Cyberspace Forensics Readiness and Security Awareness Mode

Abstract

The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1) Forensics Readiness, 2) Active Forensics, and 3) Forensics Awareness.

Authors and Affiliations

Aadil Al-Mahrouqi, Sameh Abdalla, Tahar Kechadi

Keywords

Related Articles

IRPanet: Intelligent Routing Protocol in VANET for Dynamic Route Optimization

This paper presents novel routing protocol, IRPANET (Intelligent Routing Protocol in VANET) for Vehicular Adhoc Network (VANET). Vehicular Ad Hoc Networks are special class of Mobile Adhoc Network, created by road vehicl...

 A Keyword Driven Framework for Testing Web Applications

  The goal of this paper is to explore the use of Keyword driven testing for automated testing of web application. In Keyword driven testing, the functionality of the system-under-test is documented in a table as we...

Multi-Band and Multi-Parameter Reconfigurable Slotted Patch Antenna with Embedded Biasing Network

RF PIN diodes are used to achieve reconfigurability in frequency, polarization, and radiation pattern. The antenna can be used in different bands by controlling ON and OFF states of two PIN diodes using the embedded bias...

An Efficient Routing Protocol in Mobile Ad-hoc Networks by using Artificial Immune System

Characteristics of the mobile ad-hoc networks such as nodes high mobility and limited energy are regarded as the routing challenges in these networks. OLSR protocol is one of the routing protocols in mobile ad hoc networ...

The Application of Fuzzy Control in Water Tank Level Using Arduino

Fuzzy logic control has been successfully utilized in various industrial applications; it is generally used in complex control systems, such as chemical process control. Today, most of the fuzzy logic controls are still...

Download PDF file
  • EP ID EP158596
  • DOI 10.14569/IJACSA.2015.060617
  • Views 110
  • Downloads 0

How To Cite

Aadil Al-Mahrouqi, Sameh Abdalla, Tahar Kechadi (2015). Cyberspace Forensics Readiness and Security Awareness Mode. International Journal of Advanced Computer Science & Applications, 6(6), 123-127. https://www.europub.co.uk/articles/-A-158596