IJCATR Volume 5 Issue 5

A Proactive Approach in Network Forensic Investigation Process

Joseph MbuguaChahira Jane KinanuKiruki Peter KipronoKemei
10.7753/IJCATR0505.1012
keywords : Digital forensic, cybercrimes, proactive network forensic, attack prediction, attack Strategy.

PDF
Information Assurance and Security (IAS) is a crucial component in the corporate environment to ensure that the secrecy of sensitive data is protected, the integrity of important data is not violated, and the availability of critical systems is guaranteed. The advancement of Information communication and technology into a new era and domain such as mobility and Internet of Things, its ever growing user’s base and sophisticated cyber-attacks forces the organizations to deploy automated and robust defense mechanism to manage resultant digital security incidences in real time. Digital forensic is a scientific process that facilitates detection of illegal activities and in-appropriate behaviors using scientific tools, techniques and investigation frameworks. This research aims at identifying processes that facilitate and improves digital forensic investigation process. Existing digital forensic framework will be reviewed and the analysis will be compiled toderive a network forensic investigation framework that include evidence collection, preservation and analysis at a sensor level and in real time. It is aimed to discover complete relationship with optimal performance among known and unseen/new alerts generated by multiple network sensors in order to improve the quality of alert and recognize attack strategy
@artical{j552016ijcatr05051012,
Title = "A Proactive Approach in Network Forensic Investigation Process",
Journal ="International Journal of Computer Applications Technology and Research(IJCATR)",
Volume = "5",
Issue ="5",
Pages ="304 - 311",
Year = "2016",
Authors ="Joseph MbuguaChahira Jane KinanuKiruki Peter KipronoKemei"}
  • A review of digital forensic investigation frameworks
  • Summary of existing digital forensics framework based on type and limitation
  • Design consideration in developing network forensic investigation frameworks
  • Proposed Proactive Approach in Network Forensic Investigation Process