We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Network Forensics Framework Development using Interactive Planning Approach

by Missi Hikmatyar, Yudi Prayudi, Imam Riadi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 161 - Number 10
Year of Publication: 2017
Authors: Missi Hikmatyar, Yudi Prayudi, Imam Riadi
10.5120/ijca2017913352

Missi Hikmatyar, Yudi Prayudi, Imam Riadi . Network Forensics Framework Development using Interactive Planning Approach. International Journal of Computer Applications. 161, 10 ( Mar 2017), 41-48. DOI=10.5120/ijca2017913352

@article{ 10.5120/ijca2017913352,
author = { Missi Hikmatyar, Yudi Prayudi, Imam Riadi },
title = { Network Forensics Framework Development using Interactive Planning Approach },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2017 },
volume = { 161 },
number = { 10 },
month = { Mar },
year = { 2017 },
issn = { 0975-8887 },
pages = { 41-48 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume161/number10/27188-2017913352/ },
doi = { 10.5120/ijca2017913352 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:07:09.085764+05:30
%A Missi Hikmatyar
%A Yudi Prayudi
%A Imam Riadi
%T Network Forensics Framework Development using Interactive Planning Approach
%J International Journal of Computer Applications
%@ 0975-8887
%V 161
%N 10
%P 41-48
%D 2017
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Utilization of the network become a trend present with the development of technology, especially the Internet, but the trend of web use is directly proportional to the usage of the crime, or that is better known as cyber crime. Cyber crime is the duty of law enforcement in combating it.In the disclosure of a case on the network needed a method of handling. Integrated Digital Forensics Investigation Framework (IDFIF) is a method of investigation of a general nature. IDFIF evolved into IDFIF version 2 that is a method of treatment focuses on smartphones. IDFIF v2 can not be applied to network investigation it is necessary to develop a version 3 IDFIF focused on network forensics. This research is the development of network forensics framework using interactive planning.

References
  1. Chhabra, G.S., 2015. Distributed Network Forensics Framework : A Systematic Review. International Journal of Computer Applications (IJCA), 119(19), pp.31–35
  2. Jazi, I.R. et al., 2013. Internet Forensics Framework Based on Clustering. International Journal of Advanced Computer Science and Applications (IJACSA), 4(12), pp.115–123.
  3. Goel, R., Sardana, A. & Joshi, R.C., 2013. Wireless Honeypot: Framework, architectures, and tools. International Journal of Network Security, 15(5), pp.373–383.
  4. Wang, W., 2010. A graph-oriented approach for network forensic analysis. , p.123
  5. Tretmans, J., 1999. Testing Concurrent Systems: A Formal Approach. Proceedings of the 10th International Conference on Concurrency Theory (CONCUR), 1664, pp.46–65.
  6. Almulhem, A. & Traore, I., 2008. Profiling distributed connection chains. International Journal of Communication Networks and Distributed Systems, 1(1), pp.4–18.
  7. S. Ciardhuain, 2004. An Extended Model of Cybercrime Investigation. International Journal of Digital Evidence, Vol. 3, No. 1, pp. 1-22.
  8. Beebe, N. l., & Clark, J. G., 2004. A Hierarchical, Objectives - Based Framework for the Digital Investigations Process. Proceedings of Digital Forensics Research Workshop. Baltimore, MD.
  9. Baryamureeba, V., & Tushabe, F., 2004. The Enhanced Digital Investigation Process Model. Proceeding of Digital Forensic Research Workshop. Baltimore, MD.
  10. M. K. Rogers, J. Goldman, R. Mislan, T. Wedge & S. Debrota., 2006. Computer Forensic Field Triage Process Model.presented at the Conference on Digital Forensics, Security and Law, pp. 27-40.
  11. Pilli, E.S., Joshi, R.C. & Niyogi, R., 2010. A Generic Framework for Network Forensics. International Journal of Computer Applications, 1(11), pp.1–6.
  12. Alharbi, S., Weber-Jahnke, J. & Traore, I., 2011. The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. International Journal of …, 5(4), pp.87–100.
  13. Huang, J.et al., 2012. A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation. , pp.1–22
  14. Mariza, N.et al., 2014. Critical Phases in Network Forensics - A Review. , pp.68–75.
  15. Al-qerem, A., 2015. PNFEA : A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes. , (January), pp.25–32.
  16. Kumar, M.V. & Lalitha, T., 2016. Soft Computing : Fuzzy Logic Approach in Wireless Sensors Networks. , (June), pp.1242–1249.
  17. He, J.et al., 2016. Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning. Future Internet, 8(4), p.54.
  18. Dhammearatchi, D., 2015. Use of Network Forensic Mechanisms. , 7(4), pp.21–36
Index Terms

Computer Science
Information Sciences

Keywords

IDFIF Network Forensics Framework Interactive Planning.