Title :
Inconsistencies in information security and digital forensics
Author_Institution :
Dept. of Comput. Sci., California State Univ., Sacramento, CA, USA
Abstract :
Inconsistency in knowledge, information and data is ubiquitous. Inconsistency can be a very effective tool in accomplishing the objectives in information security and digital forensics. In this paper, our focus is on the utilities of inconsistency in those areas: access control lists in firewalls, intrusion detection systems, deception based defense, and digital image forensics. We describe an algorithm for detecting several types of firewall rule inconsistency. Compared with related work, our approach has several salient features. We also highlight various types of inconsistencies in the aforementioned areas. The take-home message is that inconsistency is a very important phenomenon and its utilities can never be underestimated in our endeavors.
Keywords :
authorisation; computer forensics; access control lists; deception based defense; digital forensics; digital image forensics; firewalls; information security; intrusion detection system; Digital forensics; Digital images; Fires; Intrusion detection; Protocols; access control lists; digital image forensics; firewalls; inconsistency; inconsistent deceptions; intrusion detection systems;
Conference_Titel :
Information Reuse and Integration (IRI), 2010 IEEE International Conference on
Conference_Location :
Las Vegas, NV
Print_ISBN :
978-1-4244-8097-5
DOI :
10.1109/IRI.2010.5558951