Cyberspace Forensics Readiness and Security Awareness Mode
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 6
Abstract
The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1) Forensics Readiness, 2) Active Forensics, and 3) Forensics Awareness.
Authors and Affiliations
Aadil Al-Mahrouqi, Sameh Abdalla, Tahar Kechadi
A Novel Efficient Forecasting of Stock Market Using Particle Swarm Optimization with Center of Mass Based Technique
This paper develops an efficient forecasting model for various stock price indices based on the previously introduced particle swarm optimization with center mass (PSOCOM) technique. The structure used in the proposed pr...
Teaching Programming to Students in other Fields
It is a fact that programming is difficult to learn. On the other hand, programming skills are essential for each program in the field of computing and must be covered in the curriculum, regardless of the profile. Our ex...
Conditional Text Paraphrasing: A Survey and Taxonomy
This work introduces a survey for the Text Para-phrasing task. The survey covers the different types of tasks around text paraphrasing and mentions the techniques and models that are regularly used when approaching towar...
Efficient Image Cipher using 2D Logistic Mapping and Singular Value Decomposition
The research paper proposes an efficient image cryptosystem that depends on the utilization of two dimensional (2D) chaotic logistic map (CLM) and singular value decomposition (SVD). The encryption process starts by a co...
Interactive Application Development Policy Object 3D Virtual Tour History Pacitan District based Multimedia
Pacitan has a wide range of tourism activity. One of the tourism district is Pacitan historical attractions. These objects have a history tour of the educational values, history and culture, which must be maintained and...