Abstract

The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1) Forensics Readiness, 2) Active Forensics, and 3) Forensics Awareness.

Highlights

  • The cybercrime landscape has increased dramatically with the use of more sophisticated techniques and greater knowledge of cybercrime

  • There are many challenges faced by todays digital forensics

  • EXAMPLE OF CRIMINAL GRAPH This paper presents a picture of the proposed graph that integrates the attack and evidence graphs

Read more

Summary

INTRODUCTION

The cybercrime landscape has increased dramatically with the use of more sophisticated techniques and greater knowledge of cybercrime. Reaching high-levels of data protection in both wired and wireless networks, in order to face recent cybercrime approaches is a challenge that is continuously proving hard to achieve. The first phase in the cyber-crime chain is the proactive phase and its goal is to prepare the target network to automatically prevent and detect the attack or illegal activities before the network gets infected, such as user authentication and system capable of avoiding programming errors and information protection e.g. Privacy Preserving Data Mining (PPDM). The awareness approach deals with the training and awareness proposal These works take into consideration the important factors during forensics investigation, for example; cost, time, low incident impacts, facilities network investigation procedures, high quality outcomes, organization reputation and business activities disruption. Www.ijacsa.thesai.org (IJACSA) International Journal of Advanced Computer Science and Applications, Vol 6, No 6, 2015 section 5 deals with the conclusion and some perspectives on future work

PREVIOUS WORK
CYBERSPACE FORENSICS READINESS AND SECURITY AWARENESS MODEL
Information prepossessing model
The normalization process of alerts and information logs
The relationship between the evidence and attack
EXAMPLE OF CRIMINAL GRAPH
CONCLUSIONS AND FUTURE WORK
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call