Cyberspace Forensics Readiness and Security Awareness Mode
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2015, Vol 6, Issue 6
Abstract
The goal of reaching a high level of security in wire- less and wired communication networks is continuously proving difficult to achieve. The speed at which both keepers and violators of secure networks are evolving is relatively close. Nowadays, network infrastructures contain a large number of event logs captured by Firewalls and Domain Controllers (DCs). However, these logs are increasingly becoming an obstacle for network administrators in analyzing networks for malicious activities. Forensic investigators mission to detect malicious activities and reconstruct incident scenarios is extremely complex considering the number, as well as the quality of these event logs. This paper presents the building blocks for a model for automated network readiness and awareness. The idea for this model is to utilize the current network security outputs to construct forensically comprehensive evidence. The proposed model covers the three vital phases of the cybercrime management chain, which are: 1) Forensics Readiness, 2) Active Forensics, and 3) Forensics Awareness.
Authors and Affiliations
Aadil Al-Mahrouqi, Sameh Abdalla, Tahar Kechadi
A Review and Classification of Widely used Offline Brain Datasets
Brain Computer Interfaces (BCI) are a natural extension to Human Computer Interaction (HCI) technologies. BCI is especially useful for people suffering from diseases, such as Amyotrophic Lateral Sclerosis (ALS) which cau...
Processing the Text of the Holy Quran: a Text Mining Study
The Holy Quran is the reference book for more than 1.6 billion of Muslims all around the world Extracting information and knowledge from the Holy Quran is of high benefit for both specialized people in Islamic studies as...
A Multiple-Objects Recognition Method Based on Region Similarity Measures: Application to Roof Extraction from Orthophotoplans
In this paper, an efficient method for automatic and accurate detection of multiple objects from images using a region similarity measure is presented. This method involves the construction of two knowledge databases: Th...
Connectivity Resotration Techniques for Wireless Sensor and Actor Network (WSAN), A Review
Wireless Sensor and actor networks (WSANs) are the most promising research area in the field of wireless communication. It consists of large number of small independent sensor and powerful actor nodes equipped with commu...
Core Levels Algorithm for Optimization: Case of Microwave Models
Metaheuristic algorithms are investigated and used by many researchers in different areas. It is crucial to find optimal solutions for all problems under study especially for the ones which require sensitive optimization...