A FORENSIC READINESS MODEL FOR WIRELESS NETWORKS

作者: Sipho Ngobeni , Hein Venter , Ivan Burke

DOI: 10.1007/978-3-642-15506-2_8

关键词:

摘要: Over the past decade, wireless mobile communications technology based on IEEE 802.11 local area networks (WLANs) has been adopted worldwide a massive scale. However, as number of users soared, so possibility cyber crime, where criminals deliberately and actively break into WLANs with intent to cause harm or access sensitive information. WLAN digital forensics is seen not only response crime in environments, but also means stem increase WLANs. The challenge intercept preserve all generated by devices conduct proper forensic investigation. This paper attempts address this issue proposing readiness model designed help monitor, log network traffic for investigations. A prototype implementation presented proof concept.

参考文章(12)
Derrick Dicoi, Cyrus Tibbs, Karen A. Scarfone, Matthew Sexton, SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks National Institute of Standards & Technology. ,(2008)
Robert Rowlingson, A Ten Step Process for Forensic Readiness. International Journal of Digital Evidence. ,vol. 2, ,(2004)
Keion Clinton, Guillermo A. Francia, Computer forensics laboratory and tools Journal of Computing Sciences in Colleges. ,vol. 20, pp. 143- 150 ,(2005) , 10.5555/1060405.1060428
Emmanuel Velasco, Weifeng Chen, Ping Ji, Raymond Hsieh, Wireless Forensic: A New Radio Frequency Based Locating System Intelligence and Security Informatics. pp. 272- 277 ,(2008) , 10.1007/978-3-540-69304-8_27
Jill Slay, Benjamin Turnbull, The 802.11 Technology Gap - Case Studies in Crime ieee region 10 conference. pp. 1- 7 ,(2005) , 10.1109/TENCON.2005.300890
Barbara Endicott-Popovsky, Deborah A. Frincke, Carol A. Taylor, A theoretical framework for organizational network forensic readiness Journal of Computers. ,vol. 2, pp. 1- 11 ,(2007) , 10.4304/JCP.2.3.1-11
Donghyuk Yim, Jae-Yoon Lim, Seunghwan Yun, Sun-Hee Lim, Okyeon Yi, Jongin Lim, The Evidence Collection of DoS Attack in WLAN by Using WLAN Forensic Profiling System international conference on information systems security. pp. 197- 204 ,(2008) , 10.1109/ICISS.2008.8
Benjamin Turnbull, Jill Slay, Wi-Fi Network Signals as a Source of Digital Evidence: Wireless Network Forensics availability, reliability and security. pp. 1355- 1360 ,(2008) , 10.1109/ARES.2008.135