Finding forensic evidence for several web attacks
نویسندگان
چکیده
منابع مشابه
Finding Digital Forensic Evidence in Graphic Design Applications
Graphic design applications are often used for the editing and design of digital art. The same applications can be used for creating counterfeit documents like identity documents (IDs), driver’s licenses or passports among others. However the use of any graphic design application leaves behind traces of digital information which can be used during a digital forensic investigation. Current digit...
متن کاملFinding Community Base on Web Graph Clustering
Search Pointers organize the main part of the application on the Internet. However, because of Information management hardware, high volume of data and word similarities in different fields the most answers to the user s’ questions aren`t correct. So the web graph clustering and cluster placement in corresponding answers helps user to achieve his or her intended results. Community (web communit...
متن کاملNetwork Forensic System for ICMP Attacks
Network forensics is capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. This paper addresses the major challenges in collection, examination and analysis processes. We propose a model for collecting network data, identifying suspicious packets, examining protocol features misused and validating the attack. This mode...
متن کاملRelation between CBC Finding and BH attacks in children
ABSTRACT Breath holding (B.H) attacks is one of the most common problem in children that disturbs their parents. With respect to the presence of discrepancies between anemia and iron therapy in this condition, this study designed for evaluation the relation of C.B.C findings and B.H attacks. This analytical case-control study was done on 86 patients under 6 years old who referred to outpatien...
متن کاملForensic Evidence Identification and Modeling for Attacks against a Simulated Online Business Information System
Forensic readiness of business information systems can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business fraud. To establish forensics readiness, it is essential for an organization to identify which fingerprints are relevant and where they can be located, to determine whether they are logged in a forensically sound wa...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Internet Technology and Secured Transactions
سال: 2015
ISSN: 1748-569X,1748-5703
DOI: 10.1504/ijitst.2015.073938