On the novel network forensics perspective of enhanced e-business security

被引:0
作者
Ren, W [1 ]
机构
[1] Zhongnan Univ Econ & Law, Sch Informat, Wuhan 430064, Peoples R China
来源
SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS | 2004年
关键词
e-business security; network security; digital forensics; network forensics;
D O I
暂无
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
E-business security is crucial to the development of e-business. Due to the complexity and characteristics of C-business security, the current approaches for security focus on preventing the network intrusion or misusing in advanced and seldom concern of the forensics data requiring for the investigation after the network attack or fraud. We discuss the method for resolving the problem of the e-business security from the different side of view-network forensics approaches-from the thinking of the active protection or defense for the e-business security, which can also improve the ability of emergence response and incident investigation for e-business security. It is also for the first time to systematically discuss the network forensics evidence source, network forensics principles, network forensics functions and network forensics techniques.
引用
收藏
页码:1355 / 1360
页数:6
相关论文
共 50 条
  • [21] A Novel Auralization Model for Network Security Situation Assessment
    Xiao, Yeqiu
    Ma, Yibin
    Wang, Yichuan
    Jiang, Kun
    Cui, Lanlan
    2024 INTERNATIONAL CONFERENCE ON NETWORKING AND NETWORK APPLICATIONS, NANA 2024, 2024, : 190 - 195
  • [22] Proposing a Novel Method for Increasing Security in the Network Communication
    Khosravi, Samiyeh
    INTERNATIONAL JOURNAL OF NONLINEAR ANALYSIS AND APPLICATIONS, 2020, 11 (02): : 199 - 208
  • [23] The Security Strategies of Computer Network for E-tax System
    Bai Yijun
    APPLIED SCIENCE, MATERIALS SCIENCE AND INFORMATION TECHNOLOGIES IN INDUSTRY, 2014, 513-517 : 2182 - 2185
  • [24] SEAMLESS VIRTUAL MACHINE LIVE MIGRATION ON NETWORK SECURITY ENHANCED HYPERVISOR
    Chen Xianqin
    Wan Han
    Wang Sumei
    Long Xiang
    PROCEEDINGS OF 2009 2ND IEEE INTERNATIONAL CONFERENCE ON BROADBAND NETWORK & MULTIMEDIA TECHNOLOGY, 2009, : 847 - 853
  • [25] A Novel Predication Approach for Network Security Situation Inspired by Immunity
    Shi Yuan-quan
    Li Tao
    Chen Wen
    Zhang Rui-rui
    INFORMATION TECHNOLOGY FOR MANUFACTURING SYSTEMS, PTS 1 AND 2, 2010, : 849 - 855
  • [26] Insecurity by Obscurity: A Review of SoHo Router Literature from a Network Security Perspective
    Szewczyk, Patryk
    Valli, Craig
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2009, 4 (03) : 5 - 16
  • [27] Security and Privacy Issues in Network Function Virtualization: A Review from Architectural Perspective
    Zahran, Bilal
    Ahmed, Naveed
    Alzoubaidi, Abdel Rahman
    Ngadi, Md Asri
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2024, 15 (06) : 475 - 480
  • [28] A Novel Approach of intrusion detection system design for computer network security
    Yi, Julan
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3021 - 3025
  • [29] A novel method of constituting network security policy based on attack graphs
    Ma, Junchun
    Wang, Yongjun
    Sun, Jiyin
    Ma, J. (chenshan1223@126.com), 1600, Inst. of Scientific and Technical Information of China (22): : 374 - 381
  • [30] MVSec: multi-perspective and deductive visual analytics on heterogeneous network security data
    Ying Zhao
    Xing Liang
    Xiaoping Fan
    Yiwen Wang
    Mengjie Yang
    Fangfang Zhou
    Journal of Visualization, 2014, 17 : 181 - 196