Gavin W. Manes
University of Tulsa
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Gavin W. Manes.
midwest symposium on circuits and systems | 2002
B. Skaggs; B. Blackburn; Gavin W. Manes; Sujeet Shenoi
The increasing volume of attacks on the Internet has increased the demand for sophisticated tools for vulnerability analysis, intrusion detection, forensic investigations, and possible responses. Current hacker tools and technologies warrant reengineering to address cyber crime and homeland security. The creation of network scanners is necessary to secure the information infrastructure by gathering network topology, intelligence, internal/external vulnerability analysis, and penetration testing. Scanners must be able to function on a variety of networks: Internet (IP), SS7, wireless, and converged networks. Scanners should be extendable and upgradable to facilitate use by a broad spectrum of users and platforms; such flexibility allows users to keep up with current hacker technology. This paper describes one such scanner, referred to as NetGlean.
midwest symposium on circuits and systems | 2002
Tyler Moore; T. Kosloff; J. Keller; Gavin W. Manes; Sujeet Shenoi
This paper examines vulnerabilities present within SS7 networks-vulnerabilities whose threat has been magnified by deregulation and emerging trends in network technology. First, it provides an overview of the SS7 network and protocol. Then it explains how modem deregulated telephone networks combine with next-generation technologies in a manner that poses a threat to the security of the telecommunications signaling network. This paper details several attack scenarios made possible by accepting the assumption that an SS7 signaling point may be compromised to allow insertion of message traffic.
international conference on digital forensics | 2005
Scott Piper; Mark Davis; Gavin W. Manes; Sujeet Shenoi
The use of digital forensic tools by law enforcement agencies has made it difficult for malicious individuals to hide potentially incriminating evidence. To combat this situation, the hacker community has developed anti-forensic tools that remove or hide electronic evidence for the specific purpose of undermining forensic investigations. This paper examines the latest techniques for hiding data in the popular Ext2 and Ext3 file systems. It also describes techniques for detecting hidden data in the reserved portions of these file systems.
international conference on digital forensics | 2005
Mark Davis; Gavin W. Manes; Sujeet Shenoi
The storage and handling of digital evidence are creating significant challenges for federal, state and local law enforcement agencies. The problems include acquiring and processing massive amounts of digital evidence, maintaining the integrity of the evidence, and storing digital evidence for extended periods of time. This paper describes a network-based storage architecture that helps address these issues. The architecture also supports collaborative efforts by examiners and investigators located at geographically dispersed sites.
Journal of Network and Systems Management | 2005
Jerald Dawkins; K. Clark; Gavin W. Manes; Mauricio Papa
A comprehensive network security management system must coordinate detection and scanning tools for converged networks; derive fully-integrated attack and network models; perform vulnerability and multi-stage attack analysis; support large-scale attack visualization; and possibly orchestrate strategic responses to unwarranted actions that cross network boundaries. We present an architecture that embodies these principles. The unified network security management system described in this paper gleans data from a suite of detection tools for various networking domains. Aggregate real-time network data supplies a comprehensive modeling framework used for further analysis, correlation, and visualization. The resulting system not only provides network administrators with a heads-up cockpit display of their entire network, it also supports guided response and predictive capabilities for multi-stage attacks in converged networks.
international conference on digital forensics | 2005
Christopher Swenson; Gavin W. Manes; Sujeet Shenoi
Cellular phones are becoming ubiquitous. As of March 2005, there were more than 180 million cellular subscribers in the United States, over 60% of the population. Cellular devices invariably contain information that can aid criminal investigations. Nevertheless, extracting evidence from cellular phones is quite uncommon in the United States. The principal reasons are the lack of awareness and training on the part of law enforcement agents and the limited availability of inexpensive tools for extracting and analyzing evidence. This paper describes a toolkit for extracting and analyzing data from SIM cards, which are used for cryptographic authentication, key generation and data storage in GSM cellular phones.
information assurance and security | 2007
Gavin W. Manes; Lance Watson; Elizabeth Downing; Alex Barclay; David Greer; John Hale
A reliable method for the removal of selected information from digital devices remains an open problem. A solution is particularly necessary for the legal profession, where it is required to produce information to opposing counsel during the discovery portion of court proceedings. The method outlined in this paper provides an efficient and effective system for redacting digital information beyond recovery by conventional forensic techniques. This paper also describes the major obstacles to achieving practical and comprehensive redaction of digital information from electronic devices. Of particular issue is the lack of a rational process for systematically handling encoded, encrypted, or otherwise complex data objects. Applications for this method extend well beyond the courtroom-it can be used in government and business to remove classified and proprietary information from documents and records.
Journal of Network and Systems Management | 2005
Gavin W. Manes; Dominic Schulte; Seth Guenther; Sujeet Shenoi
Network vulnerability analysis tools today do not provide a complete security awareness solution. Currently, network administrators utilize multiple analysis tools in succession or randomly in a patchwork fashion that provides only temporary assurance. This paper introduces NetGlean as a methodology for distributed network security scanning with a holistic approach to network analysis. NetGlean uses new and existing techniques in a continual, autonomous, evolutionary manner to provide powerful real-time and historical views of large and complex networks. This paper introduces the methodology and describes one implementation NetGleanIP, a scanner for IP and converged networks.
ieee symposium on security and privacy | 2009
Gavin W. Manes; Elizabeth Downing
Digital forensic examiners face challenges outside the technical aspects of collecting, investigating, and storing digital information. Rules about admissibility and the licensing requirements for forensic professionals must also be taken into account. The use of digital data in an expanding number of US court cases and business investigations has precipitated changes in evidence handling and admissibility requirements, most notably in the 2006 changes to the Federal Rules of Civil Procedure. Knowledge of these rules and the ensuing case law is an essential component of any examiners toolkit because improper evidence handling can lead to inadmissible evidence. The courts acceptance of such evidence is also greatly affected by the examiners proper licensure. Unfortunately, these requirements vary by state (sometimes even by city) and are constantly changing. Therefore, digital forensic investigators must heed both the courts rules regarding evidence handling and the states rules for licensing in order to be most effective.
Sensors, and Command, Control, Communications, and Intelligence (C3I) Technologies for Homeland Defense and Law Enforcement | 2002
Jon Novotny; A. Meehan; Dominic Schulte; Gavin W. Manes; Sujeet Shenoi
Sexually explicit Internet chat rooms are increasingly used by pedophiles to reach potential victims. Logging and linking suspects to chat room conversations and e-mails exchanged with undercover detectives are crucial to prosecuting travelers, i.e., pedophiles who travel across state lines to engage in sexual acts with minors. This paper describes two tools, a chat room monitor and a remote fingerprinter, for acquiring and preserving evidence. The chat room monitor logs online communications as well as screen images and keystrokes of the undercover detective. stored to allow the chronological reconstruction and replay of the investigation. The remote fingerprinter uses sophisticated scanning techniques to capture and preserve a unique fingerprint of the suspects computer over the Internet. Once the suspects computer is seized, it is scanned again; matching this new fingerprint with the remotely acquired fingerprint establishes that the suspects computer was used to communicate with the detective.