97
Views
0
CrossRef citations to date
0
Altmetric
Research Article

An enhanced digital forensic investigation framework for XSS attack

, &

References

  • Mike Ter Louw, V.N. Venkatakrishnan, “BLUEPRINT: Robust Prevention of Cross-site Scripting Attacks for Existing Browsers,” in 30th IEEE Symposium on security and privacy, Oakland, May2009.
  • K. Sivakumar, Anil K. Sarje, K. Garg “Yukti: A Dynamic Agent based IDS with Suspect Engine to Detect Diverse XSS Attacks” in IJCA Special Issue on “Network Security and Cryptography” NSC(2): 20-27, Dec. 2011.
  • Suman Saha “Consideration Points: Detecting Cross-Site Scripting” in (IJCSIS) International Journal of Computer Science and Information Security, Vol. 4, No. 1 & 2, 2009.
  • Nataša Šuteva, Aleksandra Mileva, Mario Loleski “Finding forensic evidence for several web attacks” International Journal of Internet Technology and Secured Transactions, Volume 6 Issue 1, December 2015, Pages 64-78. doi: https://doi.org/10.1504/IJITST.2015.073938
  • W. G. Kruse and J. G. Heiser, Computer Forensics: Incident Response Essentials, 1st ed., Addison Wesley, 2002.
  • Technical Working Group Electronic Crime Scene Investigation-A Guide for First Responders, USDOJ, July 2001.
  • G. L. Palmer, “A roadmap for digital forensic research,” Technical Report DTR-T0010-01, DFRWS, Utica, New York, 2001.
  • M. Reith, C. Carr, and G. Gunsch, “An examination of digital forensic models,” IJDE, vol. 1, issue 3, 2002.
  • Brian Carrier and Eugene H Spafford,(2003) Getting Physical with the Investigative Process International Journal of Digital Evidence. Fall 2003, Volume 2, Issue 2.
  • M. K. Rogers, J. Goldman, R. Mislan, T. Wedge, and S. Debrota, “Computer forensics field triage process model,” Journal of Digital Forensics, Security and Law, vol. 1, no. 2, 2006
  • Y. B. Yunus, I. Roslan, and H. Zainuddin, “Common phases of computer forensics investigation models,” International Journal of Computer Science & Information Technology, vol. 3, no. 3, June 2011.
  • P. Sundresan, “Digital forensic model based on Malaysian investigation process,” International Journal of Computer Science and Network Security, vol. 9, no. 8, 2009.
  • Ankit Agarwal, Megha Gupta, Saurabh Gupta & Prof. (Dr.)S.C. Gupta: Systematic Digital Forensic Investigation Model. International Journal of Computer Science and Security (IJCSS), Volume (5) : Issue (1): 2011
  • Sonal Honale, Jayshree Borkar “Framework for Live Digital Forensics Using Data Mining” in Paripex - Indian Journal of Research, Volume: 4 | Issue : 8 | Aug 2015 ISSN - 2250-1991.
  • Rabail Shafique Satti and Fakeeha Jafari “Domain Specific Cyber Forensic Investigation ProcessModel” in Journal of Advances in Computer Networks, Vol. 3, No. 1, March 2015. doi: https://doi.org/10.7763/JACN.2015.V3.145
  • Kwaku Kyei, Pavol Zavarsky, Dale Lindskog, Ron Ruhl “A Review and Comparative Study of Digital Forensic Investigation Models” 4th International Conference on Digital Forensics and Cyber Crime (ICDF2C) Lafayette, IN, USA, October 25-26, 2012: Digital Forensics and Cyber Crime pp 314-327; DOI: https://doi.org/10.1007/978-3-642-39891-9_20
  • Asha Joseph, K. John Singh “Review of Digital Forensic Models and A Proposal For Operating System Level Enhancements” International Journal of Computer Science and Information Security (IJCSIS) ISSN: 1947-5500, Vol. 14, No. 11, November 2016, Pages 797-806
  • Parag H Rughani “Artificial Intelligence based Digital Forensics Framework” International Journal of Advanced Research in Computer Science, Volume 8 No. 8, September-October 2017; DOI: https://doi.org/10.26483/ijarcs.v8i8.4571
  • Ibrahim Goni, Murtala Mohammad “Machine Learning Approach to Mobile Forensics Framework for cyber crime Detection in Nigeria”, Journal of Computer Science Research, Volume 02, Issue 04, October 2020; DOI: https://doi.org/https://doi.org/10.30564/jcsr.v2i4.2147.
  • Akash A Thakar, Kapil Kumar, Baldev Patel “Next Generation Digital Forensic Investigation model (NGDFIM) – Enhanced, Time Reducing and Comprehensive Framework “, Journal of Physics: Conference Series, Volume 1767, International E-Conference on Data Analytics, Intelligent Systems and Information Security & ICDIIS 2020, 11-12 December 2020, Pollachi, India.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.