On the detection of pod slurping attacks
Authors: Kavallaris, T. and Katos, V.
Journal: Computers and Security
Volume: 29
Issue: 6
Pages: 680-685
ISSN: 0167-4048
DOI: 10.1016/j.cose.2010.01.002
Abstract:Time is recognised to be a dimension of paramount importance in computer forensics. In this paper, we report on the potential of identifying past pod slurping type of attacks by constructing a synthetic metric based on information contained in filesystem timestamps. More specifically, by inferring the transfer rate of a file from last access timestamps and correlating that to the characteristic transfer rate capabilities of a suspicious USB found in the Windows registry, one could assess the probability of having suffered an unauthorised copy of files. Preliminary findings indicate that file transfer rates can be associated with the make and model of the USB storage device and give supporting information to the forensic analyst to identify file leakages. © 2010 Elsevier Ltd. All rights reserved.
Source: Scopus
Preferred by: Vasilis Katos
On the detection of pod slurping attacks
Authors: Kavallaris, T. and Katos, V.
Journal: COMPUTERS & SECURITY
Volume: 29
Issue: 6
Pages: 680-685
eISSN: 1872-6208
ISSN: 0167-4048
DOI: 10.1016/j.cose.2010.01.002
Source: Web of Science (Lite)