On the detection of pod slurping attacks

This source preferred by Vasilis Katos

This data was imported from Scopus:

Authors: Kavallaris, T. and Katos, V.

Journal: Computers and Security

Volume: 29

Issue: 6

Pages: 680-685

ISSN: 0167-4048

DOI: 10.1016/j.cose.2010.01.002

Time is recognised to be a dimension of paramount importance in computer forensics. In this paper, we report on the potential of identifying past pod slurping type of attacks by constructing a synthetic metric based on information contained in filesystem timestamps. More specifically, by inferring the transfer rate of a file from last access timestamps and correlating that to the characteristic transfer rate capabilities of a suspicious USB found in the Windows registry, one could assess the probability of having suffered an unauthorised copy of files. Preliminary findings indicate that file transfer rates can be associated with the make and model of the USB storage device and give supporting information to the forensic analyst to identify file leakages. © 2010 Elsevier Ltd. All rights reserved.

The data on this page was last updated at 04:45 on January 16, 2018.