<?xml version="1.0" encoding="UTF-8" standalone="yes"?>
<OAI-PMH xmlns="http://www.openarchives.org/OAI/2.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:dim="http://www.dspace.org/xmlns/dspace/dim" xsi:schemaLocation="http://www.openarchives.org/OAI/2.0/ http://www.openarchives.org/OAI/2.0/OAI-PMH.xsd">
    <responseDate>2026-04-17T17:48:02.427Z</responseDate>
    <request verb="GetRecord" identifier="ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:2519" metadataPrefix="dim">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai</request>
    <GetRecord>
        <record>
            <header>
                <identifier>ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai:1:2519</identifier>
                <datestamp>2014-06-07T20:25:49Z</datestamp>
                <setSpec>1</setSpec>
            </header>
            <metadata>
                <dim:dim>
                    <dim:field mdschema="dc" element="title" lang="en">INTEGRATED PROACTIVE FORENSICS MODEL IN NETWORK INFORMATION SECURITY</dim:field>
                    <dim:field mdschema="dc" element="date" qualifier="issued">2014</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">http://ezaposleni.singidunum.ac.rs/rest/sciNaucniRezultati/oai/record/1/2519</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="uri">www.sinteza.singidunum.ac.rs</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="etfid:182" confidence="-1">G. Grubor</dim:field>
                    <dim:field mdschema="dc" element="contributor" qualifier="author" authority="id:7580" confidence="-1">I. Barać</dim:field>
                    <dim:field mdschema="dc" element="description" qualifier="abstract">In many cases, web application security cannot provide the required level of security. Proactive collection of network data from all of the network layers in real time and their forensic analysis can help to uncover information about the internal or external attacks and to prevent potential damages. The best way is to combine application and system monitoring and perform centralized traffic monitoring to correlate events. The data collected in such manner can be used to detect traffic anomalies and improve network intrusion detection. Tracing traffic at multiple levels could potentially provide more information about the intrusion
features. Analysis of these centralized log data has become an important research area in proactive network security. Any attacks should be detected as soon as possible by monitoring system, to take appropriate corrective measures in timely manner. In this paper deferment types of network events and data sources are described and their integration into centralized log management infrastructure in proactive forensic architecture is researched.
The authors of this paper proposed an integrated proactive digital forensic (IPDF) model
for internal and external attacks and its contribution to overall network security in context
of high – volume network traffic, big data and virtualized cloud computing environment.</dim:field>
                    <dim:field mdschema="dc" element="type">conferenceObject</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="spage">693</dim:field>
                    <dim:field mdschema="dc" element="citation" qualifier="epage">699</dim:field>
                    <dim:field mdschema="dc" element="identifier" qualifier="doi">10.15308/SInteZa-2014-454-457</dim:field>
                    <dim:field mdschema="dc" element="source">ISBN: 978-86-7912-539-2</dim:field>
                </dim:dim>
            </metadata>
        </record>
    </GetRecord>
</OAI-PMH>
