Cyberspace Forensics Readiness and Security Awareness Mode

Abstract

The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1) Forensics Readiness, 2) Active Forensics, and 3) Forensics Awareness.

Authors and Affiliations

Aadil Al-Mahrouqi, Sameh Abdalla, Tahar Kechadi

Keywords

Related Articles

Moving from Heterogeneous Data Sources to Big Data: Interoperability and Integration Issues

Heterogeneous databases now facing an emerging challenge of moving towards big data. These databases are adhoc polyglot systems, complex, and NoSQL tools which are semantically annotated. Integration of these heterogeneo...

Undergraduate’s Perception on Massive Open Online Course (MOOC) Learning to Foster Employability Skills and Enhance Learning Experience

The Massive Open Online Course (MOOC) is a very recent development in higher education institutions in Malaysia. As in September 2015, Universiti Teknikal Malaysia Melaka (UTeM) has introduced Mandarin course under Malay...

Performance Analysis of Faults Detection in Wind Turbine Generator Based on High-Resolution Frequency Estimation Methods

Electrical energy production based on wind power has become the most popular renewable resources in the recent years because it gets reliable clean energy with minimum cost. The major challenge for wind turbines is the e...

Radial basis Function Neural Network for Predicting Flow Bottom Hole Pressure

The ability to monitor the flow bottom hole pressure in pumping oil wells provides important information regarding both reservoir and artificial lift performance. This paper proposes an iterative approach to optimize the...

Scalable Scientific Workflows Management System SWFMS

In today’s electronic world conducting scientific experiments, especially in natural sciences domain, has become more and more challenging for domain scientists since “science” today has turned out to be more complex due...

Download PDF file
  • EP ID EP158596
  • DOI 10.14569/IJACSA.2015.060617
  • Views 109
  • Downloads 0

How To Cite

Aadil Al-Mahrouqi, Sameh Abdalla, Tahar Kechadi (2015). Cyberspace Forensics Readiness and Security Awareness Mode. International Journal of Advanced Computer Science & Applications, 6(6), 123-127. https://www.europub.co.uk/articles/-A-158596