TY - GEN
T1 - Towards more secure biometric readers for effective digital forensic investigation
AU - Trabelsi, Zouheir
AU - Al-Hemairy, Mohamed
AU - Baggili, Ibrahim
AU - Amin, Saad
PY - 2011
Y1 - 2011
N2 - This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attacks. However, the experiments show that the tested biometric readers are secure from the ARP cache poisoning attack. This work demonstrates that biometric readers are easy targets for malicious network users, lack basic security mechanisms, and are vulnerable to common attacks. The confidentiality, and integrity of the log files in the biometric readers, could be compromised with such attacks. It then becomes important to study these attacks in order to find flags that could aid in a network forensic investigation of a biometric device.
AB - This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attacks. However, the experiments show that the tested biometric readers are secure from the ARP cache poisoning attack. This work demonstrates that biometric readers are easy targets for malicious network users, lack basic security mechanisms, and are vulnerable to common attacks. The confidentiality, and integrity of the log files in the biometric readers, could be compromised with such attacks. It then becomes important to study these attacks in order to find flags that could aid in a network forensic investigation of a biometric device.
KW - Biometrics scanners
KW - Denial of service attack (DoS)
KW - Fingerprint reader
KW - Firewall
KW - Forensic investigation
KW - Intrusion detection/prevention systems (IDS/IPS)
KW - Iris reader
UR - http://www.scopus.com/inward/record.url?scp=84885884414&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84885884414&partnerID=8YFLogxK
U2 - 10.1007/978-3-642-19513-6_6
DO - 10.1007/978-3-642-19513-6_6
M3 - Conference contribution
AN - SCOPUS:84885884414
SN - 9783642195129
T3 - Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
SP - 65
EP - 77
BT - Digital Forensics and Cyber Crime - Second International Conference, ICDF2C 2010
T2 - 2nd International Conference on Digital Forensics and Cyber Crime, ICDF2C 2010
Y2 - 4 October 2010 through 6 October 2010
ER -