A Survey : Server timeline analysis for web forensics
2013
Abstract
This paper describes an extensive study on the existing methods and techniques for the web server analysis. The web server analysis is important in forensic study as it analyses the web log files to discover user-accessing patterns of web pages. In order to effectively manage and report on a website related to any miss happening, it is necessary to get feedback about activity on the web servers. The aim of this study is to help the web designer and web administrator to improve the impressiveness of a website by determining occurred link connections on the website. Therefore, web logs files are pre- processed and then path analysis technique is used to investigate the URL information concerning access to electronic sources. The proposed methodology is applied to the web log files in the web server. The results and findings of this experimental study will be used by the forensic investigators for the investigative purpose. On the other side, the proposed timeline analysis can be used ...
References (39)
- K. Coar and D. Robinson. The WWW Common Gateway Interface, Version 1.1. Internet Draft, June 1999.
- J. Liberty and D. Hurwitz. Programming ASP.NET. O'REILLY, February 2002
- Security Tracker. Vulnerability statistics April 2001-march 2002. http://www.securitytracker.com/learn/statistics.htm l, April 2002.
- CERT/CC. "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA-2001-19, July 2001.
- M. Roesch. Snort -Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, November 1999.
- Carrier, B.D., Spafford, E.H.: Defining event reconstruction of digital crime scenes. J. Forensic Sci. 49 (2004)
- Carrier, B.: An event-based digital forensic investigation framework. In: Digital forensic research workshop (2004) REFERENCES
- K. Coar and D. Robinson. The WWW Common Gateway Interface, Version 1.1. Internet Draft, June 1999.
- J. Liberty and D. Hurwitz. Programming ASP.NET. O'REILLY, February 2002
- Security Tracker. Vulnerability statistics April 2001-march 2002. http://www.securitytracker.com/learn/statistics.htm l, April 2002.
- CERT/CC. "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA-2001-19, July 2001.
- M. Roesch. Snort -Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, November 1999.
- Carrier, B.D., Spafford, E.H.: Defining event reconstruction of digital crime scenes. J. Forensic Sci. 49 (2004)
- Carrier, B.: An event-based digital forensic investigation framework. In: Digital forensic research workshop (2004) REFERENCES
- K. Coar and D. Robinson. The WWW Common Gateway Interface, Version 1.1. Internet Draft, June 1999.
- J. Liberty and D. Hurwitz. Programming ASP.NET. O'REILLY, February 2002
- Security Tracker. Vulnerability statistics April 2001-march 2002. http://www.securitytracker.com/learn/statistics.htm l, April 2002.
- CERT/CC. "Code Red Worm" Exploiting Buffer Overflow In IIS Indexing Service DLL. Advisory CA-2001-19, July 2001.
- M. Roesch. Snort -Lightweight Intrusion Detection for Networks. In Proceedings of the USENIX LISA '99 Conference, November 1999.
- Carrier, B.D., Spafford, E.H.: Defining event reconstruction of digital crime scenes. J. Forensic Sci. 49 (2004)
- Carrier, B.: An event-based digital forensic investigation framework. In: Digital forensic research workshop (2004)
- Chisum, W.J., Turvey, B.E.: Evidence dynamics: Locard's exchange principle crime reconstruction. J. Behav. Profiling 1(1) (2000)
- W. Vogels, "Eventually Consistent," ACM Queue, 4 Dec. 2008; http://queue.acm.org/detail.cfm?id=1466448.
- Stephenson, P.: Formal modeling of post-incident root cause analysis. Int. J. Digit. Evid. 2 (2003)
- Gladyshev, P., Patel, A.: Finite state machine approach to digital event reconstruction. Digit. Invest. 1 (2004)
- Stallard, T.B.:Automated analysis for digital forensic science. Master's thesis, University of California, Davis (2002)
- Stallard,T.,Levitt,K.N.:Automated analysis for digital forensic science: Semantic integrity checking. In: ACSAC 160-169 (2003)
- Abbott, J., Bell, J., Clark, A., Vel, O.D., Mohay, G.: Automated recognition of event scenarios for digital forensics. In: SAC '06: Proceedings of the 2006 ACM symposium on applied computing pp. 293-300.ACMPress,NewYork (2006)
- Elsaesser, C., Tanner, M.C.: Automated diagnosis for computer forensics. Technical report, The MITRE Corporation (2001)
- Neuhaus, S., Zeller, A.: Isolating intrusions by automatic experiments. In: Proceedings of the 13th annual network and distributed system security symposium. pp. 71-80 (2006)
- Khan M, Chatwin C, Young R. A framework for post-event timeline reconstruction using neural networks. Digital Investigation 2007;4: 146-57.
- Olsson J, Boldt M. Computer forensic timeline visualization tool. Digital Investigation 2009;6(S1):S78-87.
- Guðjónsson K. Mastering the super timeline with log2timeline. SANS Reading Room; 2010.
- Bunting. EnCE study guide; 2008. pp. 235-237.
- Carbone R, Bean C. Generating computer forensic super-timelines under Linux; 2011.
- Buchholz F, Falk C. In: DFRWS, editor. Design and implementation of Zeitline: a forensic timeline; 2005
- Mr.Sushilkumar Chavhan, Ms.S.M.Nirkhi, Visualization Techniques for Digital forensics: A Survey, International Journal of Advanced Computer Research, Volume-2 Number-4 Issue-6 December-2012.
- Sutapat Thiprungsri. Miklos A. Vasarhelyi, Cluster Analysis for Anomaly Detection in Accounting Data: An Audit Approach, The International Journal of Research,pp 84,2011.
- Gerald Schrenk, Rainer Poisel,‖A Discussion of Visualization Techniques for the Analysis of Digital Evidence‖, International Conference on Availability, Reliability and Security,pp758- 763,2011.