英文摘要 |
In this paper, we take the advantages of the scheme in Casey (Casey and Stanley, 2004) with Internet Forensics and enrich it to deter the network intrusion events using the audit programs. In this way, the performance in measuring the computer forensics is greatly improved. Besides, the operations in the user-end to the computer are enhanced to assist the forensic improvement of remote network systems. In our proposed model of firewall-base forensic systems, not only it can offer the long-distance effective evidence seizure, but also the requirements of forensic procedure and swift information access are both satisfied. In this case study, it can be referred to the standard operation procedure against the information security accident happenings. |