E-Cyborg: The cybercrime evidence finder

Today, cybercriminal activity has grown terrifically as there are growing numbers of internet users and also social networking site. The victim are not limited to adult but also child, not only involve personal attack but also involve the organization or country. The need for finding evidence is crucial as cybercrimes are also need to be treated as physical crimes. In this paper we discuss a mechanism to find cyber evidence that integrate Intrusion Detection System (IDS) and firewall system called Evidence Cyborg (E-Cyborg). E-Cyborg is to provide a solution that can assist network forensic in their cybercrime case. Based on several testing on the system simulation, the system is able to produce high quality of evidence. Hence, the investigation task becomes more efficient and effective.

[1]  Tinghua Wang,et al.  Network forensics based on fuzzy logic and expert system , 2009, Comput. Commun..

[2]  U. S. Nij Forensic Examination of Digital Evidence: A Guide for Law Enforcement , 2013 .

[3]  Jongin Lim,et al.  The Evidence Collection of DoS Attack in WLAN by Using WLAN Forensic Profiling System , 2008, 2008 International Conference on Information Science and Security (ICISS 2008).

[4]  Jau-Hwang Wang,et al.  Cyber Forensics: Issues and Approaches , 2005 .

[5]  Jong-Ho Park,et al.  An Efficient Forensic Evidence Collection Scheme of Host Infringement at the Occurrence Time , 2006, ICISC.

[6]  Moses Garuba,et al.  Intrusion Techniques: Comparative Study of Network Intrusion Detection Systems , 2008, Fifth International Conference on Information Technology: New Generations (itng 2008).

[7]  Richard A. Wasniowski Multi-sensor agent-based intrusion detection system , 2005, InfoSecCD '05.

[8]  Erin E. Kenneally,et al.  Risk sensitive digital evidence collection , 2005, Digit. Investig..

[9]  Tom Killalea,et al.  Guidelines for Evidence Collection and Archiving , 2002, RFC.

[10]  Tao Li,et al.  Dynamical Network Forensics Based on Immune Agent , 2007, Third International Conference on Natural Computation (ICNC 2007).

[11]  Jeroen Keppens,et al.  Probabilistic abductive computation of evidence collection strategies in crime investigation , 2005, ICAIL '05.

[12]  Martin R. Stytz,et al.  Security in computing, 3rd ed. [Book Review] , 2003, IEEE Security & Privacy Magazine.

[13]  Zhang Jun,et al.  MADIDS: a novel distributed IDS based on mobile agent , 2003 .