Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]

Mohd Ali, Fakariah Hani and Nik Zulkipli, Nurul Huda and Kharani, Muhammad Syazwan and Ahamad Zaki, Ahmad Wafiy and Jama Abdi, Adnan Abeeb (2013) Information Investigation Autopsy (IIA) for digital forensics / Fakariah Hani Mohd Ali … [et al.]. In: RIID 2013: Optimizing Innovation for Global Commercialization Research, Invention, Innovation Design. Division of Research, Industrial Linkages and Alumni, UiTM Cawangan Melaka, Alor Gajah, Melaka, p. 21. ISBN 978-967-0637-02-0 (Submitted)

Abstract

Many enterprises-built LANs with the assumption that internal users are trustworthy. Little thought was given to understanding exactly what devices are connected to the network, where these devices are located, and what users are doing with them. As a result, enterprises are finding themselves ill-equipped to deal with problems introduced by mobile end systems and end users. According to Digital Forensic Investigator from Malaysian Communication and Multimedia Commission (MCMC), if cybercrime occurs in the network, they have to bring all the computers to the forensic lab before they do investigation process. This approach is costly and time consuming. This project proposed Information Investigation Autopsy (IIA) which a tool that can monitor and analyze users' activities inside the client machine in the network. IIA will capture all the activities such as keystroke pressed, timestamp and IP address and save it in the server. IIA will be analyzing the files to detect any suspicious activities. If detected, IIA will encrypt the evidence and sent the evidence to the digital forensic department. This tool will ease and give benefit to the digital forensic investor and enterprises to identify and detect the evidence if any cybercrime occurs in the local area network environment.

Metadata

Item Type: Book Section
Creators:
Creators
Email / ID Num.
Mohd Ali, Fakariah Hani
UNSPECIFIED
Nik Zulkipli, Nurul Huda
UNSPECIFIED
Kharani, Muhammad Syazwan
UNSPECIFIED
Ahamad Zaki, Ahmad Wafiy
UNSPECIFIED
Jama Abdi, Adnan Abeeb
UNSPECIFIED
Contributors:
Contribution
Name
Email / ID Num.
Director
Omar, Roaimah
UNSPECIFIED
Chief Editor
Abdul Wahab, Shafezah
UNSPECIFIED
Team Member
Sakrani, Siti Najah Raihan
UNSPECIFIED
Team Member
Abd Ghalim, Shahril Anuar
UNSPECIFIED
Team Member
Mahzan, Sulaiman
UNSPECIFIED
Team Member
Md Shah, Mohd Ab Malek
UNSPECIFIED
Team Member
Mohamad, Nur Syuhada
UNSPECIFIED
Team Member
Abdul Batau, Mohd Fajil
UNSPECIFIED
Team Member
Ibrahim, Khalilah
UNSPECIFIED
Designer
Amin Nudin, Anith Liyana
UNSPECIFIED
Designer
Samsuri, Norsharina
UNSPECIFIED
Subjects: T Technology > TK Electrical engineering. Electronics. Nuclear engineering > Telecommunication > Computer networks. General works. Traffic monitoring
Divisions: Universiti Teknologi MARA, Melaka > Bahagian Penyelidikan dan Jaringan Industri, UiTM Melaka
Event Title: Research, Invention, Innovation Design (RIID2013)
Event Dates: 16 - 17 Disember 2013
Page Range: p. 21
Keywords: Cybercrime; Network; Suspicious activities
Date: 2013
URI: https://ir.uitm.edu.my/id/eprint/77907
Edit Item
Edit Item

Download

[thumbnail of Abstract Only] Text (Abstract Only)
77907.pdf

Download (1MB)

ID Number

77907

Indexing

Statistic

Statistic details