Internet forensics on the basis of evidence gathering with Peep attacks

  • Authors:
  • Shiuh-Jeng Wang;Da-Yu Kao

  • Affiliations:
  • Department of Information Management, Central Police University, Taoyuan, Taiwan;Criminal Investigation Unit, Department of Crime Prevention and Corrections, Central Police University, Taoyuan, Taiwan

  • Venue:
  • Computer Standards & Interfaces
  • Year:
  • 2007

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Peep attack is a variant application of a Botnet. This paper proposes a forensic procedure to analyze the attack behavior and explains how to carry out a computer crime investigation. We also discuss the well-known Botnets engaged in the execution of a Peep attack. In our paper, we describe a Peep attack on the Internet as the paradigm of how a cyber-investigator needs to act in the case of a Cybercrime. When cyber detectives prepare to investigate a break in cyber security, there are some issues they must keep in mind and face up to. It is crucial to swiftly preserve digital evidence and conduct forensic analysis that any useful evidence is seized soon after the cybercrime has been committed. Furthermore, there are two phases of digital forensic analysis to retrieve useful evidence when facing a cybercrime attack in our scheme. One phase observes the Internet attack action, and the other one introduces how to investigate each case in on-line analysis of sniffing packets and off-line examination of abnormal files. We believe that this analysis model is workable for any other form of Botnets presently being used.