Intrusion Detection System Logs as Evidence and Legal Aspects

First published January 2007 Fahmid Imtiaz School of Computer and Information Science Edith Cowan University E-mail: fi*****@*************du.au Abstract Modern techniques and methodologies for detecting attacks and malicious activities on computers and networks has evolved a lot over the last couple