Cyberspace Forensics Readiness and Security Awareness Mode
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 6
Abstract
The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1) Forensics Readiness, 2) Active Forensics, and 3) Forensics Awareness.
Authors and Affiliations
Aadil Al-Mahrouqi, Sameh Abdalla, Tahar Kechadi
A Subset Feature Elimination Mechanism for Intrusion Detection System
Several studies have suggested that by selecting relevant features for intrusion detection system, it is possible to considerably improve the detection accuracy and performance of the detection engine. Nowadays with the...
A Behavioral Study of Task Scheduling Algorithms in Cloud Computing
All the services offered by cloud computing are bundled into one service know as IT as a Service (ITaaS). The user’s processes are executed using these services. The scheduling techniques used in the cloud computing envi...
Balanced Active and Reactive Control Applied to a Grid Connected Five Level Inverter
This paper presents a balanced active and reactive power control, using a Phase Locked Loop for synchronization, and applied to a grid connected Five Level Inverter. The energy source of the system can be a photovoltaic...
Gender Prediction for Expert Finding Task
Predicting gender by names is one of the most interesting problems in the domain of Information Retrieval and expert finding task. In this research paper, we propose a machine learning approach for gender prediction task...
Cultural Dimensions of Behaviors Towards E-Commerce in a Developing Country Context
Customers prefer to shop online for various reasons such as saving time, better prices, convenience, selection, and availability of products and services. The accessibility and the ubiquitous nature of the Internet facil...