The application research on network forensics

被引:0
作者
机构
[1] School of Information Engineering, Jingdezhen Ceramic Institute
来源
Jingfang, H. (jdzhjf@163.com) | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 05期
关键词
Computer crimes; Intrusion tolerance; Network forensics; Network monitoring;
D O I
10.2174/1874444301305010167
中图分类号
学科分类号
摘要
With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Fo-rensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical network Forensics system framework on the basis of the Intrusion detection system is discussed combined with network Forensics system, the feasibility of the proposed and analyzed based on Intrusion tolerance, monitoring technologies such as network Forensics system design thought. © Jingfang and Busheng; Licensee Bentham Open.
引用
收藏
页码:167 / 173
页数:6
相关论文
共 50 条
  • [21] CREATING INTEGRATED EVIDENCE GRAPHS FOR NETWORK FORENSICS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 227 - 241
  • [22] Native Actors: How to Scale Network Forensics
    Vallentin, Matthias
    Charousset, Dominik
    Schmidt, Thomas C.
    Paxson, Vern
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (04) : 141 - 142
  • [23] CAS: Content Attribution System for Network Forensics
    Chen, Yan
    Pu, Yiguo
    Chen, Xiaojun
    Shi, Jinqiao
    Yu, Xiaojie
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 129 - 136
  • [24] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
  • [25] Honeypots aiding network forensics: Challenges and notions
    Nasir, Qassim
    Al-Mousa, Zahraa A.
    Journal of Communications, 2013, 8 (11): : 700 - 707
  • [26] Understanding Network Forensics Analysis in an Operational Environment
    Raftopoulos, Elias
    Dimitropoulos, Xenofontas
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118
  • [27] Network Forensics: A Comprehensive Review of Tools and Techniques
    Qureshi, Sirajuddin
    Tunio, Saima
    Akhtar, Faheem
    Wajahat, Ahsan
    Nazir, Ahsan
    Ullah, Faheem
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 879 - 887
  • [28] A Neural Network based Digital Forensics Classification
    Mohammad, Rami M.
    2018 IEEE/ACS 15TH INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND APPLICATIONS (AICCSA), 2018,
  • [29] Network forensics of SSL/TLS encrypted channels
    Wu, Meng-Da
    Wolthusen, Stephen
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 303 - 312
  • [30] Native Actors: How to Scale Network Forensics
    Vallentin, Matthias
    Charousset, Dominik
    Schmidt, Thomas C.
    Paxson, Vern
    Waehlisch, Matthias
    SIGCOMM'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2014, : 141 - 142