Towards More Secure Biometric Readers for Effective Digital Forensic Investigation
Document Type
Conference Proceeding
Source of Publication
Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST
Publication Date
12-1-2011
Abstract
This paper investigates the effect of common network attacks on the performance, and security of several biometric readers. Experiments are conducted using Denial of Service attacks (DoSs) and the ARP cache poisoning attack. The experiments show that the tested biometric readers are vulnerable to DoS attacks, and their recognition performance is significantly affected after launching the attacks. However, the experiments show that the tested biometric readers are secure from the ARP cache poisoning attack. This work demonstrates that biometric readers are easy targets for malicious network users, lack basic security mechanisms, and are vulnerable to common attacks. The confidentiality, and integrity of the log files in the biometric readers, could be compromised with such attacks. It then becomes important to study these attacks in order to find flags that could aid in a network forensic investigation of a biometric device. © Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 2011.
DOI Link
ISBN
9783642195129
ISSN
Publisher
Springer Berlin Heidelberg
Volume
53
First Page
65
Last Page
77
Disciplines
Computer Sciences
Keywords
Biometrics scanners, Denial of service attack (DoS), Fingerprint reader, Firewall, Forensic investigation, Intrusion detection/prevention systems (IDS/IPS), Iris reader
Scopus ID
Recommended Citation
Trabelsi, Zouheir; Al-Hemairy, Mohamed; Baggili, Ibrahim; and Amin, Saad, "Towards More Secure Biometric Readers for Effective Digital Forensic Investigation" (2011). All Works. 3741.
https://zuscholars.zu.ac.ae/works/3741
Indexed in Scopus
yes
Open Access
no