An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time

نویسندگان

  • Yoon-Ho Choi
  • Jong-Ho Park
  • Sang-Kon Kim
  • Seung-Woo Seo
  • Yu Kang
  • Jin Gi Choe
  • Ho-Kun Moon
  • Myung-Soo Rhee
چکیده

The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focused on how to collect the forensic evidence for both analysis and proofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to selectively collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Integrated Risk-Based Technique for Project Plan Selection

  Selecting an effective project plan is a significant area in the project management. The present paper introduces a technique to identify the project plan efficient frontier for assessing the alternative project plans and selecting the best plan. The efficient frontier includes two criteria: the project cost and the project time. Besides, the paper presents a scheme to incorporate Directed Ac...

متن کامل

An Efficient Numerical Scheme for Evaluating the Rolling Resistance of a Pneumatic Tire

The viscoelastic effect of rubber material on creation of rolling resistance is responsible for 10-33% dissipation of supplied power at the tire/road interaction surface. So, evaluating this kind of loss is very essential in any analysis concerned with energy saving. The transient dynamic analysis for including the rolling effects of the tire requires long CPU time and the obtained results are ...

متن کامل

An Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment

Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...

متن کامل

Appendix 1: Challenges in Software Quality Forensics and Litigation - A Case Study

Software forensic experts are called upon not only to perform authorship analysis and software copyright infringement forensics but also to perform software quality forensics. Because the prime evidence in such cases also are digital (in the form of software, databases etc.), the judiciary too often engages software forensic practitioners as expert witnesses to arrive at a considered judgment. ...

متن کامل

An efficient blind signature scheme based on the elliptic curve discrete logarithm problem

Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006