Corpus ID: 53554770

Cyber Crime Investigation and Network Forensic System Using Honeypot

  title={Cyber Crime Investigation and Network Forensic System Using Honeypot},
  author={R. Misra},
Network Forensic is one of the most promising approaches for the network security. Under the umbrella of network security, the network forensic is regarded as the extension of the traditional security model. Apart from the general emphasis on prevention and detection of network attacks as in primitive network security model, the network forensics focuses on the collection, observation and preservation of network data so as to analyze and organize traffic data using clustering or various other… Expand

Figures from this paper

Summarization of Honeypot- A Evolutionary Technology for Securing Data over Network and Comparison with some Security Techniques
In the era of information and technology network security has become the core issue in every organizational network. There are many security mechanisms were used to provide the security to theExpand
Implementing file and real time based intrusion detections in secure direct method using advanced honeypot
In this paper, intrusion detection system (IDS) is proposed to identify and distinguish the incoming traffic from the clients and traffic originating through the attackers by using the honeypot security mechanism. Expand


Research of Dynamic Computer Forensics System Based on Honeypot
A dynamic computer forensics method based on honeypot that can transfer the intrusion to a virtual entironments with honeypot and gain the more time for gathering evidence so that the more authentic evidence can be achieved. Expand
Applying Digital Forensics in the Future Internet Enterprise Systems - European SME's Perspective
A framework of digital forensics for SMEs is presented and the scope of various methodologies and tools for these enterprises are evaluated and a detailed analysis of the risks to the competitive-edge of the companies that will not employ the forensics solutions to protect their business interests is presented. Expand
The Internet is the computer: The role of forensics in bridging the digital and physical divide
Cyber forensic investigations occur in varying degrees throughout the fields of computer security and incident response, network forensics, and law enforcement investigations, yet in all contexts involve the recognition, recovery and reconstruction of investigatory leads and evidence. Expand
A Common Scheme for Evaluation of Forensic Software
A first common evaluation scheme for forensic software is introduced and the formalization of the evaluation scheme classifies the forensic application according to the model of the forensic process of Kiltz et al. Expand
Internet Forensics: Legal and Technical Issues
  • Maria Karyda, L. Mitrou
  • Engineering
  • Second International Workshop on Digital Forensics and Incident Analysis (WDFIA 2007)
  • 2007
This paper provides a combined approach on the major issues pertaining to the investigation of cyber crimes and the deployment of Internet forensics techniques. It discusses major issues from aExpand
The future of computer forensics: a needs analysis survey
The results indicated that education/training and certification were the most reported issue and lack of funding was the least reported, which further support the criticism that there is a disproportional focus on the applied aspects of computer forensics, at the expense of the development of fundamental theories. Expand
Automating Disk Forensic Processing with SleuthKit, XML and Python
  • S. Garfinkel
  • Computer Science
  • 2009 Fourth International IEEE Workshop on Systematic Approaches to Digital Forensic Engineering
  • 2009
We have developed a program called |fiwalk| which produces detailedXML describing all of the partitions and files on a hard drive or diskimage, as well as any extractable metadata from the documentExpand
Is the Open Way a Better Way? Digital Forensics Using Open Source Tools
The end results indicate that open source tools are a very good verification of evidence found using other products and should be included in the academic environment. Expand
University Pittsburgh, PA, USA “Usability of forensics tools: user study
  • Sixth International Conference on IT Security Incident Management and IT Forensics
  • 2011
Fast Deployment of Computer Forensics with USBs
  • Chung-Huang Yang, P. Yen
  • Computer Science
  • 2010 International Conference on Broadband, Wireless Computing, Communication and Applications
  • 2010
This research integrates several open source digital forensics tools and creates a graphic user interface to develop a user-friendly environment for investigators to collect volatile data with executing commands from an external USB. Expand