Analysis of firewall log-based detection scenarios for evidence in digital forensics
dc.contributor.author | Mukhtar, R | |
dc.contributor.author | Al-Nemrat, A | |
dc.contributor.author | Alazab, Mamoun | |
dc.contributor.author | Venkatraman, S | |
dc.contributor.author | Jahankhani, H | |
dc.date.accessioned | 2015-12-13T22:19:33Z | |
dc.date.issued | 2012 | |
dc.date.updated | 2016-02-24T09:03:50Z | |
dc.description.abstract | With the recent escalating rise in cybercrime, firewall logs have attained much research focus in assessing their capability to serve as excellent evidence in digital forensics. Even though the main aim of firewalls is to screen or filter part or all network traffic, firewall logs could provide rich traffic information that could be used as evidence to prove or disprove the occurrence of online attack events for legal purposes. Since courts have a definition of what could be presented to it as evidence, this research investigates on the determinants for the acceptability of firewall logs as suitable evidence. Two commonly used determinants are tested using three different firewall-protected network scenarios. These determinants are: 1 admissibility that requires the evidence to satisfy certain legal requirements stipulated by the courts 2 weight that represents the sufficiency and extent to which the evidence convinces the establishment of cybercrime attack. | |
dc.identifier.issn | 1751-911X | |
dc.identifier.uri | http://hdl.handle.net/1885/71865 | |
dc.publisher | Inderscience Publishers | |
dc.source | International Journal of Electronic Security and Digital Forensics | |
dc.subject | Keywords: Cybercrime; Digital evidence; Digital forensic; Firewall log; Forensic analysis; Legal requirements; Network scenario; Network traffic; Traffic information; Computer crime; Electronic crime countermeasures; Computer system firewalls cybercrime; Digital evidence; Firewall log; Forensic analysis | |
dc.title | Analysis of firewall log-based detection scenarios for evidence in digital forensics | |
dc.type | Journal article | |
local.bibliographicCitation.issue | 4 | |
local.bibliographicCitation.lastpage | 279 | |
local.bibliographicCitation.startpage | 261 | |
local.contributor.affiliation | Mukhtar, R, University of East London | |
local.contributor.affiliation | Al-Nemrat, A, University of East London | |
local.contributor.affiliation | Alazab, Mamoun, College of Asia and the Pacific, ANU | |
local.contributor.affiliation | Venkatraman, S, University of Ballarat | |
local.contributor.affiliation | Jahankhani, H, University of East London | |
local.contributor.authoremail | u5216926@anu.edu.au | |
local.contributor.authoruid | Alazab, Mamoun, u5216926 | |
local.description.embargo | 2037-12-31 | |
local.description.notes | Imported from ARIES | |
local.identifier.absfor | 080303 - Computer System Security | |
local.identifier.absfor | 160299 - Criminology not elsewhere classified | |
local.identifier.absseo | 940402 - Crime Prevention | |
local.identifier.absseo | 970108 - Expanding Knowledge in the Information and Computing Sciences | |
local.identifier.ariespublication | f5625xPUB2922 | |
local.identifier.citationvolume | 4 | |
local.identifier.doi | 10.1504/IJESDF.2012.049761 | |
local.identifier.scopusID | 2-s2.0-84867750846 | |
local.identifier.uidSubmittedBy | f5625 | |
local.type.status | Published Version |
Downloads
Original bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- 01_Mukhtar_Analysis_of_firewall_log-based_2012.pdf
- Size:
- 404.53 KB
- Format:
- Adobe Portable Document Format