On the novel network forensics perspective of enhanced e-business security

被引:0
|
作者
Ren, W [1 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Informat, Wuhan 430064, Peoples R China
来源
SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS | 2004年
关键词
e-business security; network security; digital forensics; network forensics;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
E-business security is crucial to the development of e-business. Due to the complexity and characteristics of C-business security, the current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data requiring for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-business security from the different side of view-network forensics approaches-from the thinking of the active protection or defense for the e-business security, which can also improve the ability of emergence response and incident investigation for e-business security. It is also for the first time to systematically discuss the network forensics evidence source, network forensics principles, network forensics functions and network forensics techniques.
引用
收藏
页码:1355 / 1360
页数:6
相关论文
共 50 条
  • [1] E-business, recent threats and security countermeasures
    Pournouri, Sina
    Craven, Matthew
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2014, 6 (03) : 169 - 184
  • [2] Research on the evaluation in alliance e-business security
    Lu Xi
    Zhang Xiaoyu
    Zhu Aimin
    Yu Lijuan
    2010 INTERNATIONAL CONFERENCE ON E-EDUCATION, E-BUSINESS, E-MANAGEMENT AND E-LEARNING: IC4E 2010, PROCEEDINGS, 2010, : 74 - 78
  • [3] SECURITY IN E-BUSINESS Understanding Customers Perceptions and Concerns
    Alqatawna, Ja'far
    Siddiqi, Jawed
    Btoush, Mohammed Hjouj
    WEBIST 2010: PROCEEDINGS OF THE 6TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGY, VOL 2, 2010, : 319 - 324
  • [4] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [5] Mechanisms of E-business Security and Enterprise Employee Voice Behavior Impacts on Team Creativity: A Cognitive Perspective
    Yu, Shaozhong
    Zhang, Le
    Deng, Jinzhao
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (09): : 149 - 164
  • [6] The research of steganography in the E-business
    Ge, Xiuhui
    Zhang, Rongmei
    Tian, Hao
    Wang, Jiazhen
    Fifth Wuhan International Conference on E-Business, Vols 1-3: INTEGRATION AND INNOVATION THROUGH MEASUREMENT AND MANAGEMENT, 2006, : 184 - 188
  • [7] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
  • [8] ECIS: A secured e-business management solution
    Wang, H
    PROCEEDINGS OF THE 2001 INTERNATIONAL CONFERENCE ON MANAGEMENT SCIENCE AND ENGINEERING, VOLS I AND II, 2001, : 419 - 424
  • [9] The impact of security layering on end-to-end latency and system performance in switched and distributed e-business environments
    Iheagwara, C
    Blyth, A
    COMPUTER NETWORKS-THE INTERNATIONAL JOURNAL OF COMPUTER AND TELECOMMUNICATIONS NETWORKING, 2002, 39 (06): : 827 - 840
  • [10] Enhancing security in e-business processes: Utilizing dynamic slicing of Colored Petri Nets for logical vulnerability detection
    Yu, Wangyang
    Feng, Jie
    Liu, Lu
    Zhai, Xiaojun
    Cheng, Yumeng
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2024, 158 : 210 - 218