A Defensive Evidence Model: An Approach of Security Model for Storing Digital Evidence in Network Forensics
Network Forensics Investigators apply most of the network monitoring tools, such as Snort or WinPcap to monitor or identify potential evidence to be collected and stored. However, these tools are lack of protection mechanisms to keep the evidence safe as well as the rising issues of chain-of-custody...
| Main Authors: | Mohd Izham, Ibrahim, Aman, Jantan, Mohammad, Rasmi |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2012
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/3668/ http://umpir.ump.edu.my/id/eprint/3668/1/48ICoCSIM.pdf |
Similar Items
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
by: Mosa, Mohammad Rasmi Hassun
Published: (2013)
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020)
by: Abdul Razak, Muhammad Thariq
Published: (2020)
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020)
by: Abdul Razak, Muhammad Thariq
Published: (2020)
An evidence-based forensic taxonomy of windows phone dating apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019)
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)
by: Arshad, Humaira
Published: (2019)
Modeling forensic evidence systems using design science
by: Armstrong, Colin, et al.
Published: (2010)
by: Armstrong, Colin, et al.
Published: (2010)
An evidence-based forensic taxonomy of Windows phone communication apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2018)
Cloud computing security threat with quantum key distribution defense model
by: Khalid, Roszelinda, et al.
Published: (2015)
by: Khalid, Roszelinda, et al.
Published: (2015)
A new secure storing system for biometric templates based encryption and concealment
by: Khalaf, Emad Taha, et al.
Published: (2015)
by: Khalaf, Emad Taha, et al.
Published: (2015)
Defense spending and income inequality: evidence from selected Asian countries
by: Mohd Tahir, Hirnissa, et al.
Published: (2009)
by: Mohd Tahir, Hirnissa, et al.
Published: (2009)
Chemical characterisation and classification of forensic trace evidence
by: Maric, Mark
Published: (2014)
by: Maric, Mark
Published: (2014)
VoIP evidence model: a new forensic method for investigating VoIP malicious attacks
by: Ibrahim, Mohammed, et al.
Published: (2012)
by: Ibrahim, Mohammed, et al.
Published: (2012)
MICIE: A model for identifying and collecting intrusion evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Digital forensics subdomains: The state of the art and future directions
by: Al-Dhaqm, Arafat, et al.
Published: (2021)
by: Al-Dhaqm, Arafat, et al.
Published: (2021)
Automatic defense against zero-day polymorphic worms in communication networks
by: Mohammed, Mohssen, et al.
Published: (2013)
by: Mohammed, Mohssen, et al.
Published: (2013)
A review on mobile device's digital forensic process models
by: Farjamfar, Anahita, et al.
Published: (2014)
by: Farjamfar, Anahita, et al.
Published: (2014)
Future technology: Software-defined network (SDN) forensic
by: Waseem, Quadri, et al.
Published: (2021)
by: Waseem, Quadri, et al.
Published: (2021)
Forensic evidence an analysis of shari'ah tests of admissibility
by: Shalim, K. M. Zakir Hossain Shalim, et al.
Published: (2017)
by: Shalim, K. M. Zakir Hossain Shalim, et al.
Published: (2017)
Applications of chemometrics to the analysis and interpretation of forensic physical evidence
by: Sauzier, Georgina Yasmin
Published: (2016)
by: Sauzier, Georgina Yasmin
Published: (2016)
THE FAMILY EFFECT: EVIDENCE FROM SMALL RETAIL STORES IN INDIA
by: Fazal, Faraz
Published: (2007)
by: Fazal, Faraz
Published: (2007)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
Cost Estimation Model for Secure Software Development
by: Sia Abdullah, Nur Atiqah
Published: (2011)
by: Sia Abdullah, Nur Atiqah
Published: (2011)
Digital forensics trends and future
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
by: Dezfoli, Farhood Norouzizadeh, et al.
Published: (2013)
AIRSE : an approach for attack intention recognition based on similarity of evidences
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
Digital forensic investigation reduction model (DIFReM) for Windows 10 OS
by: Shayau, Yazid Haruna
Published: (2018)
by: Shayau, Yazid Haruna
Published: (2018)
Proposed intelligence systems based on digital Forensics : Review paper
by: Ismael Sahib, Hussein, et al.
Published: (2023)
by: Ismael Sahib, Hussein, et al.
Published: (2023)
Considerations and future perspectives for the vibrational spectroscopic analysis of forensic cosmetic evidence
by: Bruce, K.A., et al.
Published: (2024)
by: Bruce, K.A., et al.
Published: (2024)
Enhancement of multicast network security
by: Ali, Sellami, et al.
Published: (2013)
by: Ali, Sellami, et al.
Published: (2013)
XRecursive: An efficient method to store and query XML documents
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
by: Mohammed Adam Ibrahim, Fakharaldien, et al.
Published: (2011)
Model driven security frameworks for addressing security problems of Service Oriented Architecture
by: Saleem, M. Q., et al.
Published: (2010)
by: Saleem, M. Q., et al.
Published: (2010)
Securing e-learning environment: A study of security awareness and behavior of user
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
by: Wan Nurul Safawati, Wan Manan, et al.
Published: (2017)
Efficient Algorithms to Index, Store and Query XML Documents
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2012)
Isolating defensive corporate ESG effects: Evidence from purely domestic anti-COVID-19 measures
by: Goodell, J.W., et al.
Published: (2024)
by: Goodell, J.W., et al.
Published: (2024)
Online music store (oms)
by: Mohd Hafiz, Roslan
Published: (2013)
by: Mohd Hafiz, Roslan
Published: (2013)
Security and accountability for sharing the data stored in the cloud‏
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
by: Mohammed, Mostafa Abdulghafoor, et al.
Published: (2016)
Digital forensics investigation reduction model (DIFReM) framework for Windows 10 OS
by: Shayau, Yazid Haruna, et al.
Published: (2019)
by: Shayau, Yazid Haruna, et al.
Published: (2019)
Satisfaction and Loyalty of Customers towards the Retail Store Formats- Evidence from India
by: Sreekanth, Prathyusha
Published: (2015)
by: Sreekanth, Prathyusha
Published: (2015)
Digital forensics: defining an education agenda
by: Nance, K., et al.
Published: (2010)
by: Nance, K., et al.
Published: (2010)
A survey on digital forensics trends
by: Dehghantanha, Ali, et al.
Published: (2014)
by: Dehghantanha, Ali, et al.
Published: (2014)
Traceability in Digital Forensic Investigation
Process
by: Selamat, S. R., et al.
Published: (2011)
by: Selamat, S. R., et al.
Published: (2011)
Similar Items
-
Quantitative Computational Framework For Analyzing Evidence To Identify Attack Intention And Strategy In Network Forensics
by: Mosa, Mohammad Rasmi Hassun
Published: (2013) -
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020) -
Mobile health applications digital evidence taxonomy with knowledge sharing approach for digital forensics readiness
by: Abdul Razak, Muhammad Thariq
Published: (2020) -
An evidence-based forensic taxonomy of windows phone dating apps
by: Wahyu Cahyani, Niken Dwi, et al.
Published: (2019) -
Digital Forensic Automation Model For Online Social Networks
by: Arshad, Humaira
Published: (2019)