The application research on network forensics

被引:0
作者
机构
[1] School of Information Engineering, Jingdezhen Ceramic Institute
来源
Jingfang, H. (jdzhjf@163.com) | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 05期
关键词
Computer crimes; Intrusion tolerance; Network forensics; Network monitoring;
D O I
10.2174/1874444301305010167
中图分类号
学科分类号
摘要
With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Fo-rensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical network Forensics system framework on the basis of the Intrusion detection system is discussed combined with network Forensics system, the feasibility of the proposed and analyzed based on Intrusion tolerance, monitoring technologies such as network Forensics system design thought. © Jingfang and Busheng; Licensee Bentham Open.
引用
收藏
页码:167 / 173
页数:6
相关论文
共 50 条
  • [31] A Secure Storage Model to Preserve Evidence in Network Forensics
    Ibrahim, Mohd Izham
    Jantan, Aman
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
  • [32] Using peer-to-peer technology for network forensics
    Redding, S
    ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
  • [33] Failure Detection in Network Forensics for Volatile Data Acquisition
    Nassif, Lilian Noronha
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 342 - 347
  • [34] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [35] Network forensics on mobile ad-hoc networks
    Otaka, Akira
    Takagi, Tsuyoshi
    Takahashi, Osamu
    KNOWLEDGE-BASED INTELLIGENT INFORMATION AND ENGINEERING SYSTEMS, PT 3, PROCEEDINGS, 2008, 5179 : 175 - 182
  • [36] A Graph Based Approach Toward Network Forensics Analysis
    Wang, Wei
    Daniels, Thomas E.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
  • [37] Emerging Threats, Risks and Mitigation Strategies in Network Forensics
    Nehinbe, Joshua Ojo
    2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 1228 - 1232
  • [38] Network forensics based on scenario reconstruction and alert aggregation
    Dong, Xiao-Mei
    Zhao, Qian
    Li, Xiao-Hua
    Fei, Ya-Jie
    Dong, X.-M. (dongxiaomei@ise.neu.edu.cn), 1600, Northeast University (29): : 39 - 44
  • [39] Data Reduction for Network Forensics Using Manifold Learning
    Peng Tao
    Chen Xiaosu
    Liu Huiyu
    Chen Kai
    2010 2ND INTERNATIONAL WORKSHOP ON DATABASE TECHNOLOGY AND APPLICATIONS PROCEEDINGS (DBTA), 2010,
  • [40] DDoS Classification Using Neural Network and Naive Bayes Methods for Network Forensics
    Yudhana, Anton
    Riadi, Imam
    Ridho, Faizin
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (11) : 177 - 183