A Mutli-Agent System for Firewall Forensics Analysis

نویسندگان

  • Hassina Bensefia
  • Bachir El Ibrahimi
چکیده

Computer Forensics applies law to fight against unlawful and illegitimate use of computers and networks. It employs investigation methods to solve computer crimes. Knowing that the firewall is the unique input and output in a network, it is considered as the ideal location for recording network activities. The firewall log files trace all incoming and outgoing events in a network. Its content can include details about attacks and penetration attempts in the network. For this reason firewall forensics becomes a principal branch in computer forensics field. It uses the firewall log files content so as a source of evidence to lead an investigation in the aim to identify computer attacks. The investigation in firewall forensics consists of analyzing and interpreting the relevant information related to computer attacks which is contained in firewall log files. But the log files content is generally mysterious and difficult to decode. Its interpretation requires a qualified expertise. This paper proposes an intelligent system that automates the firewall forensics process and helps the security administrator to manage, exploit and interpret the firewall log files content. This system will assist the security administrator to make suitable decisions and judgments during the investigation step.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Computer Forensics Approach Based on Autonomous Intelligent Multi-Agent System

Due to the impact of wireless sensor networks (WSN) on dramatic reduction in computational and energy resources, research on the implications of this type of networks would be considered as a deliberate and update point. One of the main issues in these networks is the security. During transfer of data from source nodes to sink nodes or vice versa, many WSNs require applications to protect data ...

متن کامل

Distributed Network Forensics Framework: A Systematic Review

Network forensics is a branch of digital forensics, which applies to network security. It is used to relate monitoring and analysis of the computer network traffic, that helps us in collecting information and digital evidence, for the protection of network that can use as firewall and IDS. Firewalls and IDS can't always prevent and find out the unauthorized access within a network. This pa...

متن کامل

The Utility of Inconsistency in Information Security and Digital Forensics

Inconsistency in knowledge, information and data is ubiquitous. Inconsistency can be used as a very effective tool in accomplishing the objectives in information security and digital forensics. In this paper, our focus is on the utilities of inconsistency in those areas: access control lists in firewalls, intrusion detection systems, operating system access control mechanisms, deception based d...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

The Honeynet Files

System and file analysis An important part of honeypot forensics is system analysis, which we can do without any prior knowledge of the results obtained from network analysis. The system provides information in many ways: in system logs, in normal or enhanced logs generated with a syslogd-like service (such as a firewall, security, kernel, and so on), or from the tools the intruder uses (which ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011