The application research on network forensics

被引:0
作者
机构
[1] School of Information Engineering, Jingdezhen Ceramic Institute
来源
Jingfang, H. (jdzhjf@163.com) | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 05期
关键词
Computer crimes; Intrusion tolerance; Network forensics; Network monitoring;
D O I
10.2174/1874444301305010167
中图分类号
学科分类号
摘要
With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Fo-rensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical network Forensics system framework on the basis of the Intrusion detection system is discussed combined with network Forensics system, the feasibility of the proposed and analyzed based on Intrusion tolerance, monitoring technologies such as network Forensics system design thought. © Jingfang and Busheng; Licensee Bentham Open.
引用
收藏
页码:167 / 173
页数:6
相关论文
共 50 条
  • [1] Research the Computer Forensics Based on Network
    Hu Jingfang
    Li Busheng
    MANUFACTURING PROCESS AND EQUIPMENT, PTS 1-4, 2013, 694-697 : 2282 - 2285
  • [2] Application of the Spectra of Graphs in Network Forensics
    Easttom, Chuck
    Adda, Mo
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 846 - 852
  • [3] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [4] Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions
    Rizvi, Syed
    Scanlon, Mark
    McGibney, Jimmy
    Sheppard, John
    IEEE ACCESS, 2022, 10 : 110362 - 110384
  • [5] Application of growing hierarchical SOM for visualisation of network forensics traffic data
    Paloma, E. J.
    North, J.
    Elizondo, D.
    Luque, R. M.
    Watson, T.
    NEURAL NETWORKS, 2012, 32 : 275 - 284
  • [6] Packet analysis for network forensics: A comprehensive survey
    Sikos, Leslie F.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
  • [7] A Graded Approach to Network Forensics with Privacy Concerns
    Brockelsby, William
    Dutta, Rudra
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 292 - 297
  • [8] An architecture for SCADA network forensics
    Kilpatrick, T.
    Gonzalez, J.
    Chandia, R.
    Papa, M.
    Shenoi, S.
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 273 - +
  • [9] Modeling the network forensics behaviors
    Ren, Wei
    Jin, Hai
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10
  • [10] Network Forensics: Notions and Challenges
    Almulhem, Ahmad
    2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2009), 2009, : 463 - 466