Cryptolog: A new approach to provide log security for digital forensics

dc.authoridBAYKARA, Muhammet/0000-0001-5223-1343
dc.authoridTuna, Gurkan/0000-0002-6466-4696
dc.authoridDas, Resul/0000-0002-6113-4649
dc.authorwosidBAYKARA, Muhammet/V-8965-2018
dc.authorwosidTuna, Gurkan/AAG-4412-2019
dc.authorwosidDas, Resul/V-9202-2018
dc.contributor.authorBaykara, Muhammet
dc.contributor.authorDas, Resul
dc.contributor.authorTuna, Gurkan
dc.date.accessioned2024-06-12T11:07:47Z
dc.date.available2024-06-12T11:07:47Z
dc.date.issued2017
dc.departmentTrakya Üniversitesien_US
dc.description.abstractAs security vulnerabilities generated by the developments in information and communication technologies as well as emerging technologies can lead to severe loss in terms of individual and institutional aspects, the importance of information security has been increasing in recent years. Nowadays, digital information is considered as an important asset which must be appropriately evaluated and protected against all forms of unauthorized access, use, disclosure, modification, destruction, or denial. Since information security is more prominent and more important now than ever before, this growing awareness of digital information security has led societies to develop innovative ways of protecting their sensitive information. On the other hand, in today's digital world, keeping sensitive information secure is not as easy as it was in the past. In this regard, it is obvious that for all types of institutions there is a need for security software which provides the necessary security measures and policies for the protection and retrieval of sensitive digital information. To ensure information security, security software must have the ability to make logging of certain events. Through log files, some analysis can be performed to find out what kind of attacks were done by which users and when. In this respect, this study proposes a novel approach of recording traffic flow on the log files stored on a server to determine the changes made by unauthorized people/users on the log records, and this way ensures the security of the log records and contributes to digital forensics processes in terms of accuracy, integrity and confidentiality of the log records.en_US
dc.description.sponsorshipScientific Research Projects Administration Unit of Firat University [TEKF.15.04]en_US
dc.description.sponsorshipThe authors gratefully acknowledge the financial support from the Scientific Research Projects Administration Unit of Firat University for this study performed under project with grant no. TEKF.15.04.en_US
dc.identifier.issn1303-0914
dc.identifier.issue2en_US
dc.identifier.scopus2-s2.0-85027959872en_US
dc.identifier.scopusqualityN/Aen_US
dc.identifier.trdizinid259595en_US
dc.identifier.urihttps://search.trdizin.gov.tr/yayin/detay/259595
dc.identifier.urihttps://hdl.handle.net/20.500.14551/22186
dc.identifier.volume17en_US
dc.identifier.wosWOS:000411067100019en_US
dc.identifier.wosqualityN/Aen_US
dc.indekslendigikaynakWeb of Scienceen_US
dc.indekslendigikaynakScopusen_US
dc.indekslendigikaynakTR-Dizinen_US
dc.language.isoenen_US
dc.publisherIstanbul Univ, Fac Engineeringen_US
dc.relation.ispartofIstanbul University-Journal Of Electrical And Electronics Engineeringen_US
dc.relation.publicationcategoryMakale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanıen_US
dc.rightsinfo:eu-repo/semantics/closedAccessen_US
dc.subjectLog Analysisen_US
dc.subjectLog Collectionen_US
dc.subjectLog Securityen_US
dc.subjectInformation Securityen_US
dc.subjectDigital Forensicsen_US
dc.titleCryptolog: A new approach to provide log security for digital forensicsen_US
dc.typeArticleen_US

Dosyalar