Proposed Methodology for Secure Image Logging System towards Cyber Forensic
Journal Title: International Journal of Innovative Research in Computer Science and Technology - Year 2013, Vol 1, Issue 2
Abstract
In recent years, the importance of cyber forensics (CF) has increased. Meanwhile, society has become considerably digitized, and cybercrime, such as computer attacks or digital data thefts, has increased significantly. Computer forensics is one of the growing concerns in the IT field. Computer forensics is similar to the field of forensics. Police use the science of forensics to scour a crime scene for evidence of what happened, to whom it happened, and who did what to whom. In the case of computer forensics, the crime scene is the machine that was hacked, the victim is the entity to which the computer belongs, and the hacker is the criminal. The evidence in the case of computer forensics is the trail left by the hacker, which is recorded in the log files .log is used as information to investigate the destruction, manipulation, or information leak of digital data and as evidence in the court of law. A log is the general evidence information in a network system and a computing system. Possibility of manipulation or deletion of log information or log file eras ability itself is increasing. Because log files are incriminating evidence against attackers, these files are at risk of attacks. Along with that there is a huge amount of data produced every day. And often it is necessary to store them for a long period of time. Regardless of the type of recorded logs, for reasons of simplicity and convenience, they are usually stored in plain text log files. Both the content type and the storage format suggest that it is possible to significantly reduce the size of log files through lossless data compression. Therefore, a mechanism is needed for reducing the size of log file and to prevent the manipulation and deletion of log info and log files by attackers and maintain the contents of log files .In this paper, implement multi thread server which stores the image files of the web log file after applying lossless compression over web log file at the same time that is recorded and makes log files. We suggest the compressed image log file as evidence about the cyber forensics
Authors and Affiliations
Arun Pratap Srivastava, Rohit Kmar Sharma
A Comprehensive Review of the Significance of Low-code Automation in Risk Management for Banks
This study provides a comprehensive examination of the influence of low-code development platforms in the risk management area within the banking sector. This research delves into the tactical utilization of low-code aut...
Experimental Investigation of Three Phase Flow (Liquid-Gas-Solid) In Horizontal Pipe
The study of three phase flow in horizontal and vertical pipe are important phenomena in oil and gas industry due to extracting process involve liquid, solid and gas phase. The effect of the particle amount, the discharg...
Artificial Intelligence Verification Platform using Block Chain with Distributed Ledger Technology
Developments in (AI) or (DLT) are now provoking lively debate in practice and academia. AI uses data to achieve goals that were previously believed to be only possible for humans. In an unsettled context, distributed led...
Effects of Climate Change on Wildlife: A Review Paper
Changing climate events and environment changes will significantly affect biological systems and the creatures that live inside them. As the temperature rises, earthly natural surroundings systems are expected to move aw...
Education Data mining: Perspectives of Engineering Students
Predicting students’ tutorial performance is of nice concern within the higher education system. Data processing are often employed in the next instructional system to predict the students’ tutorial performance. during t...