CFP last date
20 December 2024
Reseach Article

Survey on Real Time Security Mechanisms in Network Forensics

by Barenya Bikash Hazarika, Smriti Priya Medhi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 151 - Number 2
Year of Publication: 2016
Authors: Barenya Bikash Hazarika, Smriti Priya Medhi
10.5120/ijca2016911676

Barenya Bikash Hazarika, Smriti Priya Medhi . Survey on Real Time Security Mechanisms in Network Forensics. International Journal of Computer Applications. 151, 2 ( Oct 2016), 1-4. DOI=10.5120/ijca2016911676

@article{ 10.5120/ijca2016911676,
author = { Barenya Bikash Hazarika, Smriti Priya Medhi },
title = { Survey on Real Time Security Mechanisms in Network Forensics },
journal = { International Journal of Computer Applications },
issue_date = { Oct 2016 },
volume = { 151 },
number = { 2 },
month = { Oct },
year = { 2016 },
issn = { 0975-8887 },
pages = { 1-4 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume151/number2/26202-2016911676/ },
doi = { 10.5120/ijca2016911676 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:55:59.892231+05:30
%A Barenya Bikash Hazarika
%A Smriti Priya Medhi
%T Survey on Real Time Security Mechanisms in Network Forensics
%J International Journal of Computer Applications
%@ 0975-8887
%V 151
%N 2
%P 1-4
%D 2016
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Network forensics is a type of digital forensics which goal is to monitoring, correlate, examine and analysis of computer network traffic for various purposes like- information gathering, legal evidence, or intrusion detection. Now a days, various services like email, web, online transactions are used as network communication schemes. The purpose of this paper is to give an overview of different real time security mechanisms for forensic investigation of network communication schemes.

References
  1. Hu Jingfang, Li busheng, "The application research on network forensics", The open automation and control system journal, 2013
  2. Amor Lazzez, "A survey about network forensics," Taif University, Vol 2 , Issue 1, January 2013
  3. Bhabesh Patel, Sanjay.M.Shah, Sameer Singh Chauhan, " Comparative analysis of Network Forensic System," IP Multimedia Communications, A Special Issue from IJCA
  4. Manesh T, Brijith Bhraguram, T M, Bhadran V K "Network Forensic Investigation of HTTPS protocol," IJMER , Sept-Oct 2013
  5. "SANS Institute InfoSec Reading Room", SANS Reading Room
  6. Gurpal Singh Chhabra, Prashant Singh " Distributed Network Forensics Framework: A Systematic Review", IJCA, June 2015
  7. Natarajan Megharathan, Sumanth Reddy Alam, Loretta A Moore "Tools and Techniques for network forensics" IJNSA ,April 2009
  8. Sven Krasser, Gregory Conti, Julian Grizzard, Jeff Gribschaw, Henry Owen, “Real Time and Forensic Data Analysis using Animated and Coordinated Visualization”, IEEE ,June-2005
  9. Sherri Davidoff, Jonathan Ham "Network Forensics: trackinhg hackers through cyberspace," Prentice hall, 2012
  10. Udo Payer," Realtime Intrusion-Forensics,A First Prototype Implementation(based on a stack-based NIDS) " TERENA Networking Conferrence, 2004
  11. Pavel Laskov "Reactive Security and Intrusion Detection," Uniersity of Tubingen”
  12. Vamshee Krishna Devendran, Hossain Shahriar,Victor Clinchy, ”A Comparative study of email forensics tools”, Deptt of Computer Science, Kennesaw State University, Kennesaw, GA, USA, Journal of Information Security, 2015, 6, 111-117
Index Terms

Computer Science
Information Sciences

Keywords

Network forensics IDS SIDS HIDS AIDS