Title :
Dynamic Network Forensic Based Plug-In Architecture
Author :
Wang, Wenqi ; Li, Yong
Author_Institution :
Coll. of Comput. Sci., Zhongyuan Univ. of Technol., Zhengzhou, China
Abstract :
Considering on judicial forensic requirements and the character of network crime diversity, a architecture based on XML and plug-in techniques is proposed in this paper. The framework adopts encrypt and authentication technology which ensures collected evidence can be accepted by court, so the original evidence in framework is stability. Because of the network applicationpsilas diversity, the judgment whether the network packet need collect is implemented by plug-in. Finally, based on the framework, the forensic on specifically information and hacker attack are implemented, in which the analyzing of hacker attack forensic adapts intrusion detection system such as snort, consequently, feasibility of architecture is proved by experiment.
Keywords :
XML; computer crime; message authentication; XML; authentication technology; dynamic network judicial forensic requirement; encryption; hacker attack; intrusion detection system; network crime diversity; plug-in architecture; Algorithm design and analysis; Computer architecture; Computer hacking; Computer network management; Conference management; Data analysis; Forensics; Intrusion detection; Stability; Technology management; forensic framework; intrusion forensic; plug-in techniques;
Conference_Titel :
Management of e-Commerce and e-Government, 2009. ICMECG '09. International Conference on
Conference_Location :
Nanchang
Print_ISBN :
978-0-7695-3778-8
DOI :
10.1109/ICMeCG.2009.122