• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Qureshi, Sirajuddin (Qureshi, Sirajuddin.) | Li, Jianqiang (Li, Jianqiang.) (学者:李建强) | Akhtar, Faheem (Akhtar, Faheem.) | Tunio, Saima (Tunio, Saima.) | Khand, Zahid Hussain (Khand, Zahid Hussain.) | Wajahat, Ahsan (Wajahat, Ahsan.)

收录:

SCIE

摘要:

Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder's location. Forensics can resolve many cybercrime cases using the methods of network forensics. These methods can extract intruder's information, the nature of the intrusion, and how it can be prevented in the future. These techniques can also be used to avoid attacks in near future. Modern network forensic techniques face several challenges that must be resolved to improve the forensic methods. Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges. In general, the network forensic tools and techniques cannot be improved without addressing these challenges of the forensic network. This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive. The classification has been carried out based on the target datasets and implementation techniques while performing forensic investigations. For this purpose, qualitative methods have been used to develop thematic taxonomy. The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate the information related to network attacks with minimum false-negative results. It will help organizations to investigate external and internal causes of network security attacks.

关键词:

作者机构:

  • [ 1 ] [Qureshi, Sirajuddin]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 2 ] [Li, Jianqiang]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 3 ] [Tunio, Saima]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 4 ] [Wajahat, Ahsan]Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
  • [ 5 ] [Akhtar, Faheem]Sukkur IBA Univ, Dept Comp Sci, Sukkur 65200, Pakistan
  • [ 6 ] [Khand, Zahid Hussain]Sukkur IBA Univ, Dept Comp Sci, Sukkur 65200, Pakistan

通讯作者信息:

  • [Akhtar, Faheem]Sukkur IBA Univ, Dept Comp Sci, Sukkur 65200, Pakistan

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

SECURITY AND COMMUNICATION NETWORKS

ISSN: 1939-0114

年份: 2021

卷: 2021

ESI高被引阀值:11

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:793/2989938
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司