Options
Efficiency of Network Event logs as Admissible Digital Evidence
Author(s)
Date Issued
2015-07-30
Date Available
2015-07-30T03:00:12Z
Abstract
The large number of event logs generated in atypical network is increasingly becoming an obstacle for forensicinvestigators to analyze and use to detect and verify maliciousactivities. Research in the area of network forensics is trying toaddress the challenge of using network logs to reconstruct attackscenarios by proposing events correlation models. In this paperwe introduce and examine a new network forensics model thatmakes network event-logs admissible in the court of low. The ideaof our model is to collect available logs from connected networkdevices and then apply Support Vectors Machine (SVMs) in orderto filter out anomaly intrusion, and re-route these logs to a centralrepository where a event-logs management functions are applied.
Sponsorship
Science Foundation Ireland
Type of Material
Conference Publication
Start Page
1257
End Page
1265
Copyright (Published Version)
2015 IEEE
Web versions
Language
English
Status of Item
Peer reviewed
Conference Details
2015 Science and Information Conference, London, United Kingdom, 28-30 July 2015
This item is made available under a Creative Commons License
File(s)
Loading...
Name
insight_publication.pdf
Size
530.95 KB
Format
Adobe PDF
Checksum (MD5)
f5ad3815a6f09d4a28064d0e2da44ae4
Owning collection
Mapped collections