New Developments In Network Forensics - Tools and Techniques

被引:0
|
作者
Hunt, Ray [1 ,2 ,3 ,4 ]
机构
[1] Univ Canterbury, Dept Comp Sci, Christchurch, New Zealand
[2] Univ South Australia, Adelaide, SA, Australia
[3] Deakin Univ, Melbourne, Vic, Australia
[4] Edith Cowan Univ, Perth, WA, Australia
来源
2012 18th IEEE International Conference on Networks (ICON) | 2012年
关键词
network and digital forensics; intrusion detection; network forensic tools; malware; IP traceback; honeypot; critical infrastructure and botnet forensics;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic - particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas such as malware and network attack detection; IP traceback and honeypots; and intrusion detection. Further, the paper addresses new and emerging areas of network forensic development which include critical infrastructure forensics, wireless network forensics, as well as its application to social networking.
引用
收藏
页码:376 / 381
页数:6
相关论文
共 50 条
  • [21] Network Attack Origin Forensics with Fuzzy Logic A case study on buffer overflow attack
    Rostamipour, Maryam
    Sadeghiyan, Babak
    2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), 2015, : 67 - 72
  • [22] Network Anomaly Detection: Methods, Systems and Tools
    Bhuyan, Monowar H.
    Bhattacharyya, D. K.
    Kalita, J. K.
    IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01): : 303 - 336
  • [23] CMD: Co-Analyzed IoT Malware Detection and Forensics via Network and Hardware Domains
    Zhao, Ziming
    Li, Zhaoxuan
    Yu, Jiongchi
    Zhang, Fan
    Xie, Xiaofei
    Xu, Haitao
    Chen, Binbin
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2024, 23 (05) : 5589 - 5603
  • [24] A Survey on Automated Dynamic Malware-Analysis Techniques and Tools
    Egele, Manuel
    Scholte, Theodoor
    Kirda, Engin
    Kruegel, Christopher
    ACM COMPUTING SURVEYS, 2012, 44 (02)
  • [25] Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics
    Cheng, Bo-Chao
    Liao, Guo-Tan
    Huang, Hsu-Chen
    Hsu, Ping-Hai
    ANNALS OF TELECOMMUNICATIONS, 2014, 69 (7-8) : 379 - 389
  • [26] Cheetah: a space-efficient HNB-based NFAT approach to supporting network forensics
    Bo-Chao Cheng
    Guo-Tan Liao
    Hsu-Chen Huang
    Ping-Hai Hsu
    annals of telecommunications - annales des télécommunications, 2014, 69 : 379 - 389
  • [27] Trustworthy AI-based Cyber-Attack Detector for Network Cyber Crime Forensics
    Puchalski, Damian
    Pawlicki, Marek
    Kozik, Rafal
    Renk, Rafal
    Choras, Michal
    19TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY, AND SECURITY, ARES 2024, 2024,
  • [28] A survey of network anomaly detection techniques
    Ahmed, Mohiuddin
    Mahmood, Abdun Naser
    Hu, Jiankun
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 60 : 19 - 31
  • [29] Network defense: Approaches, methods and techniques
    Deka, Rup Kumar
    Kalita, Kausthav Pratirn
    Bhattacharya, D. K.
    Kalita, Jugal K.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2015, 57 : 71 - 84
  • [30] Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics
    Bhardwaj, Sonam
    Dave, Mayank
    WIRELESS PERSONAL COMMUNICATIONS, 2022, 122 (03) : 2701 - 2722