Skip to content

Advertisement

Advances in Digital Forensics

Societies in today’s world are becoming more and more dependent on open networks such as Internet where commercial activities, business transactions and government services are realized. This has led to the fast development of new cyber threats and information security issues which are utilized by cyber criminals. Mistrust for telecommunications and computer network technologies have tremendous socio-economic impacts on global enterprises as well as individuals.

Moreover, the occurrence of international frauds often requires the investigation of facts that occur across international borders. They are also often subject to different jurisdictions and legal systems. The increased complexity of the communication and networking infrastructure is making investigation of the crimes difficult. Clues of illegal digital activities are often buried in large volumes of data that is hard to inspect in order to detect crimes and collect evidence.

Edited by: Amir Houmansadr, Wojciech Mazurczyk, Krzysztof Szczypiorski and Hui Tian

  1. Content type: Research

    Cyber security attacks are becoming ever more frequent and sophisticated. Enterprises often deploy several security protection mechanisms, such as anti-virus software, intrusion detection/prevention systems, a...

    Authors: Xin Hu, Ting Wang, Marc Ph Stoecklin, Douglas L Schales, Jiyong Jang and Reiner Sailer

    Citation: EURASIP Journal on Information Security 2014 2014:17

    Published on:

  2. Content type: Research

    Domain Name System (DNS) cache poisoning is a stepping stone towards advanced (cyber) attacks. DNS cache poisoning can be used to monitor users’ activities for censorship, to distribute malware and spam and to...

    Authors: Haya Shulman and Michael Waidner

    Citation: EURASIP Journal on Information Security 2014 2014:16

    Published on:

  3. Content type: Research

    The distributed and decentralized nature of peer-to-peer (P2P) networks has offered a lucrative alternative to bot-masters to build botnets. P2P botnets are not prone to any single point of failure and have be...

    Authors: Pratik Narang, Chittaranjan Hota and VN Venkatakrishnan

    Citation: EURASIP Journal on Information Security 2014 2014:15

    Published on: