An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time
نویسندگان
چکیده
The Computer Forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. Many researches about Computer Forensics have been done so far. But those researches have focused on how to collect the forensic evidence for both analysis and proofs after receiving the intrusion or infringement reports of hosts from computer users or network administrators. In this paper, we describe how to selectively collect the forensic evidence of good quality from observable and protective hosts at the time of infringement occurrence by malicious users. By correlating the event logs of Intrusion Detection Systems(IDSes) and hosts with the configuration information of hosts periodically, we calculate the value of infringement severity that implies the real infringement possibility of the hosts. Based on this severity value, we selectively collect the evidence for proofs at the time of infringement occurrence. As a result, we show that we can minimize the information damage of the evidence for both analysis and proofs, and reduce the amount of data which are used to analyze the degree of infringement severity.
منابع مشابه
An Integrated Risk-Based Technique for Project Plan Selection
Selecting an effective project plan is a significant area in the project management. The present paper introduces a technique to identify the project plan efficient frontier for assessing the alternative project plans and selecting the best plan. The efficient frontier includes two criteria: the project cost and the project time. Besides, the paper presents a scheme to incorporate Directed Ac...
متن کاملAn Efficient Numerical Scheme for Evaluating the Rolling Resistance of a Pneumatic Tire
The viscoelastic effect of rubber material on creation of rolling resistance is responsible for 10-33% dissipation of supplied power at the tire/road interaction surface. So, evaluating this kind of loss is very essential in any analysis concerned with energy saving. The transient dynamic analysis for including the rolling effects of the tire requires long CPU time and the obtained results are ...
متن کاملAn Enhanced MSS-based checkpointing Scheme for Mobile Computing Environment
Mobile computing systems are made up of different components among which Mobile Support Stations (MSSs) play a key role. This paper proposes an efficient MSS-based non-blocking coordinated checkpointing scheme for mobile computing environment. In the scheme suggested nearly all aspects of checkpointing and their related overheads are forwarded to the MSSs and as a result the workload of Mobile ...
متن کاملAppendix 1: Challenges in Software Quality Forensics and Litigation - A Case Study
Software forensic experts are called upon not only to perform authorship analysis and software copyright infringement forensics but also to perform software quality forensics. Because the prime evidence in such cases also are digital (in the form of software, databases etc.), the judiciary too often engages software forensic practitioners as expert witnesses to arrive at a considered judgment. ...
متن کاملAn efficient blind signature scheme based on the elliptic curve discrete logarithm problem
Elliptic Curve Cryptosystems (ECC) have recently received significant attention by researchers due to their high performance such as low computational cost and small key size. In this paper a novel untraceable blind signature scheme is presented. Since the security of proposed method is based on difficulty of solving discrete logarithm over an elliptic curve, performance of the proposed scheme ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006