Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security

Hai Cheng Chu, Der Jiunn Deng, Han Chieh Chao

Research output: Contribution to journalArticle

Abstract

Windows Live Messenger (WLM) is one of the most prevalent ubiquitous Instant Messaging (IM) application programs being used by voluminous people worldwide to establish their cyber social lives. It dramatically changes the way of communication for human beings in the past decade in all aspects. However, WLM is like a sharp double-edge sword, especially the exploited vulnerabilities concerning information security. Consequently, there is an urgent necessity for Digital Forensics (DF) to be strongly enforced within the organizations in order to specifically identify the real causes of the information breaches when utilize WLM. Few researches have formally incorporated the DF of WLM into generic guidelines for the associate personnel to follow. In this paper, we provide the system architecture of the experiment accompanied with our proposed Check Point (CP) methodology trying to disclose the possible digital evidences that could be explicitly collected and scientifically presented as probative evidences with respect to the persistently mushrooming information security incidents in the next generation wireless communication networks.

Original languageEnglish
Pages (from-to)1044-1062
Number of pages19
JournalSecurity and Communication Networks
Volume4
Issue number9
DOIs
Publication statusPublished - 2011 Jan 1

Fingerprint

Intranets
Security of data
Application programs
Telecommunication networks
Personnel
Communication
Experiments
Digital forensics
Secure communication

All Science Journal Classification (ASJC) codes

  • Information Systems
  • Computer Networks and Communications

Cite this

@article{3ef92dceadee4aa88989a5b3699a4930,
title = "Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security",
abstract = "Windows Live Messenger (WLM) is one of the most prevalent ubiquitous Instant Messaging (IM) application programs being used by voluminous people worldwide to establish their cyber social lives. It dramatically changes the way of communication for human beings in the past decade in all aspects. However, WLM is like a sharp double-edge sword, especially the exploited vulnerabilities concerning information security. Consequently, there is an urgent necessity for Digital Forensics (DF) to be strongly enforced within the organizations in order to specifically identify the real causes of the information breaches when utilize WLM. Few researches have formally incorporated the DF of WLM into generic guidelines for the associate personnel to follow. In this paper, we provide the system architecture of the experiment accompanied with our proposed Check Point (CP) methodology trying to disclose the possible digital evidences that could be explicitly collected and scientifically presented as probative evidences with respect to the persistently mushrooming information security incidents in the next generation wireless communication networks.",
author = "Chu, {Hai Cheng} and Deng, {Der Jiunn} and Chao, {Han Chieh}",
year = "2011",
month = "1",
day = "1",
doi = "10.1002/sec.233",
language = "English",
volume = "4",
pages = "1044--1062",
journal = "Security and Communication Networks",
issn = "1939-0114",
publisher = "John Wiley and Sons Inc.",
number = "9",

}

Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security. / Chu, Hai Cheng; Deng, Der Jiunn; Chao, Han Chieh.

In: Security and Communication Networks, Vol. 4, No. 9, 01.01.2011, p. 1044-1062.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Digital forensics of WLM 8.1 via check point methodology within corporate intranet in future communication security

AU - Chu, Hai Cheng

AU - Deng, Der Jiunn

AU - Chao, Han Chieh

PY - 2011/1/1

Y1 - 2011/1/1

N2 - Windows Live Messenger (WLM) is one of the most prevalent ubiquitous Instant Messaging (IM) application programs being used by voluminous people worldwide to establish their cyber social lives. It dramatically changes the way of communication for human beings in the past decade in all aspects. However, WLM is like a sharp double-edge sword, especially the exploited vulnerabilities concerning information security. Consequently, there is an urgent necessity for Digital Forensics (DF) to be strongly enforced within the organizations in order to specifically identify the real causes of the information breaches when utilize WLM. Few researches have formally incorporated the DF of WLM into generic guidelines for the associate personnel to follow. In this paper, we provide the system architecture of the experiment accompanied with our proposed Check Point (CP) methodology trying to disclose the possible digital evidences that could be explicitly collected and scientifically presented as probative evidences with respect to the persistently mushrooming information security incidents in the next generation wireless communication networks.

AB - Windows Live Messenger (WLM) is one of the most prevalent ubiquitous Instant Messaging (IM) application programs being used by voluminous people worldwide to establish their cyber social lives. It dramatically changes the way of communication for human beings in the past decade in all aspects. However, WLM is like a sharp double-edge sword, especially the exploited vulnerabilities concerning information security. Consequently, there is an urgent necessity for Digital Forensics (DF) to be strongly enforced within the organizations in order to specifically identify the real causes of the information breaches when utilize WLM. Few researches have formally incorporated the DF of WLM into generic guidelines for the associate personnel to follow. In this paper, we provide the system architecture of the experiment accompanied with our proposed Check Point (CP) methodology trying to disclose the possible digital evidences that could be explicitly collected and scientifically presented as probative evidences with respect to the persistently mushrooming information security incidents in the next generation wireless communication networks.

UR - http://www.scopus.com/inward/record.url?scp=80052155290&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=80052155290&partnerID=8YFLogxK

U2 - 10.1002/sec.233

DO - 10.1002/sec.233

M3 - Article

AN - SCOPUS:80052155290

VL - 4

SP - 1044

EP - 1062

JO - Security and Communication Networks

JF - Security and Communication Networks

SN - 1939-0114

IS - 9

ER -