Int. J. of Internet Technology and Secured Transactions   »   2012 Vol.4, No.2/3

 

 

Title: A comparative study of attributes for gathering admissible evidence in the investigation of distributed denial of service (DDoS) attacks

 

Author: Joshua Ojo Nehinbe

 

Address: School of Computer Science and Electronic Engineering Systems, University of Essex, CO4 3SQ, Colchester, UK

 

Abstract: Global crises have widened the scope of criminal activities that intruders commit on computer networks. However, available litigations to charge intruders are ineffective because most electronic evidence obtained from intrusion logs are inadmissible in several courts of law. Therefore, this paper critically discusses the concept of admissible evidence in courts of law and how forensics experts can extract them from intrusion logs. This paper also discusses a model that adopts information theory to reclassify attributes of intrusions that are used to extract admissible evidence. Evaluations demonstrate that majority of the attributes of distributed denial of service attacks are less informative. The results suggest that type of service, TCP flags, TTL, length of packet, destination IP address, TCP acknowledgement and IP protocol are less informative while source addresses, destination port address and timestamp are informative attributes for forensics investigation of distributed denial of service attacks investigated in this paper.

 

Keywords: network forensics; intrusion logs; IDS; admissible evidence; e-criminals; online crime; distributed denial of service; DDoS attacks; information theory; digital forensics; intrusion detection systems.

 

DOI: 10.1504/IJITST.2012.047958

 

Int. J. of Internet Technology and Secured Transactions, 2012 Vol.4, No.2/3, pp.121 - 138

 

Submission date: 16 Sep 2011
Date of acceptance: 16 Mar 2012
Available online: 16 Jul 2012

 

 

Editors Full text accessAccess for SubscribersPurchase this articleComment on this article