Novel algorithm of intrusion detection systems by using the images metadata to detect electronic crime in cloud computing

A. Alani, Z. Al-Khanjari, Haydar Sabeeh Kalash, Y. Alshmmary

Research output: Contribution to journalArticle

Abstract

Many security professionals know about Image Metadata, but they do not really know how it can be used to protect from the threats and prove the authenticity of these images and the most significant aspect is the anonymity of perpetrator. The novelty of this paper lies on how to use a new algorithm of Image Metadata to detect internal intrusion and how to protect it in real time inside the cloud providers. In this paper, we propose a novel algorithm to use features and characteristics technologies of Image Metadata, namely, a novel family of Intrusion Detection Systems (IDS) built on Exchangeable Image File Format (EXIF) of Image Metadata. It can assist in eliminating the anonymity advantage of perpetrator which is considered extremely important for the Digital Investigation to detect the attacker in a real time and to prove the authenticity of the images Metadata against attackers.

Original languageEnglish
Pages (from-to)67-72
Number of pages6
JournalInternational Journal of Software Engineering and its Applications
Volume10
Issue number4
DOIs
Publication statusPublished - 2016

Fingerprint

Crime
Intrusion detection
Cloud computing
Metadata

Keywords

  • Digital investigation
  • Exchangeable image file format
  • Intrusion detection systems
  • Metadata

ASJC Scopus subject areas

  • Software

Cite this

Novel algorithm of intrusion detection systems by using the images metadata to detect electronic crime in cloud computing. / Alani, A.; Al-Khanjari, Z.; Kalash, Haydar Sabeeh; Alshmmary, Y.

In: International Journal of Software Engineering and its Applications, Vol. 10, No. 4, 2016, p. 67-72.

Research output: Contribution to journalArticle

@article{6b17056539c84086b0f7ab5873dd5e17,
title = "Novel algorithm of intrusion detection systems by using the images metadata to detect electronic crime in cloud computing",
abstract = "Many security professionals know about Image Metadata, but they do not really know how it can be used to protect from the threats and prove the authenticity of these images and the most significant aspect is the anonymity of perpetrator. The novelty of this paper lies on how to use a new algorithm of Image Metadata to detect internal intrusion and how to protect it in real time inside the cloud providers. In this paper, we propose a novel algorithm to use features and characteristics technologies of Image Metadata, namely, a novel family of Intrusion Detection Systems (IDS) built on Exchangeable Image File Format (EXIF) of Image Metadata. It can assist in eliminating the anonymity advantage of perpetrator which is considered extremely important for the Digital Investigation to detect the attacker in a real time and to prove the authenticity of the images Metadata against attackers.",
keywords = "Digital investigation, Exchangeable image file format, Intrusion detection systems, Metadata",
author = "A. Alani and Z. Al-Khanjari and Kalash, {Haydar Sabeeh} and Y. Alshmmary",
year = "2016",
doi = "10.14257/ijseia.2016.10.4.07",
language = "English",
volume = "10",
pages = "67--72",
journal = "International Journal of Software Engineering and its Applications",
issn = "1738-9984",
publisher = "Science and Engineering Research Support Society",
number = "4",

}

TY - JOUR

T1 - Novel algorithm of intrusion detection systems by using the images metadata to detect electronic crime in cloud computing

AU - Alani, A.

AU - Al-Khanjari, Z.

AU - Kalash, Haydar Sabeeh

AU - Alshmmary, Y.

PY - 2016

Y1 - 2016

N2 - Many security professionals know about Image Metadata, but they do not really know how it can be used to protect from the threats and prove the authenticity of these images and the most significant aspect is the anonymity of perpetrator. The novelty of this paper lies on how to use a new algorithm of Image Metadata to detect internal intrusion and how to protect it in real time inside the cloud providers. In this paper, we propose a novel algorithm to use features and characteristics technologies of Image Metadata, namely, a novel family of Intrusion Detection Systems (IDS) built on Exchangeable Image File Format (EXIF) of Image Metadata. It can assist in eliminating the anonymity advantage of perpetrator which is considered extremely important for the Digital Investigation to detect the attacker in a real time and to prove the authenticity of the images Metadata against attackers.

AB - Many security professionals know about Image Metadata, but they do not really know how it can be used to protect from the threats and prove the authenticity of these images and the most significant aspect is the anonymity of perpetrator. The novelty of this paper lies on how to use a new algorithm of Image Metadata to detect internal intrusion and how to protect it in real time inside the cloud providers. In this paper, we propose a novel algorithm to use features and characteristics technologies of Image Metadata, namely, a novel family of Intrusion Detection Systems (IDS) built on Exchangeable Image File Format (EXIF) of Image Metadata. It can assist in eliminating the anonymity advantage of perpetrator which is considered extremely important for the Digital Investigation to detect the attacker in a real time and to prove the authenticity of the images Metadata against attackers.

KW - Digital investigation

KW - Exchangeable image file format

KW - Intrusion detection systems

KW - Metadata

UR - http://www.scopus.com/inward/record.url?scp=84964792119&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84964792119&partnerID=8YFLogxK

U2 - 10.14257/ijseia.2016.10.4.07

DO - 10.14257/ijseia.2016.10.4.07

M3 - Article

AN - SCOPUS:84964792119

VL - 10

SP - 67

EP - 72

JO - International Journal of Software Engineering and its Applications

JF - International Journal of Software Engineering and its Applications

SN - 1738-9984

IS - 4

ER -