کد مقاله کد نشریه سال انتشار مقاله انگلیسی نسخه تمام متن
487947 703673 2013 6 صفحه PDF دانلود رایگان
عنوان انگلیسی مقاله ISI
Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders
موضوعات مرتبط
مهندسی و علوم پایه مهندسی کامپیوتر علوم کامپیوتر (عمومی)
پیش نمایش صفحه اول مقاله
Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders
چکیده انگلیسی

The admissible rate of criminal evidence against intruders has continued to generate classical arguments because the reports extracted from intrusion lo gs are often disputed in many courts of law. Besides, forensic experts still spend excessive resources to prepare reports for litigation before intruders can be charged. Thus, we propose Forenlog Analyzer to lessen the aforementioned problems. The pattern of attacks in an intrusion log is partitioned into sixty subgroups according to the values held in the timestamp of the evidence and the overall uncertainty of the pattern is subsequently computed. Evaluation illustrates that neither the internal attributes nor the external attributes of attacks are sufficient to litigate intruders in courts of laws in all cases. The results further demonstrate that forensic analysts should not just destroy, include or ignore supportive evidence on the basis of their sizes without determine their inherent uncertainty.

ناشر
Database: Elsevier - ScienceDirect (ساینس دایرکت)
Journal: Procedia Computer Science - Volume 21, 2013, Pages 465-470