Memory forensics of the OpenDaylight software-defined networking (SDN) controller

A Alshaya, A Kardorff, C Facundus, I Baggili… - Proceedings of the 18th …, 2023 - dl.acm.org
Software-Defined Networking (SDN) abstracts the underlying networking hardware by
keeping the control plane and the data separated. SDNs use the control plane to direct …

Cybersecurity Alert Prioritization in a Critical High Power Grid With Latent Spaces

JR Feijoo-Martínez, A Guerrero-Curieses… - IEEE …, 2023 - ieeexplore.ieee.org
High-Power electric grid networks require extreme security in their associated
telecommunication network to ensure protection and control throughout power transmission …

Towards a generic approach for memory forensics

E Qawasmeh, MI Al-Saleh… - 2019 Sixth HCT …, 2019 - ieeexplore.ieee.org
The era of information technology has, unfortunately, contributed to the tremendous rise in
the number of criminal activities. However, digital artifacts can be utilized in convicting …

Network forensics

I Volarević, M Tomić, L Milohanić - 2022 45th Jubilee …, 2022 - ieeexplore.ieee.org
Network firewalls and intrusion detection and prevention devices or software are crucial
parts of today's networks. However, security breaches still can and do happen. They can …

Evading DoH via live memory forensics for phishing detection and content filtering

G Varshney, P Iyer, P Atrey… - … Systems & NETworkS …, 2021 - ieeexplore.ieee.org
Internet will see a boost in the DNS over HTTPS (DoH) traffic to enhance user privacy. The
existing mechanisms of monitoring/filtering DNS traffic at end points/gateways that rely on …

Towards the Utilization of Parallel Programming to Speed Up RAM Forensics

ZA Al-Sharif, R Alhamouri… - 2023 Tenth International …, 2023 - ieeexplore.ieee.org
Memory forensics uses volatile digital artifacts as evidence about criminal activities.
Analyzing captured memory dumps for volatile data requires time and effort. This paper …

A Privacy Preserving Context Sensitive Kernel

A Bhaware, G Varshney, J Kour, T Bishnoi… - Proceedings of the …, 2024 - dl.acm.org
Insider threats and attacks have witnessed a concerning rise in recent years, posing
significant risks and financial implications for businesses. Malicious insiders exploit memory …

[PDF][PDF] Windows 10's Browser Forensic Analysis for Tracing P2P Networks' Anonymous Attacks

S Kauser, TS Malik, MH Hasan, EAP Akhir… - Computers, Materials …, 2022 - researchgate.net
A web browser is the most basic tool for accessing the internet from any of the
machines/equipment. Recently, data breaches have been reported frequently from users …

Software-Defined Networking Security Techniques and the Digital Forensics of the SDN Control Plane

A Alshaya - 2023 - search.proquest.com
Abstract Software-Defined Networking (SDN) is an efficient networking design that
decouples the network's control plane from the data plane. When compared to the traditional …

[PDF][PDF] Live Memory Forensics Investigations: A Comparative Analysis

I Syamsuddin, D Syamsuar - Journal of Advances in …, 2023 - pdfs.semanticscholar.org
The escalating dependence on information technology for daily activities ensures that
cybercrime cases continue unabated. Consequently, the role of cyber forensics investigators …