One of the critical success factors of the cybercrime investigation is exact tracing back of hacker’s origin. However, criminals can easily modify or delete log files on victim machines. In addition, criminals can easily modify the source IP address so that network packet cannot be a strong evidence because it is easily spoofed. This study suggests a scheme for network forensic evidence generation and verification. This proposed scheme can show the attacker’s source location and guarantee the integrity of address fields. This scheme also can minimize the performance degradation of routers when generating forensic evidence via flow-based evidence traffic analysis.
Bibliographical notePublisher Copyright:
© 2015, Springer Science+Business Media New York.
- IP traceback
- Network forensic
- Network forensic evidence
- Packet marking
ASJC Scopus subject areas
- Electrical and Electronic Engineering