification to the Administrator about the phishing page on its Server. It is then up to the host Server Administrator to remove the phishing page from its Server, or face the possibility of criminals continuing to use their site. This approach acts as the basis for further development into proactively (or aggressively) attacking Phishers directly, rather than being a reactionary approach that is common to most email filters and anti-virus software.