Obtaining Digital Evidence from Intrusion Detection Systems

  • MoyoAchille M
  • Etoundi Roger A
N/ACitations
Citations of this article
5Readers
Mendeley users who have this article in their library.

Abstract

Intrusion detection techniques have appeared to inspect all of the inbound and outbound network activities, and to identify suspicious patterns that indicate an attack that might compromise an information system. However, related information can be collected so as to supply evidence in criminal and civil legal proceedings. Several works have been carried out in the domain of Intrusion Detection and Prevention System (IDPS) but, none of the resulting models taking into account the possibility to collect intrusion related information in such a way that some of it can be turned in evidence in a proactive digital forensic purpose. In the literature, some authors have mentioned the possibility of redesigning IDPS as sources of evidence but, a formal model has never been proposed. This paper proposes an intrusion detection architecture for digital forensic purposes implemented using SNORT program.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

MoyoAchille, M., & Etoundi Roger, A. (2014). Obtaining Digital Evidence from Intrusion Detection Systems. International Journal of Computer Applications, 95(12), 34–41. https://doi.org/10.5120/16649-6623

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 2

67%

Lecturer / Post doc 1

33%

Readers' Discipline

Tooltip

Computer Science 3

60%

Business, Management and Accounting 1

20%

Engineering 1

20%

Save time finding and organizing research with Mendeley

Sign up for free