2015
DOI: 10.1504/ijitst.2015.073938
|View full text |Cite
|
Sign up to set email alerts
|

Finding forensic evidence for several web attacks

Abstract: Abstract-Symantec Internet Security Threat Report 2014 is showing a horrified fact, that when an attacker looked for a site to compromise, one in eight sites made it relatively easy to gain access. Digital forensics is one of our biggest line of defense against cyber criminals, because it provides evidence against them. For attacks against web applications, web application forensics is the branch which gives most of the answers. First, the victim machine usually gives some data, which are then used for identif… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 2 publications
0
2
0
Order By: Relevance
“…In web application forensics, log files provide detailed events and a trace of security attacks [14]. For this reason, investigators always search for malicious entries in the log files [15,16]. Logs as digital evidence provide extremely useful information that can help in the detection of various kinds of attacks.…”
Section: Digital Evidencementioning
confidence: 99%
“…In web application forensics, log files provide detailed events and a trace of security attacks [14]. For this reason, investigators always search for malicious entries in the log files [15,16]. Logs as digital evidence provide extremely useful information that can help in the detection of various kinds of attacks.…”
Section: Digital Evidencementioning
confidence: 99%
“…Web applications typically interact with backend underlying database. Hence, if an unauthorised user gained information by sending a malicious code, then the attacker could obtain illegal access, steal sensitive data of trusted users, and destroy or damage the system (Kindy and Pathan, 2012;Šuteva et al, 2015). This attack can break the trust existing between the users and the server, as well as remove the feature of the absence of input/output validation on the server to reject malicious codes (Baranwal, 2012).…”
Section: Introductionmentioning
confidence: 99%