Claim Missing Document
Check
Articles

Found 2 Documents
Search

Internet service providers responsibilities in botnet mitigation: a Nigerian perspective Julius Olatunji Okesola; Marion Adebiyi; Tochukwu Osi-Okeke; Adeyinka Adewale; Ayodele Adebiyi
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 4: August 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (389.065 KB) | DOI: 10.11591/ijece.v10i4.pp4168-4175

Abstract

Botnet-based attack is dangerous and extremely difficult to overcome as all the primary mitigation methods are passive and limited in focus. A combine efforts of Internet Service Providers (ISPs) are better guides since they can monitor the traffic that traverse through their networks. However, ISPs are not legally banded to this role and may not view security as a primary concern. Towards understudying the involvement of ISPs in Botnet mitigation in Nigeria, this study elicited and summarized mitigation measures from scientific literatures to create a reference model which was validated by structured interview. Although, ISPs role is seen to be voluntary and poorly incentivized, the providers still take customers security very serious but concentrate more on preventive and notification measures.
Detection and extraction of digital footprints from the iDrive cloud storage using web browser forensics analysis Adesoji Adesina; Ayodele Adebiyi; Charles Ayo
Indonesian Journal of Electrical Engineering and Computer Science Vol 26, No 1: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v26.i1.pp550-559

Abstract

STorage as a service (STaaS) allows its subscribers the ability to access their stored data with the use of internet enabled digital devices at anywhere, anyplace and anytime. The easy accessibility of cloud storage with digital devices is one of the major benefits of cloud computing but this benefit can also be exploited by cybercriminals to perform various forms of malicious usages. During forensic investigation, forensic examiners are expected to provided evidence in relation to the malicious usages but the physical inaccessibility to the digital artifacts on the cloud servers, the difficulty in retrieving evidential artifacts from various cloud storage services and the difficulty in obtaining forensic logs from the concerned cloud service providers among other factors make it difficult to perform forensic investigations. This paper provided step by step experimental guidelines to extract digital artifacts from Google Chrome and Internet Explorer from Windows 10 personal computer using iDrive cloud storage as a case study. The study used Nirsoft forensic tool to locate the relevant forensic artifacts and an integrated conceptual digital forensic framework was adopted to carry out the investigation. This study increases the knowledge of client forensics using web browser analysis during cloud storage forensic investigation.