Yinghua Guo

Learn More
Validation Verification Searching a b s t r a c t The process of using automated software has served law enforcement and the courts very well, and experienced detectives and investigators have been able to use their well-developed policing skills, in conjunction with the automated software, so as to provide sound evidence. However, the growth in the(More)
Mobile ad hoc network (MANET) is particularly vulnerable to flooding attacks. To evade being identified, attackers usually recruit multiple accomplices to dilute attack traffic density of each attack source, and use the address spoofing technique to challenge attack tracing. In this paper, we present a detailed investigation of the flooding attack in MANET.(More)
The process of analyzing available network forensics evidence to determine their meaning and significance can be very involved. It is often necessary to develop a timeline of significant events to obtain an overview of what occurred, to create relational diagrams showing which users are connected to which systems, or to correlate and analyze data to find(More)
This paper investigates distributed denial of service attacks using non-address-spoofing flood (NASF) over mobile ad hoc networks (MANET). Detection features based on statistical analysis of IDS log files and flow rate information are proposed. Detection of NASF attack is evaluated using three metrics, including detection ratio, detection time and false(More)
In recent years, Mixed Integer Linear Programming (MILP) has been successfully applied in searching for differential characteristics and linear approximations in block ciphers and has produced the significant results for some ciphers such as SIMON (a family of lightweight and hardware-optimized block ciphers designed by NSA) etc. However, in the literature,(More)
Mobile ad hoc networks (MANETs) are particularly vulnerable to denial of service (DoS) attacks. Existing DoS attack traceback approaches are not suitable for tracing the flooding attacks in MANETs. The challenges root in several facts, such as the node mobility and the presence of address spoofing. In this work, we present a behavior-based traceback(More)
Proactive security mechanism like authentication, confidentiality and non-repudiation are difficult to implement in MANETs. Some additional security necessities are always desirable like cooperation fairness, location confidentiality, data freshness and absence of traffic diversion. Traditional security mechanism (authentication, encryption) provide(More)
The growth in the computer forensic field has created a demand for new software (or increased functionality to existing software) and a means to verify that this software is truly forensic i.e. capable of meeting the requirements of the trier of fact. In this work, we present a function oriented testing framework for validation and verification of computer(More)