Abstract
One of the critical success factors of the cybercrime investigation is exact tracing back of hacker’s origin. However, criminals can easily modify or delete log files on victim machines. In addition, criminals can easily modify the source IP address so that network packet cannot be a strong evidence because it is easily spoofed. This study suggests a scheme for network forensic evidence generation and verification. This proposed scheme can show the attacker’s source location and guarantee the integrity of address fields. This scheme also can minimize the performance degradation of routers when generating forensic evidence via flow-based evidence traffic analysis.
Original language | English |
---|---|
Pages (from-to) | 261-273 |
Number of pages | 13 |
Journal | Telecommunication Systems |
Volume | 60 |
Issue number | 2 |
DOIs | |
Publication status | Published - 2015 Oct 28 |
Bibliographical note
Publisher Copyright:© 2015, Springer Science+Business Media New York.
Keywords
- IP traceback
- Network forensic
- Network forensic evidence
- Packet marking
ASJC Scopus subject areas
- Electrical and Electronic Engineering