Open Access. Powered by Scholars. Published by Universities.®

Digital Commons Network

Open Access. Powered by Scholars. Published by Universities.®

Articles 31 - 58 of 58

Full-Text Articles in Entire DC Network

Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward Mar 2009

Smartpot: Creating A 1st Generation Smartphone Honeypot, Michael Freeman, Andrew Woodward

Australian Digital Forensics Conference

This paper discusses an experimental method for creating a 1st generation smart-phone honey-pot with the intention of discovering automated worms. A Honeyd low-interaction virtual honey-pot is conceived as a possible method of discovering automated smart-phone worms by emulating the operating system Windows Mobile 5 and Windows Mobile 6, along with the available TCP/UDP ports of each operating system. This is an experimental method as there are currently no known malicious smart-phone worms. Honeyd emulates devices by mimicking the devices operating system fingerprint which is created by the unique responses each operating system sends to a discrete series of TCP and …


Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward Mar 2009

Secure State Deletion: Testing The Efficacy And Integrity Of Secure Deletion Tools Onsolid State Drives, Michael Freeman, Andrew Woodward

Australian Digital Forensics Conference

The research aimed to determine the efficacy and integrity of several hard-drive disk deletion tools on solid state drives (SSDs). SSDs contain new technologies such as wear-levelling and device under provisioning to provide efficient functionality and speed for data management, but the same technologies may also provide obstacles to ensuring that all information is fully removed from the drive. Furthermore SSDs stores files in 4KB pages, yet data can only be deleted in 512KB blocks. This function uses the disk controller to remove all the pages from the block a file is being deleted from, storing the pages in a …


The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi Mar 2009

The 2009 Analysis Of Information Remaining On Usb Storage Devices Offered Forsale On The Second Hand Market, Andy Jones, Craig Valli, G. Dabibi

Australian Digital Forensics Conference

The use of the USB storage device, also known as the USB drive, a thumb drive, a keychain drive and a flash drive has, for the most part, replaced the floppy disk and to some extent the Compact Disk (CD), the DVD (Digital Video Disk or Digital Versatile Disk) and the external hard disk. Their robustness, size and weight make them easy to transport, but also to lose or misplace. They are inexpensive and are often given away as promotional items by organisations. Over the last few years there has been a dramatic increase in the storage capacity of these …


Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo Mar 2009

Theory And Practice Of Flash Memory Mobile Forensics, Salvatore Fiorillo

Australian Digital Forensics Conference

This paper is an introduction to flash memory forensics with a special focus on completeness of evidence acquired from mobile phones. Moving through academic papers and industrial documents will be introduced the particular nature of non-volatile memories present in nowadays mobile phones; how they really work and which challenges they pose to forensic investigators. Then will be presented an advanced test in which some brand new flash memories have been used to hide data in man-made bad blocks: the aim is to verify if forensic software tools are able to acquire data from such blocks, and to evaluate the possibility …


A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah Mar 2009

A Forensics Overview And Analysis Of Usb Flash Memory Devices, Krishnun Sansurooah

Australian Digital Forensics Conference

Current forensic tools for examination of embedded systems like mobile phones and PDAs mostly perform data extraction on a logical level and do not consider the type of storage media during data analysis. This report suggests different low level approaches for the forensic examination of flash memories and describes three lowlevel data acquisition methods for making full memory copies of flash memory devices. Results of a file system study in which USB memory sticks from 45 different make and models were used are presented. For different mobile phones, this paper shows how full memory copies of their flash memories can …


Information Overload: Cctv, Your Networks, Communities And Crime, Vandra Harris, Crispin Harris Jan 2009

Information Overload: Cctv, Your Networks, Communities And Crime, Vandra Harris, Crispin Harris

Australian Security and Intelligence Conference

Electronic surveillance continues to play a central but often unobserved role in contemporary Western societies and attempts to police them. This paper focuses on closed circuit television (CCTV) footage and its technological implications, particularly relating infrastructure and data storage and integrity. While CCTV might appear attractive in augmenting law enforcement systems, the authors argue that the debate on use of CCTV in crime prevention remains incomplete without an effective understanding of the diverse costs. This discussion reveals startling ICT resource needs and associated costs, together with very specific technological capacity. These contribute significantly to the costs of such systems, reinforcing …


Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill Jan 2009

Professional Intelligence Judgement Artistry: Some Early Observations, Jeff Corkill

Australian Security and Intelligence Conference

Intelligence analysis is critical national security and law enforcement function dependant on the intellectual capacity of individual analysts. The practice of intelligence is undertaken in an extremely complex environment often under a veil of secrecy, and where uncertain and deceptive information represents the norm. In order to develop as a profession appropriate constructs with which to explore and explain how analysts process intelligence, make decisions and reach judgements are needed. An improved understanding will offer opportunities to develop appropriate training and professional development for intelligence analysts. This paper introduces the construct of Professional Intelligence Judgement Artistry together with some very …


Security Decay: An Entropic Approach To Definition And Understanding, Michael Coole, David J. Brooks Jan 2009

Security Decay: An Entropic Approach To Definition And Understanding, Michael Coole, David J. Brooks

Australian Security and Intelligence Conference

This article discusses the affect decay has within a systems approach used when implementing security strategies, in particular, the theory of defence in depth. Defence in depth is implemented within a risk management framework to reduce an organisation’s identified risks, which could lead to undesirable and unacceptable consequences. Defence in depth aims to link layered security elements into a system to ensure a holistic and functional security system, underpinned by the functions of; deter, detect, delay, response and recovery. For such a system to be commissioned and maintain its commissioning effectiveness, these functions must be performed in their sequential order …


Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli Jan 2009

Insecurity By Obscurity: A Review Of Soho Router Literature From A Network Security Perspective, Patryk Szewczyk, Craig Valli

Research outputs pre 2011

Because of prevalent threats to SoHo based ADSL Routers, many more devices are compromised. Whilst an end-user may be at fault for not applying the appropriate security mechanisms to counter these threats, vendors should equally share the blame. This paper reveals that the lack of security related content and poor overall design could impact on end-users’ interpretation and willingness to implement security controls on their ADSL router. It argues that whilst the number of threats circulating the Internet is increasing, vendors are not improving their product literature.


A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen Jan 2009

A Semiparametric Approach To A Nonlinear Acd Model, Pipat Wongsaart, Jiti Gao, David E. Allen

Research outputs pre 2011

We introduce in this paper a new semiparametric approach to a nonlinear ACD model, namely the Semiparametric ACD (SEMI-ACD) model. This new model is more flexible in the sense that the data are allowed to speak for themselves, without a hypothetical assumption being imposed arbitrarily on its key component. Moreover, it enables a much more thorough examination of the intertemporal importance of the conditional duration on the ACD process. Our experimental analysis suggests that the new model possesses a sound asymptotic character, while its performance is also robust across data generating processes and assumptions about the conditional distribution of the …


Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris Jan 2009

Fitting Weibull Acd Models To High Frequency Transactions Data : A Semi-Parametric Approach Based On Estimating Functions, Kok Haur Ng, David E. Allen, Shelton Peiris

Research outputs pre 2011

Autoregressive conditional duration (ACD) models play an important role in financial modeling. This paper considers the estimation of the Weibull ACD model using a semiparametric approach based on the theory of estimating functions (EF). We apply the EF and the maximum likelihood (ML) methods to a data set given in Tsay (2003, p203) to compare these two methods. It is shown that the EF approach is easier to apply in practice and gives better estimates than the MLE. Results show that the EF approach is compatible with the ML method in parameter estimation. Furthermore, the computation speed for the EF …


A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao Jan 2009

A Match-Based Approach To Optimize Conformance Test Sequence Generation Using Mp-Method, Jitian Xiao

Research outputs pre 2011

An important issue in protocol conformance testing is how to generate test sequences in an efficient and effective way that achieves the required fault detection coverage. We proposed an approach for finding shorter test sequences for protocol conformance testing based on the Wp method in our previous work. While the method generated good quality test sequences, an extra leading sequence may have to be added if the final test sequence generated was not started from the same starting state of the given FSM. A new approach is proposed in this paper to overcome this problem thus to improve the quality …


Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward Jan 2009

Scada Security - Slowly Circling A Disaster Area, Craig Valli, Andrew Woodward

Research outputs pre 2011

SCADA (Supervisory Control And Data Acquisition) networks control much of the industrialised nations production and supply complexes. Various government reports and investigations have highlighted the vulnerability of these systems. Many of these systems are on private networks which are increasingly being connected to systems that are accessible from other networks such as the Internet. SCADA systems have unique security and operational requirements. However, many of the most basic security measures are missing in these networks. This examines some of these issues and proposes some technologies that could help secure these networks from attack.


Scada Forensics With Snort Ids, Craig Valli Jan 2009

Scada Forensics With Snort Ids, Craig Valli

Research outputs pre 2011

This paper is a research in progress paper outlining an approach using open source IDS (Snort) and honeypot (nepenthes, honeyd) technologies to create a resilient layered defensive approach for SCADA and control systems networks.


Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li Jan 2009

Ballistics Image Processing And Analysis For Firearm Identification, Dongguang Li

Research outputs pre 2011

Firearm identification is an intensive and time-consuming process that requires physical interpretation of forensic ballistics evidence. Especially as the level of violent crime involving firearms escalates, the number of firearms to be identified accumulates dramatically. The demand for an automatic firearm identification system arises. This chapter proposes a new, analytic system for automatic firearm identification based on the cartridge and projectile specimens. Not only do we present an approach for capturing and storing the surface image of the spent projectiles at high resolution using line-scan imaging technique for the projectiles database, but we also present a novel and effective FFT-based …


A Max-Min Multiobjective Technique To Optimize Model Based Test Suite, Usman Farooq, Chiou P. Lam Jan 2009

A Max-Min Multiobjective Technique To Optimize Model Based Test Suite, Usman Farooq, Chiou P. Lam

Research outputs pre 2011

Generally, quality software production seeks timely delivery with higher productivity at lower cost. Redundancy in a test suite raises the execution cost and wastes scarce project resources. In model-based testing, the testing process starts with earlier software developmental phases and enables fault detection in earlier phases. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The paper presents a novel max-min multiobjective technique incorporated into a test suite optimization framework to find a better trade-off between the intrinsically conflicting goals. For illustration two objectives i.e. coverage and size …


Evolving The Quality Of A Model-Based Test Suite, Usman Farooq, Chiou P. Lam Jan 2009

Evolving The Quality Of A Model-Based Test Suite, Usman Farooq, Chiou P. Lam

Research outputs pre 2011

Redundant test cases in newly generated test suites often remain undetected until execution and waste scarce project resources. In model-based testing, the testing process starts early on in the developmental phases and enables early fault detection. The redundancy in the test suites generated from models can be detected earlier as well and removed prior to its execution. The article presents a novel model-based test suite optimization technique involving UML activity diagrams by formulating the test suite optimization problem as an Equality Knapsack Problem. The aim here is the development of a test suite optimization framework that could optimize the model-based …


Iterated Prisoner's Dilemma For Species, Philip Hingston Jan 2009

Iterated Prisoner's Dilemma For Species, Philip Hingston

Research outputs pre 2011

The Iterated Prisoner's Dilemma (IPD) is widely used to study the evolution of cooperation between self-interested agents. Existing work asks how genes that code for cooperation arise and spread through a single-species population of IPD playing agents. In this paper, we focus on competition between different species of agents. Making this distinction allows us to separate and examine macroevolutionary phenomena. We illustrate with some species-level simulation experiments with agents that use well-known strategies, and with species of agents that use team strategies.


Environmental Education In Small Business: The Owner-Manager's Perspective, Janice Redmond, Elizabeth Walker Jan 2009

Environmental Education In Small Business: The Owner-Manager's Perspective, Janice Redmond, Elizabeth Walker

Research outputs pre 2011

Traditionally, environmental education has been aimed at the community or in primary schools and governmental pressure to reduce environmental damage has focussed on large businesses. More recently, the role and importance of small business and how to engage them in the environmental debate has come under scrutiny. Researchers have identified education as one method of increasing the understanding of small business owner-managers’ role and knowledge of practices that, when implemented, will reduce the negative impacts of their businesses. However, there is little attention given in the literature to the perspective of the small business owner-manager and environmental education. This research …


Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli Jan 2009

Visualisation Of Honeypot Data Using Graphviz And Afterglow, Craig Valli

Research outputs pre 2011

This research in progress paper explores the use of Graphviz and Afterglow for the analysis of data emanating from a honeypot system. Honeypot systems gather a wide range of data that is often difficult to readily search for patterns and trends using conventional log file analysis techniques. The data from the honeypots has been statically extracted and processed through Afterglow scripts to produce inputs suitable for use by the DOT graph based tools contained within Graphviz. This paper explores some of the benefits and drawbacks of currently using this type of approach.


Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka Jan 2009

Raising Heart Rate With Dance Pad Based Computer Games, Martin Masek, Philip Hingston, Matthew Carrigy, Liam Collins, Kazunori Nosaka

Research outputs pre 2011

No abstract provided.


Fuel Characteristics And Dynamics In Shrublands Of The Transitional Rainfall Zone, Western Australia, Sarah Dalgleish Jan 2009

Fuel Characteristics And Dynamics In Shrublands Of The Transitional Rainfall Zone, Western Australia, Sarah Dalgleish

Theses : Honours

Within the Mediterranean shrublands, fires are particularly intensive and widespread. In the Transitional Rainfall Zone in Western Australia, these large fires bum in areas with high conservation value, and present risks to human lives and infrastructure on properties in the region. The concern for the effect fires have on anthropocentric and ecological values in these shrublands makes it a priority in management to reduce the risks. Of the environmental and biotic factors that influence a fire, fuel is one of the most significant as it has the capacity to determine fire prope1iies such as the intensity, extent, bum pattern within …


Investigating Data Mining Techniques For Extracting Information From Alzheimer's Disease Data, Vinh Quoc Dang Jan 2009

Investigating Data Mining Techniques For Extracting Information From Alzheimer's Disease Data, Vinh Quoc Dang

Theses : Honours

Data mining techniques have been used widely in many areas such as business, science, engineering and more recently in clinical medicine. These techniques allow an enormous amount of high dimensional data to be analysed for extraction of interesting information as well as the construction of models for prediction. One of the foci in health related research is Alzheimer's disease which is currently a non-curable disease where diagnosis can only be confirmed after death via an autopsy. Using multi-dimensional data and the applications of data mining techniques, researchers hope to find biomarkers that will diagnose Alzheimer's disease as early as possible. …


Structural Characteristics Of Banksia Woodland Along An Ecohydrological Gradient, Western Australia, Rebecca Thomas Jan 2009

Structural Characteristics Of Banksia Woodland Along An Ecohydrological Gradient, Western Australia, Rebecca Thomas

Theses : Honours

Water availability (the defining feature of a 'hydrological habitat') has a major effect on plant growth, and the physiological and structural characteristics of plants often reflect the availability of this resource. In relation to development of vegetation structural characteristics as a consequence of a given hydrological habitat, it is important to understand whether self-organisation of plant cover (productivity, structure and function) interacts with water availability and if adjustment to water limitation exists ('ecohydrological optimization' or establishment of a 'hydrological equilibrium'). This study tested, through three hypotheses, whether structural and functional attributes of Banksia woodland vary with water availability, i.e. whether …


An Investigation Into Student Reactions Towards Rad Versus Traditional Programming Environments For Novice Developers, Pansy Colkers Jan 2009

An Investigation Into Student Reactions Towards Rad Versus Traditional Programming Environments For Novice Developers, Pansy Colkers

Theses : Honours

The traditional approach to programming using text editors is widely used in many institutions to teach introductory programming. These types of traditional programming environments provide fundamental programming concepts for learning, especially in the context of novice developers. In recent years, teaching institutions have seen a trend towards the introduction of visual "drag-and-drop" rapid application development (RAD) environments for teaching novice programmers. These 'environments capture student interest in programming by allowing the construction of workable programs within a short time frame based on minimal pre-existing coding knowledge. However, some have argued that these visual RAD environments might not be suitable for …


Using Decision Analytic Modelling To Simulate Pregnancy, Jeffrey Cannon Jan 2009

Using Decision Analytic Modelling To Simulate Pregnancy, Jeffrey Cannon

Theses : Honours

Decision analytic modelling enables decision makers to assess the cost-effectiveness associated with a proposed change in a cunent system without physically implementing the changes. This can be achieved by formulating a mathematical model that represents all the major events occuning in the system through fmmulas and algorithms, and estimating the likely outcomes along with their costs. This type of modelling has been identified by the State Health Research Advisory Council (SHRAC) of the Western Australian Depmiment of Health as an asset for the plmming of health care investments in the future. One such area in which the Western Australian Department …


Historical Geography Of Yellagonga Regional Park, Western Australia, Susan Ujma Jan 2009

Historical Geography Of Yellagonga Regional Park, Western Australia, Susan Ujma

Theses : Honours

The principle aim of this study was to reconstruct the land use history of the Yellagonga Regional Park wetland landscape. Located approximately twenty kilometres north of Perth, covering about 1400 hectares, the Park lies within the North-West Corridor of the metropolitan area. This research, assisted by archival sources, demonstrates that prior to early European settlement the Yellagonga wetlands were quintessential summer hunting and gathering sites for the Nyoongar Aboriginal people. The wetlands were utilised for water, food gathering, hunting, corroborees and rituals that governed their tribal lives. Early European settlers, market gardeners, and later subdivision for urban development, have adversely …


The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar Jan 2009

The Impact On Organizational Performance Of Contextual Factors, Strategy And Management Control Systems, Nazmi Saeb Jarrar

Theses: Doctorates and Masters

This dissertation examined antecedents of the use of contemporary management control systems (MCS) by testing the alignment of strategic and contextual variables with variables of contemporary systems of control in the organization. The study further explored the performance consequences of the implementation of these control systems, and the manner in which strategy can influence the organization’s control culture and management accounting practices. The impact of contextual factors, notably size and structural arrangements, such as decentralization and diversification, on management's choice of control systems were also examined. Hence, the study addressed the need for a better understanding of the association between …