Internet Forensics Based On Evidence Gathered With Peep Attacks

Masters
Essay
Miscellaneous
Pages 15 (3765 words)
Download 0
The Peep attack is a variant application of a Botnet. This paper proposes a forensic procedure to analyze the attack behavior and explains how to carry out a computer crime investigation. We also discuss the well-known Botnets engaged in the execution of a Peep attack…

Introduction

It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme. One phase observes the Internet attack action, and the other one introduces how to investigate each case in on-line analysis of sniffing packets and off-line examination of abnormal files. We believe that this analysis model is workable for any other form of Botnets presently being used.
Cybercrime has been cited as one of the most prevalent problems in society. The vast majority of investigators perceive this crime to be on the rise and of becoming an ever increasingly complex and multi-faceted problem. This paper attempts to clarify the complex investigation effort following a Peep attack. We describe evidence collection and problem-solving techniques in the application of computer forensic analyses. A Peep attack is one of the most notorious hacking tools, based on the Robot Network (Botnet) Structure. A Botnet is a term for a collection of zombie systems and autonomous software robots. The threat from Botnets is growing at an alarming rate and the attack techniques are becoming increasingly sophisticated. ...
Download paper
Not exactly what you need?

Related papers

Nursing Evidence Based Practice
Without resolution, rancor between opponents and supporters to the practice would continue to divide the profession. The selected literature would give valuable insights on the current situation of evidence based nursing practice. Moreover, both sides of the opposing groups would be given due consideration to give the reader a balanced view on the issues.…
Evidence Based Youth Policy
The necessity for systematic investigation on youth issues headed to an array of activities within the Council of Europe. The "Recommendation 92 (7)" of the Committee of Ministers specifies three broad objectives for youth policy. The White Paper of Commission "A new impetus for European youth" deals elaborately about the priorities of youths and proposes following objectives:…
Computer Forensics
We live in borderless world. Although people our bounded by geographic terrain, the World Wide Web has made it possible for people to connect with each other with a click of the mouse. Truly, this is a wonderful world to live.…
Evidence-based Practice in Healthcare
It is now a nursing competence criterion to rely on and implement best evidence available from relevant research to devise the care plan. This is expected to base on critical review of research and synthesis of evidence which can be used to justify practice (Simko, 2005).…
Evidence Based Medicine
They point out that the journals have a scholarly rather than practical approach to solving clinical matters at hand, (Department of Medical Sociology, 1998).…
Internet Forensics Based On Evidence Gathered With Peep Attacks
It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme. One phase observes the Internet attack action, and the other one introduces how to investigate each…
Evidence Based Research Article
No hypotheses were stated. The research question was not categorically stated but could be inferred from the background given, and it is this: What factors influence the risk of human immunodeficiency virus (HIV) infection after percutaneous exposure to HIV-infected blood…