MICIE: A model for identifying and collecting intrusion evidences

Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due to the threat of intrusions and misuse. Unfortunately, none of the existing systems...

Full description

Bibliographic Details
Main Authors: Ahmed, Abdulghani Ali, Kit, Yee Wai
Format: Conference or Workshop Item
Language:English
English
Published: IEEE 2017
Subjects:
Online Access:http://umpir.ump.edu.my/id/eprint/18220/
http://umpir.ump.edu.my/id/eprint/18220/
http://umpir.ump.edu.my/id/eprint/18220/1/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences.pdf
http://umpir.ump.edu.my/id/eprint/18220/2/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences%201.pdf
Description
Summary:Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due to the threat of intrusions and misuse. Unfortunately, none of the existing systems have proved to be flawless, though various approaches have been used to thwart network intrusion activities. This paper proposes an investigation Model for Identifying and Collecting Intrusion Evidences (MICIE). In particular, the proposed model MICIE comprises three main features, SNORT as IDS, MySQL as database and BASE for result viewing. These features were installed on Raspberry Pi, which was used to aid the data collection process. The results demonstrated that the proposed model is promising for identifying and collecting evidence of network intrusions in real time.