Construction and Analysis of Website Intrusion Forensics Model

Article Preview

Abstract:

According to the website security and judicial forensics demands, a new Website Intrusion Forensics Model is proposed foe research. The model can discovery the website intrusion and forensic in time. This paper first describes the overall structure of the model, then according to the various types of intrusion websites. Put forward a comprehensive and detailed design plan about Data acquisition, transmission, preprocessing, storage, analysis, data control and user view module.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2748-2751

Citation:

Online since:

November 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] P. Knickerbocker,D. Yu, and J. Li, Humboldt: A distributed phishing disruption system, in proc. IEEE eCrime Researchers Summit, Tacoma, USA, 2009, pp.1-12.

DOI: 10.1109/ecrime.2009.5342620

Google Scholar

[2] D. Ruan, Z. Chen,J. Ni, and P.D. Urgsunan, Handling high speed traffic measurement using network processors, In Proc. 2006 International Conference on Communication Technology (ICCT 2006), Beijing, China, 2006, pp.1-5.

DOI: 10.1109/icct.2006.341843

Google Scholar

[3] M.A. Caloyannides,N. Memon, and W. Venema, Digital forensics, IEEE Security&Privacy, vol. 7, no. 2, pp.16-17, (2009).

DOI: 10.1109/msp.2009.34

Google Scholar

[4] N. Sklavos, N. Modovyan, V. Grorodetsky, and O. Koufopavlou, Computer network security: Report from MMM-ACNS, IEEE Security & Privacy, vol. 2, no. 1, pp.49-52, (2004).

DOI: 10.1109/msecp.2004.1264853

Google Scholar

[5] B.D. Carrier, Digital forensics works, IEEE Securiy&Privacy, Vol. 7, No. 2, pp.26-29, (2009).

Google Scholar

[6] G. Maier,R. Sommer,H. Dreger, and V. Paxson, Enriching network security analysis with time travel, in Proc. ACM Sigcomm, Seattle, WA, USA, 2008, pp.183-194.

DOI: 10.1145/1402946.1402980

Google Scholar