Behavioral-Anomaly Detection in Forensics Analysis

被引:6
作者
Baddar, Sherenaz Al-Haj [1 ]
Merlo, Alessio [2 ]
Migliardi, Mauro [3 ]
机构
[1] Univ Jordan, Comp Sci, Amman, Jordan
[2] Univ Genoa, Dept Informat Bioengn & Robot, Genoa, Italy
[3] Univ Padua, Padua, Italy
关键词
NETWORK; SYSTEMS;
D O I
10.1109/MSEC.2019.2894917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cybercrimes pertaining to networking, forensics activities and user privacy rights are often competing forces. Lightweight forensics tools are needed to provide a first line of warning without infringing on user privacy.
引用
收藏
页码:55 / 62
页数:8
相关论文
共 14 条
[1]  
Al-Mahrouqi A, 2015, 2015 SCIENCE AND INFORMATION CONFERENCE (SAI), P1257, DOI 10.1109/SAI.2015.7237305
[2]  
Baddar S. W. Al- Haj, 2016, SHORT COMMUNICATION
[3]   Generating statistical insights into network behavior using SKETURE [J].
Baddar, Sherenaz Al-Haj ;
Merlo, Alessio ;
Migliardi, Mauro .
JOURNAL OF HIGH SPEED NETWORKS, 2016, 22 (01) :65-76
[4]   Network Anomaly Detection: Methods, Systems and Tools [J].
Bhuyan, Monowar H. ;
Bhattacharyya, D. K. ;
Kalita, J. K. .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2014, 16 (01) :303-336
[5]   Design and Implementation of Network Forensic System Based on Intrusion Detection analysis [J].
Jiang Liu ;
Tian Guiyan ;
Zhu Shidong .
2012 INTERNATIONAL CONFERENCE ON CONTROL ENGINEERING AND COMMUNICATION TECHNOLOGY (ICCECT 2012), 2012, :689-692
[6]   Network forensics: Review, taxonomy, and open challenges [J].
Khan, Suleman ;
Gani, Abdullah ;
Wahab, Ainuddin Wahid Abdul ;
Shiraz, Muhammad ;
Ahmad, Iftikhar .
JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 :214-235
[7]  
Olabelurin A, 2015, IEEE INT C NETW SENS, P315, DOI 10.1109/ICNSC.2015.7116055
[8]   Network forensic frameworks: Survey and research challenges [J].
Pilli, Emmanuel S. ;
Joshi, R. C. ;
Niyogi, Rajdeep .
DIGITAL INVESTIGATION, 2010, 7 (1-2) :14-27
[9]   Anomaly Detection: A Survey [J].
Chandola, Varun ;
Banerjee, Arindam ;
Kumar, Vipin .
ACM COMPUTING SURVEYS, 2009, 41 (03)
[10]  
Rostamipour M, 2015, 2015 5TH INTERNATIONAL CONFERENCE ON COMPUTER AND KNOWLEDGE ENGINEERING (ICCKE), P67, DOI 10.1109/ICCKE.2015.7365863