The application research on network forensics

被引:0
作者
机构
[1] School of Information Engineering, Jingdezhen Ceramic Institute
来源
Jingfang, H. (jdzhjf@163.com) | 1600年 / Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands卷 / 05期
关键词
Computer crimes; Intrusion tolerance; Network forensics; Network monitoring;
D O I
10.2174/1874444301305010167
中图分类号
学科分类号
摘要
With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Fo-rensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical network Forensics system framework on the basis of the Intrusion detection system is discussed combined with network Forensics system, the feasibility of the proposed and analyzed based on Intrusion tolerance, monitoring technologies such as network Forensics system design thought. © Jingfang and Busheng; Licensee Bentham Open.
引用
收藏
页码:167 / 173
页数:6
相关论文
共 50 条
  • [41] Network forensics based on fuzzy logic and expert system
    Liao, Niandong
    Tian, Shengfeng
    Wang, Tinghua
    COMPUTER COMMUNICATIONS, 2009, 32 (17) : 1881 - 1892
  • [42] Introduction to a Network Forensics System for Cyber Incidents Analysis
    Choi, Yangseo
    Lee, Joo-Young
    Choi, Sunoh
    Kim, Jong-Hyum
    Kim, Ikkyun
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55
  • [43] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [44] Wi-Fi network signals as a source of digital evidence: Wireless network forensics
    Turnbull, B.
    Slay, J.
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1355 - 1360
  • [45] Hviz: HTTP(S) traffic aggregation and visualization for network forensics
    Gugelmann, David
    Gasser, Fabian
    Ager, Bernhard
    Lenders, Vincent
    DIGITAL INVESTIGATION, 2015, 12 : S1 - S11
  • [46] Scalable Long-term Network Forensics for Epidemic Attacks
    Chen, Li Ming
    Chen, Meng Chang
    Sun, Yeali S.
    Hsiao, Shun-Wen
    Sekar, Vyas
    Zhang, Hui
    2009 INTERNATIONAL CONFERENCE ON NETWORK AND SERVICE SECURITY, 2009, : 71 - +
  • [47] Investigating IoT Systems Security Attacks using Network Forensics
    Mishra, Ayushi
    Bagade, Priyanka
    2023 15TH INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS & NETWORKS, COMSNETS, 2023,
  • [48] Design of Network Forensics Labs for Teaching-oriented Institutions
    Sha, Kewei
    Wei, Wei
    Jain, Arpit
    2021 INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND COMPUTATIONAL INTELLIGENCE (CSCI 2021), 2021, : 959 - 963
  • [49] A method of network forensics analysis based on frequent sequence mining
    Zhong Xiu-yu
    INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 578 - 582
  • [50] A New Approach to Executable File Fragment Detection in Network Forensics
    Khoa Nguyen
    Dat Tran
    Ma, Wanli
    Sharma, Dharmendra
    NETWORK AND SYSTEM SECURITY, 2014, 8792 : 510 - 517