Nowadays, web applications are popular targets for security attackers. Using specific security mechanisms, we can prevent or detect a security attack on a web application, but we cannot find out the criminal who has carried out the security attack. Being unable to trace back an attack, encourages hackers to launch new attacks on the same system. Web application forensics aims to trace back and attribute a web application security attack to its originator. This may significantly reduce the security attacks targeting a web application every day, and hence improve its security. The aim of this paper is to carry out a detailed overview about the web application forensics. First, we define the web applications forensics, and we present a taxonomic structure of the digital forensics. Then, we present the methodology of a web application forensics investigation. After that, we illustrate the forensics supportive tools for a web application forensics investigation. After that, we present a detailed presentation of a set of the main considered web application forensics tools. Finally, we provide a comparison of the main considered web application forensics tools.
[1]
Ramlan Mahmoud,et al.
Digital forensics trends and future
,
2013
.
[2]
Kumar Vimal,et al.
Self Alteration Detectable Image Log File for Web Forensics
,
2011
.
[3]
Seyyed Yasser hashemi,et al.
Security, Privacy and Trust Challenges in Cloud Computing and Solutions
,
2014
.
[4]
Huwida E. Said,et al.
Database forensics
,
2010,
InfoSecCD.
[5]
Ann Fry,et al.
A Forensic Web Log Analysis Tool: Techniques and Implementation
,
2011
.
[6]
Ivan Ristic,et al.
Apache Security
,
2005
.
[7]
Natarajan Meghanathan,et al.
Tools and techniques for Network Forensics
,
2010,
ArXiv.