World Congress on Internet Security (WorldCIS-2013) 2013
DOI: 10.1109/worldcis.2013.6751038
|View full text |Cite
|
Sign up to set email alerts
|

LEIA: The Live Evidence Information Aggregator: Towards efficient cyber-law enforcement

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2015
2015
2020
2020

Publication Types

Select...
3
1
1

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(10 citation statements)
references
References 17 publications
0
8
0
Order By: Relevance
“…We outline the requirements of such a P2P system for DFIR purposes, considering both structure d and unstructured P2P overlays. Finally, we propose improvements for the LEIA architecture [22] using ideas from [23,24,25,26,27] and [28], that would enable the distribution of information in such a network, thus enabling a more effective system for performing digital forensics and incident response in a collaborative manner in loosely controlled network environments.…”
Section: Contributionmentioning
confidence: 99%
See 4 more Smart Citations
“…We outline the requirements of such a P2P system for DFIR purposes, considering both structure d and unstructured P2P overlays. Finally, we propose improvements for the LEIA architecture [22] using ideas from [23,24,25,26,27] and [28], that would enable the distribution of information in such a network, thus enabling a more effective system for performing digital forensics and incident response in a collaborative manner in loosely controlled network environments.…”
Section: Contributionmentioning
confidence: 99%
“…All of these innovative ideas are premised on the grounds of a controlled network environment such as that in an enterprise. To the best of our knowledge, there has been only one study [22] that provides for DFIR architectures for less controlled environments, encompassing the digital forensics process model. This study mainly makes use of 2 P2P overlays to enable automation of some parts of the digital forensics process model, but still relies on a centralized backend for data storage and analysis.…”
Section: Digital Forensics and Incident Response In Networked Environmentioning
confidence: 99%
See 3 more Smart Citations