CFP last date
20 December 2024
Reseach Article

An Overview to the Robust and Secure Evidence-Gathering Server for the Digital Forensic

by Smita Verma, Anurag Jain
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 71 - Number 15
Year of Publication: 2013
Authors: Smita Verma, Anurag Jain
10.5120/12432-8887

Smita Verma, Anurag Jain . An Overview to the Robust and Secure Evidence-Gathering Server for the Digital Forensic. International Journal of Computer Applications. 71, 15 ( June 2013), 6-11. DOI=10.5120/12432-8887

@article{ 10.5120/12432-8887,
author = { Smita Verma, Anurag Jain },
title = { An Overview to the Robust and Secure Evidence-Gathering Server for the Digital Forensic },
journal = { International Journal of Computer Applications },
issue_date = { June 2013 },
volume = { 71 },
number = { 15 },
month = { June },
year = { 2013 },
issn = { 0975-8887 },
pages = { 6-11 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume71/number15/12432-8887/ },
doi = { 10.5120/12432-8887 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T21:35:37.577886+05:30
%A Smita Verma
%A Anurag Jain
%T An Overview to the Robust and Secure Evidence-Gathering Server for the Digital Forensic
%J International Journal of Computer Applications
%@ 0975-8887
%V 71
%N 15
%P 6-11
%D 2013
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Since the advent of the World Wide Web in 1990, the usage of Internet over worldwide has grown from roughly 2. 6 million users (0. 05% of the world population) in 1990, to roughly 2. 0 billion users (30% of the world population) in 2010 (The World Bank Group, 2012). This trend is expected to continue for the foreseeable future (Cisco Internet Business Solutions Group as cited in Evans, 2011). With this, websites have become increasingly important in the lives of individuals worldwide. There security is also a big issue for the professionals. In this paper, we would like to propose a method for maintaining & managing a server called an "evidence-gathering server". This evidence-gathering server extracts the log data from all the nodes and servers of clustered area. we are also using the concept of hashing, this hash value will always associated with every binary object of logs. In this way, we will provide a single place to get all the network level evidences. This will help the forensic analyst to analyse and reconstruct the activity, and give results in faster time.

References
  1. Deepak Singh Tomar, J. L. Rana, S. C. Shrivastava, "Web Forensics System on the Basis of Evidence Gathering with Code Injection Attack", in International Journal of Computer Science & Communication, Vol. 1, No. 2, July-December 2010, pp. 313-315.
  2. FumiharuEtoh, Kenichi Takahashi, oshiaki Hori, Kouichi Sakurai, "Study of log file dispersion management method", in 10th Annual International Symposium on Applications and the Internet, 2010, pp. 371-374.
  3. Warren G. Kruse II, Jay G. Heiser. "COMPUTER FORENSICS:Incident Response Essentials", Addison Wesley.
  4. Robert Rinnan "Benefits of Centralized Log file Correlation" Master?s Thesis, Master of Science in Information Security30 ECTS, Department of Computer Science and Media Technology Gjøvik University College, 2005.
  5. H. Tomori, S. Tezuka and R. Uda, "A proposal of a distributed file backup system for digital forensics [in Japanese]," Computer Security Symposium (CSS 2008), Oct. 2008.
  6. B. Schneier and J. Kelsey, "Cryptographic Support for Secure Logs on Untrusted Machine," Proc. of the 7th USENIX Security Symposium, Jan. 1998, pp. 53–62.
  7. M. Ando, K. Matsuura and A. Baba, "An analysis of ensuring order of log entries in distributed environment [in Japanese]," Computer Security Symposium (CSS 2002), Oct. 2002.
  8. K. Sudheer Reddy, G. ParthaSaradhiVarma, "Preprocessing the web server logs: an illustrative approach for effective usage mining", ACM SIGSOFT Software Engineering Notes archive Volume 37 Issue 3, May 2012 Pp 1-5.
  9. Zadro?ny, S. , Kacprzyk, J. : From a static to dynamic analysis of weblogs via linguistic summaries. In: Proc. of 2011 IFSA World Congress, pp. 110–119 (2011).
  10. Francesco Bergadano, DavideCavagnino, Paolo Dal Checco, Pasquale Andrea Nesta, Michele Miraglia, and Pier Luigi Zaccone, "Secure Logging for Irrefutable Administration", International Journal of Network Security, Vol. 4, No. 3, PP. 340–347, Mar. 2007.
Index Terms

Computer Science
Information Sciences

Keywords

Digital forensics evidences evidence preservation web security