Implementing Cybercrime Detection Techniques

The paper should follow a conventional report format: title page, table of contents, abstract (optional), introduction, body, conclusion, and references, as well as any appendixes used.

Author is free to develop this topic as he/she likes with available materials. A possible outline might be:

I Introduction
II. Security Auditing and Logs
A. Windows
B. Linux
III. Firewall Logs, Reports, Alarms, and Alerts
IV. Commercial IDS
V. IP spoofing and antidetection methods
VI. Honeypots and Honeynets
VII. Conclusion
– just for example the author is free to explore any body of work in the provided paper topic.