Abstract:Abstract-The goal of reaching a high level of security in wire-less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic inve… Show more
“…The idea behind this approach is to identify the evidence collection path (ECP) by using evidence collection process model (ECPM). ECPM functions are divided based on the phases in the Cybercrime that has been discussed in .…”
Section: Prediction Investigation Approach By Using Ecpmmentioning
Abstract-Network Forensics is a subtopic of Digital Forensics wherein research on artificat investigations and intrusions evidence acquisition is addressed. Among many challenges in the field, the problem of losing data artifacts in the state of flux, (i.e., live volatile data), when network devices are suddenly non-operational remains a topic of interest to many investigators. The main objective of this article is to simulate an SQL injection attack scenarios in a complex network environment. We designed and simulated a typical demilitarized zone (DMZ) network environment using graphical network simulator (GNS3), Virtual Box and VMware workstation. Using this set-up we are now able to simulate specific network devices configuration, perform SQL injection attacks against victim machines and collect network logs. The main motivation of our work is to finally define an attack pathway prediction methodology that makes it possible to examine the network artifacts collected in case network attacks.
“…To authenticate evidence, it might also be essential to evaluate its reliability. There are two general methods to evaluating whether evidence can be trusted upon in court .The first method is to focus on whether the device that generated the evidence was operative normally without any single issue, and the other method is to examine the actual evidence for manipulation .…”
Section: Previous Workmentioning
“…METHODOLOGY Figure 4 shows Network Forensics Readiness and Security Awareness Framework. This framework contains fifteen different software and database blocks, these blocks work as single unit in order to forensically process and normalize the captured event-logs that have been discussed in . In order to be able to generate an admissible forensics report to the court of Justice we have to clean our event-logs repository from any duplication and irrelevant information.…”
Section: Previous Workmentioning
“…Figure 5 shows an update design of Admissible Network Forensics Correlation Model (ANFCM). The old version of this model has been discussed in . The new update will focus on generating only admissible digital evidence.…”
“…The authors ,  proposed the forensics readiness and awareness framework to reconstruct a cybercrime scenario that was previously observed. The proposed framework that contains fifteen different software and database blocks.…”
Section: Decriminalising Anonymous and Pseudonymousmentioning
Abstract-Privacy and Data security are heating topic in the modern technologically advanced economy. Technological Innovations have created new forms of electronic data which are more vulnerable to theft or loss when compared to traditional data storage. Moreover, the recent advances in internet technologies have exacerbated the risk of security threats. The Internet brings a whole new set of challenges in terms of data protection. Considering the complexities of modern technological advancements and its impact on data security, this study examines the Irish laws and EU directives for privacy and data security, its effectiveness in managing large scale data breaches and limitations. This paper also simulates attack scenarios that can be done by anonymous users in a complex cyberspace environment and explains how a digital evidence related to the attack scenario can be tracked down.
scite is a Brooklyn-based startup that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.