Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where James S. Okolica is active.

Publication


Featured researches published by James S. Okolica.


Computers & Security | 2014

User identification and authentication using multi-modal behavioral biometrics

Kyle O. Bailey; James S. Okolica; Gilbert L. Peterson

Abstract Biometric computer authentication has an advantage over password and access card authentication in that it is based on something you are, which is not easily copied or stolen. One way of performing biometric computer authentication is to use behavioral tendencies associated with how a user interacts with the computer. However, behavioral biometric authentication accuracy rates are worse than more traditional authentication methods. This article presents a behavioral biometric system that fuses user data from keyboard, mouse, and Graphical User Interface (GUI) interactions. Combining the modalities results in a more accurate authentication decision based on a broader view of the users computer activity while requiring less user interaction to train the system than previous work. Testing over 31 users shows that fusion techniques significantly improve behavioral biometric authentication accuracy over single modalities on their own. Between the two fusion techniques presented, feature fusion and an ensemble based classification method, the ensemble method performs the best with a False Acceptance Rate (FAR) of 2.10% and a False Rejection Rate (FRR) 2.24%.


Computers & Security | 2011

Windows driver memory analysis: A reverse engineering methodology

James S. Okolica; Gilbert L. Peterson

In a digital forensics examination, the capture and analysis of volatile data provides significant information on the state of the computer at the time of seizure. Memory analysis is a premier method of discovering volatile digital forensic information. While much work has been done in extracting forensic artifacts from Windows kernel structures, less focus has been paid to extracting information from Windows drivers. There are two reasons for this: (1) source code for one version of the Windows kernel (but not associated drivers) is available for educational use and (2) drivers are generally called asynchronously and contain no exported functions. Therefore, finding the handful of driver functions of interest out of the thousands of candidates makes reverse code engineering problematic at best. Developing a methodology to minimize the effort of analyzing these drivers, finding the functions of interest, and extracting the data structures of interest is highly desirable. This paper provides two contributions. First, it describes a general methodology for reverse code engineering of Windows drivers memory structures. Second it applies the methodology to tcpip.sys, a Windows driver that controls network connectivity. The result is the extraction from tcpip.sys of the data structures needed to determine current network connections and listeners from the 32 and 64 bit versions of Windows Vista and Windows 7. Manipulation (DKOM), tcpip.sys, Windows 7, Windows Vista. 2000 MSC: 60, 490.


international conference on digital forensics | 2010

A Compiled Memory Analysis Tool

James S. Okolica; Gilbert L. Peterson

The analysis of computer memory is becoming increasingly important in digital forensic investigations. Volatile memory analysis can provide valuable indicators on what to search for on a hard drive, help recover passwords to encrypted hard drives and possibly refute defense claims that criminal activity was the result of a malware infection. Historically, digital forensic investigators have performed live response by executing multiple utilities. However, using a single tool to capture and analyze computer memory is more efficient and has less impact on the system state (potential evidence). This paper describes CMAT, a self-contained tool that extracts forensic information from a memory dump and presents it in a format that is suitable for further analysis. A comparison of the results obtained with utilities that are commonly employed in live response demonstrates that CMAT provides similar information and identifies malware that is missed by the utilities.


international conference on digital forensics | 2006

Using PLSI-U To Detect Insider Threats from Email Traffic

James S. Okolica; Gilbert L. Peterson; Robert F. Mills

Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee’s interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.


Digital Investigation | 2017

Whitelisting system state in windows forensic memory visualizations

Joshua A. Lapso; Gilbert L. Peterson; James S. Okolica

Examiners in the field of digital forensics regularly encounter enormous amounts of data and must identify the few artifacts of evidentiary value. One challenge these examiners face is manual reconstruction of complex datasets with both hierarchical and associative relationships. The complexity of this data requires significant knowledge, training, and experience to correctly and efficiently examine. Current methods provide text-based representations or low-level visualizations, but levee the task of maintaining global context of system state on the examiner. This research presents a visualization tool that improves analysis methods through simultaneous representation of the hierarchical and associative relationships and local detailed data within a single page application. A novel whitelisting feature further improves analysis by eliminating items of less interest from view. Results from a pilot study demonstrate that the visualization tool can assist examiners to more accurately and quickly identify artifacts of interest.


Digital Investigation | 2010

Windows operating systems agnostic memory analysis

James S. Okolica; Gilbert L. Peterson


International Journal of Security and Networks | 2008

Using PLSI-U to detect insider threats by datamining e-mail

James S. Okolica; Gilbert L. Peterson; Robert F. Mills


Digital Investigation | 2011

Extracting the windows clipboard from physical memory

James S. Okolica; Gilbert L. Peterson


Digital Investigation | 2007

Using Author Topic to detect insider threats from email traffic

James S. Okolica; Gilbert L. Peterson; Robert F. Mills


Archive | 2011

Extracting Forensic Artifacts from Windows O/S Memory

James S. Okolica; Gilbert L. Peterson

Collaboration


Dive into the James S. Okolica's collaboration.

Top Co-Authors

Avatar

Gilbert L. Peterson

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Robert F. Mills

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Barry E. Mullins

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dustyn A. Dodge

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Joshua A. Lapso

Air Force Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Kyle O. Bailey

Air Force Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge