Detection and Recognition of File Masquerading for E-mail and Data Security

Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. Digital forensics deals with an investigation of digi...

Full description

Saved in:
Bibliographic Details
Published inRecent Trends in Network Security and Applications pp. 253 - 262
Main Authors Dhanalakshmi, R., Chellappan, C.
Format Book Chapter
LanguageEnglish
Published Berlin, Heidelberg Springer Berlin Heidelberg 2010
SeriesCommunications in Computer and Information Science
Subjects
Online AccessGet full text
ISBN9783642144776
3642144772
ISSN1865-0929
1865-0937
DOI10.1007/978-3-642-14478-3_26

Cover

Abstract Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. Digital forensics deals with an investigation of digital evidence to enable investigators to detect the facts for the offences. In digital forensics, there are numerous file formats in use and criminals have started using either non-standard file formats or change extensions of files while storing or transmitting them over a network. This makes recovering data out of these files difficult. This also poses a very severe problem for the unauthorized users to send malicious data across the network and it is essential to tackle this e-crime which may harm the entire organization and network . File type detection has the most usage and importance in the proper functionality of operating systems, firewalls, intrusion detection systems, anti viruses, filters, steganalysis and computer forensics. Certain organizations may ban specific file formats via their intranet or E-mail services and the technique to change file extension in sending across has to be severely monitored. Identifying the type of file format of a digital object will be a crucial function on ingest to a digital repository thereby attaining improved security and fraud prevention .This paper focuses on identifying the true file type , detect the presence of embedded data types to improve analysis efficiency in Digital forensic .
AbstractList Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. Digital forensics deals with an investigation of digital evidence to enable investigators to detect the facts for the offences. In digital forensics, there are numerous file formats in use and criminals have started using either non-standard file formats or change extensions of files while storing or transmitting them over a network. This makes recovering data out of these files difficult. This also poses a very severe problem for the unauthorized users to send malicious data across the network and it is essential to tackle this e-crime which may harm the entire organization and network . File type detection has the most usage and importance in the proper functionality of operating systems, firewalls, intrusion detection systems, anti viruses, filters, steganalysis and computer forensics. Certain organizations may ban specific file formats via their intranet or E-mail services and the technique to change file extension in sending across has to be severely monitored. Identifying the type of file format of a digital object will be a crucial function on ingest to a digital repository thereby attaining improved security and fraud prevention .This paper focuses on identifying the true file type , detect the presence of embedded data types to improve analysis efficiency in Digital forensic .
Author Chellappan, C.
Dhanalakshmi, R.
Author_xml – sequence: 1
  givenname: R.
  surname: Dhanalakshmi
  fullname: Dhanalakshmi, R.
  email: dhanalakshmisai@gmail.com
  organization: Research Scholar, Department of computer science and Engg., Anna University, Chennai
– sequence: 2
  givenname: C.
  surname: Chellappan
  fullname: Chellappan, C.
  email: drcc@annauniv.edu
  organization: Department of computer science and Engg., Anna University, Chennai
BookMark eNpVkMtOxDAMRQMMEsPQP2CRHwjk3WSJ5gGIQUg81lGaJqNCaaDpLPh70oKQ8Mb2tWVdn1Mw62LnATgn-IJgXF7qUiGGJKeIcD7WhsoDUGSZZXHS2CGYEyUFwpqVR_9mpZz9zag-AUVKrziHUFhpMQd3Kz94NzSxg7ar4aN3cdc1Ux8D3DSth_c2fe59b-um28EQe7hG77Zpp_2VHSx88m7fN8PXGTgOtk2--M0L8LJZPy9v0Pbh-nZ5tUWJECaRYhRbSVxQglZYUhlk5ZyWvOZBMkGI5tm-YpYrillZ68pVQQSvK44dEZwtAP25mz767Mn3porxLRmCzUjM5PcNMxmAmeiYkRj7Bo18WaI
ContentType Book Chapter
Copyright Springer-Verlag Berlin Heidelberg 2010
Copyright_xml – notice: Springer-Verlag Berlin Heidelberg 2010
DOI 10.1007/978-3-642-14478-3_26
DatabaseTitleList
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Computer Science
EISBN 9783642144783
3642144780
EISSN 1865-0937
Editor Nagamalai, Dhinaharan
Boumerdassi, Selma
Meghanathan, Natarajan
Chaki, Nabendu
Editor_xml – sequence: 1
  givenname: Natarajan
  surname: Meghanathan
  fullname: Meghanathan, Natarajan
  email: natarajan.meghanathan@jsums.edu
– sequence: 2
  givenname: Selma
  surname: Boumerdassi
  fullname: Boumerdassi, Selma
  email: selma.boumerdassi@cedric.fr
– sequence: 3
  givenname: Nabendu
  surname: Chaki
  fullname: Chaki, Nabendu
  email: nabendu@ieee.org
– sequence: 4
  givenname: Dhinaharan
  surname: Nagamalai
  fullname: Nagamalai, Dhinaharan
  email: dhinthia@yahoo.com
EndPage 262
GroupedDBID 29F
ALMA_UNASSIGNED_HOLDINGS
RSU
ID FETCH-LOGICAL-s1136-8320a61cf852b0626f6bcc964d4f635119483683a482037d9bcbf5fe9b40c1543
ISBN 9783642144776
3642144772
ISSN 1865-0929
IngestDate Tue Jul 29 20:00:44 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-s1136-8320a61cf852b0626f6bcc964d4f635119483683a482037d9bcbf5fe9b40c1543
PageCount 10
ParticipantIDs springer_books_10_1007_978_3_642_14478_3_26
PublicationCentury 2000
PublicationDate 2010
PublicationDateYYYYMMDD 2010-01-01
PublicationDate_xml – year: 2010
  text: 2010
PublicationDecade 2010
PublicationPlace Berlin, Heidelberg
PublicationPlace_xml – name: Berlin, Heidelberg
PublicationSeriesTitle Communications in Computer and Information Science
PublicationSubtitle Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings
PublicationTitle Recent Trends in Network Security and Applications
PublicationYear 2010
Publisher Springer Berlin Heidelberg
Publisher_xml – name: Springer Berlin Heidelberg
SSID ssj0000580895
ssj0000426779
ssib054953581
Score 1.3683609
Snippet Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the...
SourceID springer
SourceType Publisher
StartPage 253
SubjectTerms Digital forensics
File structure
Fileprints
Signature
Validation
Title Detection and Recognition of File Masquerading for E-mail and Data Security
URI http://link.springer.com/10.1007/978-3-642-14478-3_26
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwELaW5dL2UEpb9S0felt55U0c2zkiWIRo4YCg4hY5D4uqYkEkXHrv_-6MH1lTEBK9RJEVbWzP7Hgy8803hHxVhV3w3CrWaiOQVDtjZc0FK7hV0qhctBYLhY-O5cGZODwvzieTPwlq6Xao583vB-tK_keqMAZyxSrZJ0h2_FEYgHuQL1xBwnD9x_m9G2YNFLEIrJytQa3HHtEdQuiDJ1baSRLUo9N6YUB9zK_-4tLl8k_m6yQ_gqGur31UdHeeKtReN3Shr7iraQzAI-9v7oNxmR2ZHk6ZG4fKd_DFJbs0Pz0XwZ4ZzDgzb8qQYrm_W6HS-yJE32giQJXH8spoh9JAhcO7pYGKGKicPcLj5WpKBLK4Kd8VJlhlLQvGyxAa6dIxzxgTra_nHQ4HeebN_L0zIoWFwMsYvg3uq0xukA2YwJRs7iwPv_-IZqlACG5kiXMHPHg1KiQ3PYW85tr19xknilVEcSGZ53laLyyp4HxoFvdy8s7VOd0iL7D8hWJdCsjgFZl0q23yMsqEBhlsk-cJk-Vr8m3UDgpSo4l20CtLUTtoqh0UhEq9drjnUTto1I435Gx_ebp7wEKfDtZjRyAGhwI3ctFYXWQ1hy9kK-umKaVohZUuUS1g9To3AtzNXLVl3dQWQY614A248PlbMl1drbp3hDpyJKUW4FoZYW2hNdgQUze5brnkTfmezOLeVPjP66tIuw07WeUV7GTldrLCnfzwpKc_kmdrtf1EpsPNbfcZPM6h_hI04i_17XRn
linkProvider Library Specific Holdings
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Recent+Trends+in+Network+Security+and+Applications&rft.au=Dhanalakshmi%2C+R.&rft.au=Chellappan%2C+C.&rft.atitle=Detection+and+Recognition+of+File+Masquerading+for+E-mail+and+Data+Security&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642144776&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=253&rft.epage=262&rft_id=info:doi/10.1007%2F978-3-642-14478-3_26
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon