2012
DOI: 10.1007/978-3-642-33962-2_17
|View full text |Cite
|
Sign up to set email alerts
|

A Log File Digital Forensic Model

Abstract: This paper describes a digital forensic model for investigating computer networks, focusing specifically on network log mining. A thorough examination of log files is needed to reveal the hidden actions of criminals in computer networks. The proposed model specifies the steps that forensic investigators can follow with regard to the extraction and examination of digital evidence from log files for use in legal proceedings.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2014
2014
2020
2020

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 15 publications
0
3
0
Order By: Relevance
“…Pieterse et al discussed the various techniques that can be used to hide data within a database caused by the complexity of databases and the lack of forensic tools with which to examine databases (Pieterse and Olivier, 2012). Lalla et al described a model for investigating computer networks through network log files and how the examination of said files could reveal concealed activity (Lalla et al, 2012).…”
Section: Database Forensicsmentioning
confidence: 99%
“…Pieterse et al discussed the various techniques that can be used to hide data within a database caused by the complexity of databases and the lack of forensic tools with which to examine databases (Pieterse and Olivier, 2012). Lalla et al described a model for investigating computer networks through network log files and how the examination of said files could reveal concealed activity (Lalla et al, 2012).…”
Section: Database Forensicsmentioning
confidence: 99%
“…V also finds the set of possible state-controlled keys that may be in the KStore at the time of the crash. After the crash one such key will be in KStore (lines [6][7][8][9][10][11]. If the size of the log file is n , last key that has been updated before n will be in the KStore (because logging is immediately after key update).…”
Section: : Else 22mentioning
confidence: 99%
“…Computer systems use logging function to store and keep track of important events in the system. Log files are used for a variety of purposes including trouble shooting, intrusion detection and forensics [1,7,9]. In many cases, adversaries want to stay covert and be able to modify the log files without being detected.…”
Section: Introductionmentioning
confidence: 99%