Methods for Using Intrusion Logs to Establish Criminal Evidence Against Intruders
Autor: | Nehinbe Joshua ojo, Nehibe Johnson Ige |
---|---|
Jazyk: | angličtina |
Předmět: |
Computer science
ComputingMilieux_LEGALASPECTSOFCOMPUTING Intruder Computer security computer.software_genre Forensic science Intrusion Comput er crimes General Earth and Planetary Sciences ComputingMilieux_COMPUTERSANDSOCIETY comput er forensics Timestamp clust ering prima facie uncertainty computer General Environmental Science |
Zdroj: | EUSPN/ICTH |
ISSN: | 1877-0509 |
DOI: | 10.1016/j.procs.2013.09.062 |
Popis: | The admissible rate of criminal evidence against intruders has continued to generate classical arguments because the reports extracted from intrusion lo gs are often disputed in many courts of law. Besides, forensic experts still spend excessive resources to prepare reports for litigation before intruders can be charged. Thus, we propose Forenlog Analyzer to lessen the aforementioned problems. The pattern of attacks in an intrusion log is partitioned into sixty subgroups according to the values held in the timestamp of the evidence and the overall uncertainty of the pattern is subsequently computed. Evaluation illustrates that neither the internal attributes nor the external attributes of attacks are sufficient to litigate intruders in courts of laws in all cases. The results further demonstrate that forensic analysts should not just destroy, include or ignore supportive evidence on the basis of their sizes without determine their inherent uncertainty. |
Databáze: | OpenAIRE |
Externí odkaz: |