Risks and Solutions to Problems Arising from Illegal or Inappropriate On-line Behaviours: Two Core Debates Within Forensic Computing

Vlasti Broucek (Researcher) has been working in the computer industry since 1985 in various research and 'hands -on' positions. Currently, he is a researcher at the School of Information Systems, University of Tasmania and a network administrator at the School of Psychology, University of Tasmania, Australia. His current research interest is in Forensic Computing. He has extensive knowledge of systems administration on a range of systems (Novell Netware, Unix flavours); computer security, mathematics and Expert Systems. He has a MSc degree from the Czech Technical University in Prague and currently is pursuing a PhD at the University of Tasmania. Mailing address: School of Information Systems, GPO Box 252 -87, Hobart TAS 7001, Australia; Phone: +61 -3-62262346; Fax: +61 -3-62262883; E -mail: Vlasti.Broucek@utas.edu.au continued on page 2

[1]  Erland Jonsson,et al.  Anomaly-based intrusion detection: privacy concerns and other problems , 2000, Comput. Networks.

[2]  Kai Rannenberg,et al.  Pseudonymous audit for privacy enhanced intrusion detection , 1997, SEC.

[3]  Igor Hawryszkiewycz The role of information systems in information-level security management , 2001 .

[4]  Shyhtsun Felix Wu,et al.  Intrusion Detection for an On-Going Attack , 1999, Recent Advances in Intrusion Detection.

[5]  Mark Handley,et al.  Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.

[6]  Arianna Arona,et al.  Adding availability to log services of untrusted machines , 1999, Proceedings 15th Annual Computer Security Applications Conference (ACSAC'99).

[7]  Peter Grabosky,et al.  Computer Crime: A Criminological Overview , 2000 .

[8]  V. Broucek,et al.  Bridging the Divide : Rising Awareness of Forensic Issues amongst Systems Administrators , 2002 .

[9]  Broucek,et al.  Forensic Computing Developing a Conceptual Approach in the Era of Information Warfare , 2001 .

[10]  Joachim Biskup,et al.  On Pseudonymization of Audit Data for Intrusion Detection , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[11]  Jim Christy Rome laboratory attacks: prepared testimony of Jim Christy, Air Force Investigator, before the Senate Governmental Affairs Committee, Permanent Investigations Subcommittee, May 22, 1996 , 1997 .

[12]  Broucek,et al.  Developing a Conceptual Approach for an Emerging Academic Discipline , 2001 .

[13]  A. Patel,et al.  The impact of forensic computing on telecommunications , 2000 .

[14]  D. Denning Activism, Hacktivism, and Cyberterrorism: the Internet As a Tool for Influencing Foreign Policy , 2001 .

[15]  Rodney McKemmish,et al.  What is forensic computing , 1999 .

[16]  Thomas Henry Ptacek,et al.  Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection , 1998 .

[17]  M. P. F. C. A. J. Sammes BSc,et al.  Forensic Computing , 2000, Practitioner Series.

[18]  E. Jonsson,et al.  Combining fraud and intrusion detection-meeting new requirements - , 2000 .

[19]  Erland Jonsson,et al.  Privacy vs. Intrusion Detection Analysis , 1999, Recent Advances in Intrusion Detection.

[20]  P. Sommer Downloads, Logs and Captures: Evidence from Cyberspace , 1997 .

[21]  Paul Turner,et al.  A forensic computing perspective on the need for improved user education for information systems security management , 2002 .

[22]  Christopher Lueg The Role of Information Systems in Information-Level SecurityManagement , 2001 .

[23]  Peter Sommer,et al.  Intrusion detection systems as evidence , 1999, Comput. Networks.

[24]  Jim Bates Fundamentals of computer forensics , 1998, Inf. Secur. Tech. Rep..

[25]  Joachim Biskup,et al.  Threshold-based identity recovery for privacy enhanced applications , 2000, CCS.

[26]  Dan Farmer,et al.  Being prepared for intrusion , 2001 .