3rd European Conference on Information Warfare and Security Royal Holloway, University of London, UK 28-29 June 2004
Edited by Andy Jones University of Glamorgan, UK and Dan Remenyi Trinity College Dublin, Ireland
Copyright The Authors, 2004. All Rights Reserved. No reproduction, copy or transmission may be made without written permission from the individual authors. Papers have been double-blind peer reviewed before final submission to the conference Initially, paper abstracts were read and selected by the conference panel for submission as possible papers for the conference Many thanks to the reviewers who helped review the quality of the full papers.
ISBN: 0-9547096-2-4
Typeset by Academic Conferences Limited Reading UK 44-118-9-724-1418
[email protected]
ECIW 2004 Contents Paper Title
Author(s)
Proceedings Page
Preface
vi
Biographies of contributing authors
ix
Analysis and Detection of Cruising Computer Viruses
Abiola Abimbola, J M Munoz and William J Buchanan School of Computing, Napier University, UK.
1
Enabling Network-centric Warfare by Securing the Core Infrastructure
Pauli Aho, Lab. for theoretical computer science Helsinki University of Technology, Finland Catharina Candolin, National Defence College, The Finnish Defence Forces, Helsinki, Finland
9
Information Warfare Action Plans for e-Business
Richard Baskerville Georgia State University, Atlanta, USA
15
A Model for Detecting Malicious Groups
Sviatoslav Braynov Department of Computer Science, University of Illinois at Springfield, USA
21
Covert Channel Analysis and Detection with Reverse Proxy Servers using Microsoft Windows
William J Buchanan and David Llamas School of Computing, Napier University, Edinburgh, Scotland, UK
31
Cyberterrorism: Academic Perspectives
Maura Conway School of International Relations, University of St. Andrews, Scotland, UK
41
Towards a Real-time Solution to the Security Threats Posed by Authorised Insiders
Clara Corzo and Ning Zhang Department of Computer Science, University of Manchester, UK
51
Information Warfare and Human Rights Law
Geoffrey Darnton Institute of Business and Law, Bournemouth University, Poole, UK
61
Factors Affecting the Adoption of IT Risk Analysis
Vassilis Dimopoulos, Steven Furnell, Ian Barlow and Benn Lines Network Research Group, University of Plymouth, UK.
71
PIFF: Personnel Identification Friend or Foe
Kevin M. Gleason Mount Ida College, Newton Centre, USA
81
i
Paper Title
Author(s)
Proceedings Page
The Last Mile: Applying Traditional Methods for Perpetrator Identification in Forensic Computing Investigations
Mathew Hannan and Paul Turner School of Information Systems, University of South Australia, Australia
89
The Implications of Hardware Encryption Devices on Forensic Computing Investigations
Mathew Hannan and Tom Wil