MICIE: A model for identifying and collecting intrusion evidences
Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due to the threat of intrusions and misuse. Unfortunately, none of the existing systems...
Main Authors: | , |
---|---|
Format: | Conference or Workshop Item |
Language: | English English |
Published: |
IEEE
2017
|
Subjects: | |
Online Access: | http://umpir.ump.edu.my/id/eprint/18220/ http://umpir.ump.edu.my/id/eprint/18220/ http://umpir.ump.edu.my/id/eprint/18220/1/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences.pdf http://umpir.ump.edu.my/id/eprint/18220/2/MICIE-%20A%20Model%20for%20Identifying%20and%20Collecting%20Intrusion%20Evidences%201.pdf |
Summary: | Today it is very important to maintain an intermediary level of security to ensure safe and trusted communication for daily usage. Secured data communication over internet and any other network is hard to achieve due to the threat of intrusions and misuse. Unfortunately, none of the existing systems have proved to be flawless, though various approaches have been used to thwart network intrusion activities. This paper proposes an investigation Model for Identifying and Collecting Intrusion Evidences (MICIE). In particular, the proposed model MICIE comprises three main features, SNORT as IDS, MySQL as database and BASE for result viewing. These features were installed on Raspberry Pi, which was used to aid the data collection process. The results demonstrated that the proposed model is promising for identifying and collecting evidence of network intrusions in real time. |
---|