Trusted Internet Forensics: design of a network forensics appliance

被引:0
|
作者
Bruschi, D. [1 ]
Monga, M. [1 ]
Rosti, E. [1 ]
机构
[1] Univ Milan, Dip Informat & Comunicaz, I-20122 Milan, Italy
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the spreading of cyber-crime, computer forensics has emerged as a new discipline in the system security arena. Some work is being done towards the definition of methodologies for the collection of digital evidences from storage devices that can withstand legal analysis in court. On the contrary, the collection of network evidences that allows for a selection of the traffic and guarantees legal admissibility is still an open field. In this paper we present the architecture of TIF, Trusted Internet Forensics, a network appliance that collects data from the network for forensics purposes. Such an appliance relies on a Trusted Computing Platform in order to allow for the verification of the computational chain so that the data collected could be used as evidence in court.
引用
收藏
页码:35 / 37
页数:3
相关论文
共 50 条
  • [1] The discipline of Internet forensics
    Berghel, H
    [J]. COMMUNICATIONS OF THE ACM, 2003, 46 (08) : 15 - 20
  • [2] Internet forensics.
    Wilson, TD
    [J]. INFORMATION RESEARCH-AN INTERNATIONAL ELECTRONIC JOURNAL, 2006, 11 (02):
  • [3] A New System Design of Network Invasion Forensics
    Hou Ming
    Shen LiZhong
    [J]. SECOND INTERNATIONAL CONFERENCE ON COMPUTER AND ELECTRICAL ENGINEERING, VOL 2, PROCEEDINGS, 2009, : 596 - +
  • [4] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    [J]. ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
  • [5] Future Digital Forensics in an Advanced Trusted Environment
    Maybaum, Markus
    Toelle, Jens
    [J]. PROCEEDINGS OF THE 15TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS 2016), 2016, : 212 - 220
  • [6] Internet of Things Forensics: A Review
    Atlam, Hany F.
    Hemdan, Ezz El-Din
    Alenezi, Ahmed
    Alassafi, Madini O.
    Wills, Gary B.
    [J]. INTERNET OF THINGS, 2020, 11
  • [7] Internet forensics and cyber terrorism
    Antolis, Krunoslav
    [J]. POLICIJA I SIGURNOST-POLICE AND SECURITY, 2010, 19 (01): : 121 - 128
  • [8] PACKTER: implementation of internet traffic visualizer and extension for network forensics
    Daisuke Miyamoto
    Takuji Iimura
    [J]. Computing, 2014, 96 : 79 - 80
  • [9] PACKTER: implementation of internet traffic visualizer and extension for network forensics
    Miyamoto, Daisuke
    Iimura, Takuji
    [J]. COMPUTING, 2014, 96 (01) : 79 - 80
  • [10] Challenges in Network forensics
    Buric, J.
    Delija, D.
    [J]. 2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386