New Developments In Network Forensics - Tools and Techniques

被引:0
作者
Hunt, Ray [1 ,2 ,3 ,4 ]
机构
[1] Univ Canterbury, Dept Comp Sci, Christchurch, New Zealand
[2] Univ South Australia, Adelaide, SA, Australia
[3] Deakin Univ, Melbourne, Vic, Australia
[4] Edith Cowan Univ, Perth, WA, Australia
来源
2012 18th IEEE International Conference on Networks (ICON) | 2012年
关键词
network and digital forensics; intrusion detection; network forensic tools; malware; IP traceback; honeypot; critical infrastructure and botnet forensics;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic - particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas such as malware and network attack detection; IP traceback and honeypots; and intrusion detection. Further, the paper addresses new and emerging areas of network forensic development which include critical infrastructure forensics, wireless network forensics, as well as its application to social networking.
引用
收藏
页码:376 / 381
页数:6
相关论文
共 50 条
  • [31] Crypto-Preserving Investigation Framework for Deep Learning Based Malware Attack Detection for Network Forensics
    Sonam Bhardwaj
    Mayank Dave
    Wireless Personal Communications, 2022, 122 : 2701 - 2722
  • [32] Comprehensive Analysis of Advanced Techniques and Vital Tools for Detecting Malware Intrusion
    Vasani, Vatsal
    Bairwa, Amit Kumar
    Joshi, Sandeep
    Pljonkin, Anton
    Kaur, Manjit
    Amoon, Mohammed
    ELECTRONICS, 2023, 12 (20)
  • [33] Evaluating clustering techniques for network intrusion detection
    Zhong, S
    Khoshgoftaar, T
    Seliya, N
    TENTH ISSAT INTERNATIONAL CONFERENCE ON RELIABILITY AND QUALITY IN DESIGN, PROCEEDINGS, 2004, : 173 - 177
  • [34] Advanced Techniques for Reconstruction of Incomplete Network Data
    Matousek, Petr
    Pluskal, Jan
    Rysavy, Ondrej
    Vesely, Vladimir
    Kmet, Martin
    Karpisek, Filip
    Vymlatil, Martin
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2015, 2015, 157 : 69 - 84
  • [35] Data mining tools -a case study for network intrusion detection
    Hosseini, Soodeh
    Sardo, Saman Rafiee
    MULTIMEDIA TOOLS AND APPLICATIONS, 2021, 80 (04) : 4999 - 5019
  • [36] Data mining tools -a case study for network intrusion detection
    Soodeh Hosseini
    Saman Rafiee Sardo
    Multimedia Tools and Applications, 2021, 80 : 4999 - 5019
  • [37] The Hidden Threat: Analysis of Linux Rootkit Techniques and Limitations of Current Detection Tools
    Stuehn, Jakob
    Hilgert, Jan-Niclas
    Lambertz, Martin
    DIGITAL THREATS: RESEARCH AND PRACTICE, 2024, 5 (03):
  • [38] Machine Learning Techniques for Classifying Network Anomalies and Intrusions
    Li, Zhida
    Rios, Ana Laura Gonzalez
    Xu, Guangyu
    Trajkovic, Ljiljana
    2019 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2019,
  • [39] Anomaly detection in network security based on nonparametric techniques
    Kim, Eunhye
    Kim, Sehun
    25TH IEEE INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-7, PROCEEDINGS IEEE INFOCOM 2006, 2006, : 3240 - 3241
  • [40] Evaluation and Comparison of Classification Techniques for Network Intrusion Detection
    Giray, Sait Murat
    Polat, Aydin Goze
    2013 IEEE 13TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2013, : 335 - 342