메뉴 건너뛰기




Volumn 2006, Issue , 2006, Pages 133-139

Embedding forensic capabilities into networks: Addressing inefficiencies in digital forensics investigations

Author keywords

Digital forensics; Life cycle; Network forensics; Networks

Indexed keywords

DIGITAL FORENSICS; NETWORK FORENSICS;

EID: 33846017674     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (22)

References (42)
  • 4
    • 33846013428 scopus 로고    scopus 로고
    • Dittrich, D. Basic Steps in Forensic Analysis of Unix Systems. Retrieved October 28, 2004 from the World Wide Web http://staff.washington. edu/dittrich/misc/forensics/
    • Dittrich, D. Basic Steps in Forensic Analysis of Unix Systems. Retrieved October 28, 2004 from the World Wide Web http://staff.washington. edu/dittrich/misc/forensics/
  • 5
    • 3242808612 scopus 로고    scopus 로고
    • CSI/FBI, Computer Security Institute, San Francisco, CA
    • [4a] CSI/FBI. (2005) CSI/FBI Computer Crime and Security Survey, Computer Security Institute, San Francisco, CA.
    • (2005) CSI/FBI Computer Crime and Security Survey
  • 7
    • 33845965918 scopus 로고    scopus 로고
    • Dittrich, D. Developing an Effective Incident Cost Analysis Mechanism, Security Focus, June 12, 2002. Retrieved August 14, 2005 from the World Wide Web: http://online.securityfocus.com/infocus/1592
    • Dittrich, D. Developing an Effective Incident Cost Analysis Mechanism, Security Focus, June 12, 2002. Retrieved August 14, 2005 from the World Wide Web: http://online.securityfocus.com/infocus/1592
  • 8
    • 33846013774 scopus 로고    scopus 로고
    • Endicott-Popovsky, B.E., (Spring '02) Lectures and Assignments: CSSE591 Computer Forensics: Seattle University, Seattle, WA.
    • Endicott-Popovsky, B.E., (Spring '02) Lectures and Assignments: CSSE591 Computer Forensics: Seattle University, Seattle, WA.
  • 10
    • 33845987258 scopus 로고    scopus 로고
    • Honeynet Project, Retrieved August 04, 2005, from the World Wide Web
    • Honeynet Project. (2001). Know Your Enemy II. Tracking the Blackhat's Moves. Retrieved August 04, 2005, from the World Wide Web: http://project.honeynet.org/papers/enemy2/index.html
    • (2001) Know Your Enemy II. Tracking the Blackhat's Moves
  • 11
    • 33846028608 scopus 로고    scopus 로고
    • Honeynet Project, Retrieved August 04, 2005, from the World Wide Web
    • Honeynet Project. (2000). Know Your Enemy III: They Gain Root. Retrieved August 04, 2005, from the World Wide Web: http://project.honeynet. org/papers/enemy3/index.html
    • (2000) Know Your Enemy III: They Gain Root
  • 12
    • 33846022189 scopus 로고    scopus 로고
    • New Zealand Herald, November 19, Retrieved August 13, 2005 from the World Wide Web
    • Barton, C. Hacker Destroys 4500 Web Sites, New Zealand Herald, November 19, 1998. Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mail-archive/1998/Nov/0098.html
    • (1998) Hacker Destroys 4500 Web Sites
    • Barton, C.1
  • 13
    • 33846012384 scopus 로고    scopus 로고
    • New Zealand Herald, November 23, Retrieved August 13, 2005 from the World Wide Web
    • Wall, T. Associates Denounce Website Hacker, New Zealand Herald, November 23, 1998. Retrieved August 13, 2005 from the World Wide Web: http://www.landfield.com/isn/mail-archive/1998/Nov/0098.html
    • (1998) Associates Denounce Website Hacker
    • Wall, T.1
  • 14
    • 33846031814 scopus 로고    scopus 로고
    • The (New Zealand) Press, December 01, Retrieved August 13, 2005 from the World Wide Web
    • Armstrong, D. Chch Fraud Squad out to Nail Hackers, The (New Zealand) Press, December 01, 1998. Retrieved August 13, 2005 from the World Wide Web: http://www.press.co.nz/48/981201c7.htm
    • (1998) Chch Fraud Squad out to Nail Hackers
    • Armstrong, D.1
  • 16
    • 33845982770 scopus 로고    scopus 로고
    • Real-World Access Control Systematic Failures: Reality or Virtual Reality
    • Ukraine
    • Attfield, P., Real-World Access Control Systematic Failures: Reality or Virtual Reality, in Journal Article Workshop, June '05, Ukraine.
    • Journal Article Workshop, June '05
    • Attfield, P.1
  • 17
    • 33846015694 scopus 로고    scopus 로고
    • Seattle FBI Briefing: Operation Flyhook
    • April 18, Seattle, WA
    • Schuler, M and P. Attfield. (April 18, 2002). Seattle FBI Briefing: Operation Flyhook, Boeing Security Forum, Seattle, WA.
    • (2002) Boeing Security Forum
    • Schuler, M.1    Attfield, P.2
  • 18
    • 84866671794 scopus 로고    scopus 로고
    • From Russia with Lopht
    • May 1, Retrieved August 7, 2005 from the World Wide Web
    • Koerner, B. From Russia with Lopht. Legal Affairs, May 1, 2002. Retrieved August 7, 2005 from the World Wide Web: http://www. newamerica.net/index.cfm?pg=article&DocID=792
    • (2002) Legal Affairs
    • Koerner, B.1
  • 19
    • 33846000140 scopus 로고    scopus 로고
    • United States. Department of Justice. Court proceedings and public-record trial exhibits, United States v. Vasily Gorshkov. Seattle, WA, September 2001.
    • United States. Department of Justice. Court proceedings and public-record trial exhibits, United States v. Vasily Gorshkov. Seattle, WA, September 2001.
  • 20
    • 33846028974 scopus 로고    scopus 로고
    • United States. Department of Justice. Press Release: Russian Hacker Sentenced. Newark, NJ, July 25, 2003. Retrieved August 7, 2005 from the World Wide Web: http://www.usdoj.gov/criminal/cybercrime/ivanovSent_NJ.htm
    • United States. Department of Justice. Press Release: Russian Hacker Sentenced. Newark, NJ, July 25, 2003. Retrieved August 7, 2005 from the World Wide Web: http://www.usdoj.gov/criminal/cybercrime/ivanovSent_NJ.htm
  • 22
    • 33845972480 scopus 로고    scopus 로고
    • Simon, M. Seminar in Data Security. Preston Gates: Seattle, WA, March 2, 2005.
    • Simon, M. Seminar in Data Security. Preston Gates: Seattle, WA, March 2, 2005.
  • 23
    • 33845981681 scopus 로고    scopus 로고
    • Ellison, R.J., Mead, N.R., Longstaff, T.A. and R.C. Linger. (No Date) The Survivability Imperative: Protecting Critical Systems. Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
    • Ellison, R.J., Mead, N.R., Longstaff, T.A. and R.C. Linger. (No Date) The Survivability Imperative: Protecting Critical Systems. Software Engineering Institute, Carnegie-Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
  • 24
    • 33846025858 scopus 로고    scopus 로고
    • CERT Coordination Center. (no date). The Survivable Network Analysis Method: Assessing Survivability of Critical Systems. Presentation: Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
    • CERT Coordination Center. (no date). The Survivable Network Analysis Method: Assessing Survivability of Critical Systems. Presentation: Software Engineering Institute, Carnegie Mellon University, Pittsburgh, PA. Retrieved October 10, 2003 from the World Wide Web: http://www.cert.org
  • 25
    • 33846011711 scopus 로고    scopus 로고
    • Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A. and. N.R. Mead. (May, 1999). Survivable Network Systems: An Emerging Discipline. CMU/SEI 97-TR-013, Software Engineering Institute, Camegie-Mellon University, Pittsburgh, PA.
    • Ellison, R.J., Fisher, D.A., Linger, R.C., Lipson, H.F., Longstaff, T.A. and. N.R. Mead. (May, 1999). Survivable Network Systems: An Emerging Discipline. CMU/SEI 97-TR-013, Software Engineering Institute, Camegie-Mellon University, Pittsburgh, PA.
  • 27
    • 33845965558 scopus 로고    scopus 로고
    • Endicott-Popovsky, B.E., Frincke, D. (2006, January 4). Adding the Fourth 'R': A Systems Approach to Solving the Hacker's Arms Race. Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symbiosis, Kauai, HI, Retrieved January 4, 2006 from the World Wide Web: http://www.itl.nist.gov/iaui/vvrg/hicss39/.
    • Endicott-Popovsky, B.E., Frincke, D. (2006, January 4). Adding the Fourth 'R': A Systems Approach to Solving the Hacker's Arms Race. Hawaii International Conference on System Sciences (HICSS) 39 Symposium: Skilled Human-intelligent Agent Performance: Measurement, Application and Symbiosis, Kauai, HI, Retrieved January 4, 2006 from the World Wide Web: http://www.itl.nist.gov/iaui/vvrg/hicss39/.
  • 28
  • 30
    • 85046981963 scopus 로고    scopus 로고
    • New Directions in Cyber Law. Paper
    • June, Presented at the, Washington, D.C
    • th Colloquium. Washington, D.C.
    • (2003) th Colloquium
    • Ryan, D.1
  • 35
    • 1942505732 scopus 로고    scopus 로고
    • Wolfe-Wilson, J. and Wolfe, H.B. (2003) Management Strategies for Implementing Forensic Security Measures [electronic version]. Information Security Technical Report 8, Issue 2, June 2003, pp.55-64.
    • Wolfe-Wilson, J. and Wolfe, H.B. (2003) Management Strategies for Implementing Forensic Security Measures [electronic version]. Information Security Technical Report Volume 8, Issue 2, June 2003, pp.55-64.
  • 36
    • 33846032502 scopus 로고    scopus 로고
    • Carrier, B. and Spafford, E. Getting Physical with the Digital Investigation Process, International Journal of Digital Evidence, 2, 2 [Electronic version] Fall 2003.
    • Carrier, B. and Spafford, E. Getting Physical with the Digital Investigation Process, International Journal of Digital Evidence, vol. 2, 2 [Electronic version] Fall 2003.
  • 38
    • 33846001522 scopus 로고    scopus 로고
    • Personal Interview in Syracuse, New York, July 12, 2005
    • Pollit, M. Personal Interview in Syracuse, New York. (July 12, 2005).
    • Pollit, M.1
  • 40
    • 33846004296 scopus 로고    scopus 로고
    • Personal Interviews, March 31, 2006
    • Bailey, K., Winn, J. Personal Interviews, March 31, 2006
    • Bailey, K.1    Winn, J.2
  • 41
    • 3042774608 scopus 로고    scopus 로고
    • Building Theoretical Underpinnings for Digital Forensics Research
    • Mocas, S., (2004). Building Theoretical Underpinnings for Digital Forensics Research, Compsec Online: Digital Investigations. Vol. 1, Issue 1.
    • (2004) Compsec Online: Digital Investigations , vol.1 , Issue.1
    • Mocas, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.