The application research on network forensics

被引:0
作者
机构
[1] School of Information Engineering, Jingdezhen Ceramic Institute
来源
Jingfang, H. (jdzhjf@163.com) | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 05期
关键词
Computer crimes; Intrusion tolerance; Network forensics; Network monitoring;
D O I
10.2174/1874444301305010167
中图分类号
学科分类号
摘要
With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Fo-rensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical network Forensics system framework on the basis of the Intrusion detection system is discussed combined with network Forensics system, the feasibility of the proposed and analyzed based on Intrusion tolerance, monitoring technologies such as network Forensics system design thought. © Jingfang and Busheng; Licensee Bentham Open.
引用
收藏
页码:167 / 173
页数:6
相关论文
共 50 条
  • [11] Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions
    Morioka, Erni
    Sharbaf, Mehrdad S.
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [12] An Approach to Detect Network Attacks Applied for Network Forensics
    Nguyen, Khoa
    Tran, Dat
    Ma, Wanli
    Sharma, Dharmendra
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 655 - 660
  • [13] Network Forensics: Methodical Literature Review
    Shrivastava, Ciushan
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2203 - 2208
  • [14] Challenges to Network Forensics in Cloud Computing
    Raza, Nasir
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 22 - 29
  • [15] Network Forensics Investigation for Botnet Attack
    Sembiring, Irwan
    Nugroho, Yonathan Satrio
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
  • [16] Active traffic capture for network forensics
    Slaviero, Marco
    Granova, Anna
    Olivier, Martin
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 215 - +
  • [17] Highly Efficient Techniques for Network Forensics
    Ponec, Miroslav
    Giura, Paul
    Bronnimann, Herve
    Wein, Joel
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 150 - 160
  • [18] Integrating digital forensics in network infrastructures
    Shanmugasundaram, K
    Brönnimann, H
    Memon, N
    ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 127 - +
  • [19] GRANEF: Utilization of a Graph Database for Network Forensics
    Cermak, Milan
    Sramkova, Denisa
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 785 - 790
  • [20] Mobile Botnet Detection Using Network Forensics
    Vural, Ickin
    Venter, Hein
    FUTURE INTERNET-FIS 2010, 2010, 6369 : 57 - 67