Volume- 1
Issue- 2
Year- 2013
Article Tools: Print the Abstract | Indexing metadata | How to cite item | Email this article | Post a Comment
Arun Pratap Srivastava , Rohit Kmar Sharma
In recent years, the importance of cyber forensics (CF) has increased. Meanwhile, society has become considerably digitized, and cybercrime, such as computer attacks or digital data thefts, has increased significantly. Computer forensics is one of the growing concerns in the IT field. Computer forensics is similar to the field of forensics. Police use the science of forensics to scour a crime scene for evidence of what happened, to whom it happened, and who did what to whom. In the case of computer forensics, the crime scene is the machine that was hacked, the victim is the entity to which the computer belongs, and the hacker is the criminal. The evidence in the case of computer forensics is the trail left by the hacker, which is recorded in the log files .log is used as information to investigate the destruction, manipulation, or information leak of digital data and as evidence in the court of law. A log is the general evidence information in a network system and a computing system. Possibility of manipulation or deletion of log information or log file eras ability itself is increasing. Because log files are incriminating evidence against attackers, these files are at risk of attacks. Along with that there is a huge amount of data produced every day. And often it is necessary to store them for a long period of time. Regardless of the type of recorded logs, for reasons of simplicity and convenience, they are usually stored in plain text log files. Both the content type and the storage format suggest that it is possible to significantly reduce the size of log files through lossless data compression. Therefore, a mechanism is needed for reducing the size of log file and to prevent the manipulation and deletion of log info and log files by attackers and maintain the contents of log files .In this paper, implement multi thread server which stores the image files of the web log file after applying lossless compression over web log file at the same time that is recorded and makes log files. We suggest the compressed image log file as evidence about the cyber forensics
[1] Fumiharu Etoh, Kenichi Takahashi ,Yoshiaki Hori, Kouichi Sakurai, “Study of log file dispersion management method” in Annual International Symposium on Applications and the Internet,ieee,2010.
[2] Kessler, M. G. (2006). Kessler’s Corner: The growing field of computer forensics. The Kessler Report, 9(1), 7.
[3] Bernie Lantz,Rob Hall,Jason Couraud , “locking down log files: enhancing network security by protecting log files ” Issues in Information Systems, Volume VII, No. 2, 2006
[4] NPO The Institute of Digital Forensics 2006, Encyclopedia of Digital Forensics [in Japanese], Dec. 2006
[5] PrzemysÅ‚aw SkibiÅ„ski and Jakub Swacha, “Fast and efficient log file compression” Local Proceedings of ADBIS 2007, pp. 56-69© Technical University of Varna, 2007
[6] Vimal Kumar,Akhilendra Pratap Singh, Anjani K. Rai ,Manoj Wairiya , “Self Alteration Detectable Image Log File for Web Forensics”
[7] Web Forensics, Jess García, http://www.jessland.net
[8] Indian Computer Emergency Response Team, “Web Server Security Guideline,” CERT-IN, August, 17, 2004.
[9] Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine, “Threat to privacy in the Forensics Analysis of Database Systems,” SIGMOD‟07, Beijing, China, June 12–14, 2007.
[10] Kapil Kumar Gupta, Baikunth Nath, Ramamohanarao Kotagiri,” Layered Approach using Conditional Random Fields for Intrusion Detection,” IEEE Transaction on Dependable and Secure Computing Vol 7, NO 1,JanuaryMarch 2010.
[11] Liu Jiqiang Han Zhen Lan Zengwei,” Secure Audit Logs Server to Support Computer Forensics in Criminal Investigations,” Proceedings of IEEE, TENCOW02
[12] Patrick Stahlberg, Gerome Miklau, and Brian Neil Levine,“Threat to privacy in the Forensics Analysis of Database Systems,” SIGMOD‟07, Beijing, China, June 12– 14, 2007.
[13] Nikhil Kumar Singh, Deepak Singh Tomar, Bhola Nath Roy, “An approach tounderstand the end user behavior through log analysis” International Journal of Computer Applications (0975 – 8887), August 2010.
[14] Karen Kent and Murugiah Souppaya, “Guide to Computer Security Log Management”, Computer Security Division Information Technology Laboratory National Institute of Standards and Technology Gaithersburg, 2006
[15] Muhammad Kamran Ahmed, Mukhtar Hussain and Asad Raza “An Automated User Transparent Approach to log Web URLs for Forensic Analysis” Fifth International Conference on IT Security Incident Management and IT Forensics 2009.
[16] P. K. Sahoo ,Dr. R. K. Chottaray, “The Role of Audit Logs in Cyber Security” International Journal of Science and Advanced Technology (ISSN 2221-8386) Volume 1 No 7 September 2011
[17] Gary L Palmer “A Road Map for Digital Forensic Research”. Technical ReportDTR-T0010-01, DFRWS. Report for the First Digital Forensic Research Workshop (DFRWS), 2001
[18] Rafael Accorsi, Safekeeping Digital Evidence with Secure Logging Protocols:State of the Art and Challenges, University of Freiburg, Germany.
[19] Carrier, B.D., Spafford, E.H “Defining Digital Crime Scene Event Reconstruction” Journal of Forensic Sciences, 49(6). Paper ID JFS2004127,2004
[20] Stephenson. P, “Application Of Formal Methods To Root Cause Analysis of Digital Incidents”, International Journal of Digital Evidence, 3(1) ,2004
[21] http://www.ftc.gov/privacy/privacyinitiatives/financial_rule_l r.html. [22] Seunghee Yoo, Yilhyeong Mun, Dongsub Cho, “Implementation of Image Loging Server for Web Forensic,” 978-1-424426249/08, IEEE, 2008
Associate Professor, Computer Science & Engineering Department,Vishveshwarya Institute of Engineering & Technology,Dadri, G.B. Nagar,India.(e-mail: arun019@yahoo.com).
No. of Downloads: 4 | No. of Views: 1025
Dipti Prajapati, Samishtarani Sabat, Sanika Bhilare, Rashmi Vishe, Prof. Suman Bhujbal.
March 2024 - Vol 12, Issue 2
Anu Sharma, Vivek Kumar.
May 2023 - Vol 11, Issue 3
Venkateswaran Radhakrishnan.
May 2023 - Vol 11, Issue 3