Research Article

Survey on Real Time Security Mechanisms in Network Forensics

by  Barenya Bikash Hazarika, Smriti Priya Medhi
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Issue 2
Published: Oct 2016
Authors: Barenya Bikash Hazarika, Smriti Priya Medhi
10.5120/ijca2016911676
PDF

Barenya Bikash Hazarika, Smriti Priya Medhi . Survey on Real Time Security Mechanisms in Network Forensics. International Journal of Computer Applications. 151, 2 (Oct 2016), 1-4. DOI=10.5120/ijca2016911676

                        @article{ 10.5120/ijca2016911676,
                        author  = { Barenya Bikash Hazarika,Smriti Priya Medhi },
                        title   = { Survey on Real Time Security Mechanisms in Network Forensics },
                        journal = { International Journal of Computer Applications },
                        year    = { 2016 },
                        volume  = { 151 },
                        number  = { 2 },
                        pages   = { 1-4 },
                        doi     = { 10.5120/ijca2016911676 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2016
                        %A Barenya Bikash Hazarika
                        %A Smriti Priya Medhi
                        %T Survey on Real Time Security Mechanisms in Network Forensics%T 
                        %J International Journal of Computer Applications
                        %V 151
                        %N 2
                        %P 1-4
                        %R 10.5120/ijca2016911676
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

Network forensics is a type of digital forensics which goal is to monitoring, correlate, examine and analysis of computer network traffic for various purposes like- information gathering, legal evidence, or intrusion detection. Now a days, various services like email, web, online transactions are used as network communication schemes. The purpose of this paper is to give an overview of different real time security mechanisms for forensic investigation of network communication schemes.

References
  • Hu Jingfang, Li busheng, "The application research on network forensics", The open automation and control system journal, 2013
  • Amor Lazzez, "A survey about network forensics," Taif University, Vol 2 , Issue 1, January 2013
  • Bhabesh Patel, Sanjay.M.Shah, Sameer Singh Chauhan, " Comparative analysis of Network Forensic System," IP Multimedia Communications, A Special Issue from IJCA
  • Manesh T, Brijith Bhraguram, T M, Bhadran V K "Network Forensic Investigation of HTTPS protocol," IJMER , Sept-Oct 2013
  • "SANS Institute InfoSec Reading Room", SANS Reading Room
  • Gurpal Singh Chhabra, Prashant Singh " Distributed Network Forensics Framework: A Systematic Review", IJCA, June 2015
  • Natarajan Megharathan, Sumanth Reddy Alam, Loretta A Moore "Tools and Techniques for network forensics" IJNSA ,April 2009
  • Sven Krasser, Gregory Conti, Julian Grizzard, Jeff Gribschaw, Henry Owen, “Real Time and Forensic Data Analysis using Animated and Coordinated Visualization”, IEEE ,June-2005
  • Sherri Davidoff, Jonathan Ham "Network Forensics: trackinhg hackers through cyberspace," Prentice hall, 2012
  • Udo Payer," Realtime Intrusion-Forensics,A First Prototype Implementation(based on a stack-based NIDS) " TERENA Networking Conferrence, 2004
  • Pavel Laskov "Reactive Security and Intrusion Detection," Uniersity of Tubingen”
  • Vamshee Krishna Devendran, Hossain Shahriar,Victor Clinchy, ”A Comparative study of email forensics tools”, Deptt of Computer Science, Kennesaw State University, Kennesaw, GA, USA, Journal of Information Security, 2015, 6, 111-117
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

Network forensics IDS SIDS HIDS AIDS

Powered by PhDFocusTM