Detection and Recognition of File Masquerading for E-mail and Data Security
Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. Digital forensics deals with an investigation of digi...
        Saved in:
      
    
          | Published in | Recent Trends in Network Security and Applications pp. 253 - 262 | 
|---|---|
| Main Authors | , | 
| Format | Book Chapter | 
| Language | English | 
| Published | 
        Berlin, Heidelberg
          Springer Berlin Heidelberg
    
        2010
     | 
| Series | Communications in Computer and Information Science | 
| Subjects | |
| Online Access | Get full text | 
| ISBN | 9783642144776 3642144772  | 
| ISSN | 1865-0929 1865-0937  | 
| DOI | 10.1007/978-3-642-14478-3_26 | 
Cover
| Abstract | Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. Digital forensics deals with an investigation of digital evidence to enable investigators to detect the facts for the offences. In digital forensics, there are numerous file formats in use and criminals have started using either non-standard file formats or change extensions of files while storing or transmitting them over a network. This makes recovering data out of these files difficult. This also poses a very severe problem for the unauthorized users to send malicious data across the network and it is essential to tackle this e-crime which may harm the entire organization and network . File type detection has the most usage and importance in the proper functionality of operating systems, firewalls, intrusion detection systems, anti viruses, filters, steganalysis and computer forensics. Certain organizations may ban specific file formats via their intranet or E-mail services and the technique to change file extension in sending across has to be severely monitored. Identifying the type of file format of a digital object will be a crucial function on ingest to a digital repository thereby attaining improved security and fraud prevention .This paper focuses on identifying the true file type , detect the presence of embedded data types to improve analysis efficiency in Digital forensic . | 
    
|---|---|
| AbstractList | Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the corresponding technologies are increasingly being faced with the problem of file type detection. Digital forensics deals with an investigation of digital evidence to enable investigators to detect the facts for the offences. In digital forensics, there are numerous file formats in use and criminals have started using either non-standard file formats or change extensions of files while storing or transmitting them over a network. This makes recovering data out of these files difficult. This also poses a very severe problem for the unauthorized users to send malicious data across the network and it is essential to tackle this e-crime which may harm the entire organization and network . File type detection has the most usage and importance in the proper functionality of operating systems, firewalls, intrusion detection systems, anti viruses, filters, steganalysis and computer forensics. Certain organizations may ban specific file formats via their intranet or E-mail services and the technique to change file extension in sending across has to be severely monitored. Identifying the type of file format of a digital object will be a crucial function on ingest to a digital repository thereby attaining improved security and fraud prevention .This paper focuses on identifying the true file type , detect the presence of embedded data types to improve analysis efficiency in Digital forensic . | 
    
| Author | Chellappan, C. Dhanalakshmi, R.  | 
    
| Author_xml | – sequence: 1 givenname: R. surname: Dhanalakshmi fullname: Dhanalakshmi, R. email: dhanalakshmisai@gmail.com organization: Research Scholar, Department of computer science and Engg., Anna University, Chennai – sequence: 2 givenname: C. surname: Chellappan fullname: Chellappan, C. email: drcc@annauniv.edu organization: Department of computer science and Engg., Anna University, Chennai  | 
    
| BookMark | eNpVkMtOxDAMRQMMEsPQP2CRHwjk3WSJ5gGIQUg81lGaJqNCaaDpLPh70oKQ8Mb2tWVdn1Mw62LnATgn-IJgXF7qUiGGJKeIcD7WhsoDUGSZZXHS2CGYEyUFwpqVR_9mpZz9zag-AUVKrziHUFhpMQd3Kz94NzSxg7ar4aN3cdc1Ux8D3DSth_c2fe59b-um28EQe7hG77Zpp_2VHSx88m7fN8PXGTgOtk2--M0L8LJZPy9v0Pbh-nZ5tUWJECaRYhRbSVxQglZYUhlk5ZyWvOZBMkGI5tm-YpYrillZ68pVQQSvK44dEZwtAP25mz767Mn3porxLRmCzUjM5PcNMxmAmeiYkRj7Bo18WaI | 
    
| ContentType | Book Chapter | 
    
| Copyright | Springer-Verlag Berlin Heidelberg 2010 | 
    
| Copyright_xml | – notice: Springer-Verlag Berlin Heidelberg 2010 | 
    
| DOI | 10.1007/978-3-642-14478-3_26 | 
    
| DatabaseTitleList | |
| DeliveryMethod | fulltext_linktorsrc | 
    
| Discipline | Engineering Computer Science  | 
    
| EISBN | 9783642144783 3642144780  | 
    
| EISSN | 1865-0937 | 
    
| Editor | Nagamalai, Dhinaharan Boumerdassi, Selma Meghanathan, Natarajan Chaki, Nabendu  | 
    
| Editor_xml | – sequence: 1 givenname: Natarajan surname: Meghanathan fullname: Meghanathan, Natarajan email: natarajan.meghanathan@jsums.edu – sequence: 2 givenname: Selma surname: Boumerdassi fullname: Boumerdassi, Selma email: selma.boumerdassi@cedric.fr – sequence: 3 givenname: Nabendu surname: Chaki fullname: Chaki, Nabendu email: nabendu@ieee.org – sequence: 4 givenname: Dhinaharan surname: Nagamalai fullname: Nagamalai, Dhinaharan email: dhinthia@yahoo.com  | 
    
| EndPage | 262 | 
    
| GroupedDBID | 29F ALMA_UNASSIGNED_HOLDINGS RSU  | 
    
| ID | FETCH-LOGICAL-s1136-8320a61cf852b0626f6bcc964d4f635119483683a482037d9bcbf5fe9b40c1543 | 
    
| ISBN | 9783642144776 3642144772  | 
    
| ISSN | 1865-0929 | 
    
| IngestDate | Tue Jul 29 20:00:44 EDT 2025 | 
    
| IsPeerReviewed | false | 
    
| IsScholarly | false | 
    
| Language | English | 
    
| LinkModel | OpenURL | 
    
| MergedId | FETCHMERGED-LOGICAL-s1136-8320a61cf852b0626f6bcc964d4f635119483683a482037d9bcbf5fe9b40c1543 | 
    
| PageCount | 10 | 
    
| ParticipantIDs | springer_books_10_1007_978_3_642_14478_3_26 | 
    
| PublicationCentury | 2000 | 
    
| PublicationDate | 2010 | 
    
| PublicationDateYYYYMMDD | 2010-01-01 | 
    
| PublicationDate_xml | – year: 2010 text: 2010  | 
    
| PublicationDecade | 2010 | 
    
| PublicationPlace | Berlin, Heidelberg | 
    
| PublicationPlace_xml | – name: Berlin, Heidelberg | 
    
| PublicationSeriesTitle | Communications in Computer and Information Science | 
    
| PublicationSubtitle | Third International Conference, CNSA 2010, Chennai, India, July 23-25, 2010. Proceedings | 
    
| PublicationTitle | Recent Trends in Network Security and Applications | 
    
| PublicationYear | 2010 | 
    
| Publisher | Springer Berlin Heidelberg | 
    
| Publisher_xml | – name: Springer Berlin Heidelberg | 
    
| SSID | ssj0000580895 ssj0000426779 ssib054953581  | 
    
| Score | 1.3683609 | 
    
| Snippet | Due to the tremendous improvement of internet technology and increasing importance of privacy, security, and wise use of computational resources, the... | 
    
| SourceID | springer | 
    
| SourceType | Publisher | 
    
| StartPage | 253 | 
    
| SubjectTerms | Digital forensics File structure Fileprints Signature Validation  | 
    
| Title | Detection and Recognition of File Masquerading for E-mail and Data Security | 
    
| URI | http://link.springer.com/10.1007/978-3-642-14478-3_26 | 
    
| hasFullText | 1 | 
    
| inHoldings | 1 | 
    
| isFullTextHit | |
| isPrint | |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LT9wwELaW5dL2UEpb9S0felt55U0c2zkiWIRo4YCg4hY5D4uqYkEkXHrv_-6MH1lTEBK9RJEVbWzP7Hgy8803hHxVhV3w3CrWaiOQVDtjZc0FK7hV0qhctBYLhY-O5cGZODwvzieTPwlq6Xao583vB-tK_keqMAZyxSrZJ0h2_FEYgHuQL1xBwnD9x_m9G2YNFLEIrJytQa3HHtEdQuiDJ1baSRLUo9N6YUB9zK_-4tLl8k_m6yQ_gqGur31UdHeeKtReN3Shr7iraQzAI-9v7oNxmR2ZHk6ZG4fKd_DFJbs0Pz0XwZ4ZzDgzb8qQYrm_W6HS-yJE32giQJXH8spoh9JAhcO7pYGKGKicPcLj5WpKBLK4Kd8VJlhlLQvGyxAa6dIxzxgTra_nHQ4HeebN_L0zIoWFwMsYvg3uq0xukA2YwJRs7iwPv_-IZqlACG5kiXMHPHg1KiQ3PYW85tr19xknilVEcSGZ53laLyyp4HxoFvdy8s7VOd0iL7D8hWJdCsjgFZl0q23yMsqEBhlsk-cJk-Vr8m3UDgpSo4l20CtLUTtoqh0UhEq9drjnUTto1I435Gx_ebp7wEKfDtZjRyAGhwI3ctFYXWQ1hy9kK-umKaVohZUuUS1g9To3AtzNXLVl3dQWQY614A248PlbMl1drbp3hDpyJKUW4FoZYW2hNdgQUze5brnkTfmezOLeVPjP66tIuw07WeUV7GTldrLCnfzwpKc_kmdrtf1EpsPNbfcZPM6h_hI04i_17XRn | 
    
| linkProvider | Library Specific Holdings | 
    
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=bookitem&rft.title=Recent+Trends+in+Network+Security+and+Applications&rft.au=Dhanalakshmi%2C+R.&rft.au=Chellappan%2C+C.&rft.atitle=Detection+and+Recognition+of+File+Masquerading+for+E-mail+and+Data+Security&rft.series=Communications+in+Computer+and+Information+Science&rft.date=2010-01-01&rft.pub=Springer+Berlin+Heidelberg&rft.isbn=9783642144776&rft.issn=1865-0929&rft.eissn=1865-0937&rft.spage=253&rft.epage=262&rft_id=info:doi/10.1007%2F978-3-642-14478-3_26 | 
    
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1865-0929&client=summon | 
    
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1865-0929&client=summon | 
    
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1865-0929&client=summon |