oalib
Search Results: 1 - 10 of 100 matches for " "
All listed articles are free for downloading (OA Articles)
Page 1 /100
Display every page Item
Plethora of Cyber Forensics  [PDF]
N.Sridhar,Dr.D.Lalitha Bhaskari,Dr.P.S.Avadhani
International Journal of Advanced Computer Sciences and Applications , 2011,
Abstract: As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forensics tools must increase its toughness and counteract these advanced persistent threats. This paper focuses on briefing of Cyber forensics, various phases of cyber forensics, handy tools and new research trends and issues in this fascinated area.
CYBER FORENSICS COMPETENCY-BASED FRAMEWORK - AREVIEW  [PDF]
Elfadil Sabeil,Azizah Bt Abdul Manaf,Zuraini Ismail,Mohamed Abas
International Journal of New Computer Architectures and their Applications , 2011,
Abstract: Lack of Cyber Forensics experts is a huge challenge facing the world today. It comes due to the fancy of Cyber Forensics training or education. The multidisciplinary nature of Cyber Forensics proliferates to diverse training programmes, from a handful daya€ s workshop to Postgraduate in Cyber Forensics. Consequently, this paper concentrates on analyzing the Cyber Forensics training programmes in terms of Competency-Based Framework. The study proves that Cyber Forensics training or education has improper Competency-Based Framework.
CYBER FORENSICS: COMPUTER SECURITY AND INCIDENTRESPONSE  [PDF]
Virginiah Sekgwathe,Mohammad Talib
International Journal of New Computer Architectures and their Applications , 2012,
Abstract: The intensification of Information and Communications Technology usage in all facets of life exceedingly amplify the incidents of information security policy breaches, cyber crimes, fraud, commercial crimes, cyber laundering etc, hence require a well developed approach to tackle these incidents in order to realize legally defensible digital evidence. Since electronic evidence is fragile and can easily be modified, finding this data, collecting, preserving, and presenting it properly in a court of law is the real challenge. There is a need for use of semantic analysis to discover underlying security policy requirements and internal power structures and institutionalization of anti cyber attack, antimoney- laundering and regulatory schemes. The first responders to cyber security incidents often than always are an organization ICT personnel who are technically sound though may be deficient in investigative skill. The scientific standards of cyber forensics dictates the procedure as it promotes objectivity, a precise and well documented analysis, particularly that the findings maybe used as evidence against the attacker. This paper aims to contribute to the advancement of the cyber forensics discipline with a view to assist the International community in combating this sophisticated, high-tech, dynamic ever changing phenomenon.
Digital Forensics and Cyber Crime Datamining  [PDF]
K. K. Sindhu, B. B. Meshram
Journal of Information Security (JIS) , 2012, DOI: 10.4236/jis.2012.33024
Abstract: Digital forensics is the science of identifying, extracting, analyzing and presenting the digital evidence that has been stored in the digital devices. Various digital tools and techniques are being used to achieve this. Our paper explains forensic analysis steps in the storage media, hidden data analysis in the file system, network forensic methods and cyber crime data mining. This paper proposes a new tool which is the combination of digital forensic investigation and crime data mining. The proposed system is designed for finding motive, pattern of cyber attacks and counts of attacks types happened during a period. Hence the proposed tool enables the system administrators to minimize the system vulnerability.
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS  [PDF]
Natarajan Meghanathan,Sumanth Reddy Allam,Loretta A. Moore
International Journal of Network Security & Its Applications , 2009,
Abstract: Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discusses thedifferent tools and techniques available to conduct network forensics. Some of the tools discussed include: eMailTrackerPro – to identify the physical location of an email sender; Web Historian – to find the duration of each visit and the files uploaded and downloaded from the visited website; packet sniffers like Ethereal – to capture and analyze the data exchanged among the different computers in the network. The second half of the paper presents a survey of different IP traceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets. We also discuss the use of Honeypots and Honeynets that gather intelligence about the enemy and the tools and tactics ofnetwork intruders.
Tools and techniques for Network Forensics  [PDF]
Natarajan Meghanathan,Sumanth Reddy Allam,Loretta A. Moore
Computer Science , 2010,
Abstract: Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discusses the different tools and techniques available to conduct network forensics. Some of the tools discussed include: eMailTrackerPro to identify the physical location of an email sender; Web Historian to find the duration of each visit and the files uploaded and downloaded from the visited website; packet sniffers like Etherea to capture and analyze the data exchanged among the different computers in the network. The second half of the paper presents a survey of different IP traceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets. We also discuss the use of Honeypots and Honeynets that gather intelligence about the enemy and the tools and tactics of network intruders.
An Authorship Analysis Model MBSFAM in Software Forensics
软件取证和一个身份分析模型MBSFAM*

LIU Wu,REN Ping,DUAN Hai-xin,XIANG Xiao-lin,
刘武
,任萍,段海新,向晓林

计算机应用研究 , 2004,
Abstract: Computer forensics are now attracted by researchers and developers abroad,but studied little in our nation,and the products of computer forensics are primarily those based on host.Discuss the definition and target of authorship analysis in software forensics,explain how to extract characters of authorship analysis in detail.Finally we give a forensic analysis model MBSFAM.
Techniques in Computer Forensics: A Recovery Perspective
Bhanu Prakash Battula,B. Kezia Rani,R. Satya Prasad,T. Sudha
International Journal of Security , 2009,
Abstract: Computer forensics has recently gained significant popularity with many local lawenforcement agencies. It is currently employed in fraud, theft, drug enforcementand almost every other enforcement activity. The research paper includes thetypes of attempts to destroy or tamper the files by the culprits and unleashesvarious recovery techniques, and their significance in different situations fromthose attempts, which destroy files or inflict physical damage to the computer.The paper also presents the nature and immediate need of enhancing theexisting automated forensics tools. The paper gives a quick glance of variousmethods used by culprits to destroy the information in the electronic storagemedia and their corresponding forensic approach done by the computer forensicexperts in the perspective of recovery.
Authorship Identification in Bengali Literature: a Comparative Analysis  [PDF]
Tanmoy Chakraborty
Computer Science , 2012,
Abstract: Stylometry is the study of the unique linguistic styles and writing behaviors of individuals. It belongs to the core task of text categorization like authorship identification, plagiarism detection etc. Though reasonable number of studies have been conducted in English language, no major work has been done so far in Bengali. In this work, We will present a demonstration of authorship identification of the documents written in Bengali. We adopt a set of fine-grained stylistic features for the analysis of the text and use them to develop two different models: statistical similarity model consisting of three measures and their combination, and machine learning model with Decision Tree, Neural Network and SVM. Experimental results show that SVM outperforms other state-of-the-art methods after 10-fold cross validations. We also validate the relative importance of each stylistic feature to show that some of them remain consistently significant in every model used in this experiment.
Visualization Techniques for Digital forensics: A Survey
Mr.Sushilkumar Chavhan, Ms.S.M.Nirkhi
International Journal of Advanced Computer Research , 2012,
Abstract: Digital crimes is big problem due to large numbersof data access and insufficient attack analysistechniques so there is the need for improvements inexisting digital forensics techniques. With growingsize of storage capacity these digital forensicinvestigations are getting more difficult.Visualization allows for displaying large amounts ofdata at once. Integrated visualization of datadistribution bars and rules, visualization ofbehaviour and comprehensive analysis, maps allowuser to analyze different rules and data at differentlevel, with any kind of anomaly in data. Datamining techniques helps to improve the process ofvisualization. These papers give comprehensivereview on various visualization techniques withvarious anomaly detection techniques.
Page 1 /100
Display every page Item


Home
Copyright © 2008-2017 Open Access Library. All rights reserved.