Computer Forensics and Investigations
Computer Forensics and Investigations
Ethereal Packet Sniffing
Cybercrime Treaty Could Chill Research
IEEE Security and Privacy
Honeypot Forensics Part I: Analyzing the Network
IEEE Security and Privacy
Incident Response & Computer Forensics, 2nd Ed.
Incident Response & Computer Forensics, 2nd Ed.
Digital "Evidence" and Reasonable Doubt
IEEE Security and Privacy
IEEE Security and Privacy
IEEE Security and Privacy
A regular expression matching engine with hybrid memories
Computer Standards & Interfaces
Hi-index | 0.00 |
The Peep attack is a variant application of a Botnet. This paper proposes a forensic procedure to analyze the attack behavior and explains how to carry out a computer crime investigation. We also discuss the well-known Botnets engaged in the execution of a Peep attack. In our paper, we describe a Peep attack on the Internet as the paradigm of how a cyber-investigator needs to act in the case of a Cybercrime. When cyber detectives prepare to investigate a break in cyber security, there are some issues they must keep in mind and face up to. It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme. One phase observes the Internet attack action, and the other one introduces how to investigate each case in on-line analysis of sniffing packets and off-line examination of abnormal files. We believe that this analysis model is workable for any other form of Botnets presently being used.