Auswahl der wissenschaftlichen Literatur zum Thema „Network forensic tools“

Geben Sie eine Quelle nach APA, MLA, Chicago, Harvard und anderen Zitierweisen an

Wählen Sie eine Art der Quelle aus:

Machen Sie sich mit den Listen der aktuellen Artikel, Bücher, Dissertationen, Berichten und anderer wissenschaftlichen Quellen zum Thema "Network forensic tools" bekannt.

Neben jedem Werk im Literaturverzeichnis ist die Option "Zur Bibliographie hinzufügen" verfügbar. Nutzen Sie sie, wird Ihre bibliographische Angabe des gewählten Werkes nach der nötigen Zitierweise (APA, MLA, Harvard, Chicago, Vancouver usw.) automatisch gestaltet.

Sie können auch den vollen Text der wissenschaftlichen Publikation im PDF-Format herunterladen und eine Online-Annotation der Arbeit lesen, wenn die relevanten Parameter in den Metadaten verfügbar sind.

Zeitschriftenartikel zum Thema "Network forensic tools"

1

Adeyemi, Ikuesan R., Shukor Abd Razak und Nor Amira Nor Azhan. „A Review of Current Research in Network Forensic Analysis“. International Journal of Digital Crime and Forensics 5, Nr. 1 (Januar 2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.

Der volle Inhalt der Quelle
Annotation:
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinction between network security and network forensics. In addition, the authors identify factors that militate against most network forensic techniques as well as the research challenges in network forensics. Furthermore, the paper discusses on the current research works on network forensics analysis. This research is useful to the research community of network forensics, for knowledge on existing research techniques, and direction on further research in network forensics.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand und Ahsan Wajahat. „Analysis of Challenges in Modern Network Forensic Framework“. Security and Communication Networks 2021 (28.08.2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.

Der volle Inhalt der Quelle
Annotation:
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many cybercrime cases using the methods of network forensics. These methods can extract intruder’s information, the nature of the intrusion, and how it can be prevented in the future. These techniques can also be used to avoid attacks in near future. Modern network forensic techniques face several challenges that must be resolved to improve the forensic methods. Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges. In general, the network forensic tools and techniques cannot be improved without addressing these challenges of the forensic network. This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive. The classification has been carried out based on the target datasets and implementation techniques while performing forensic investigations. For this purpose, qualitative methods have been used to develop thematic taxonomy. The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate the information related to network attacks with minimum false-negative results. It will help organizations to investigate external and internal causes of network security attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Haggerty, John, Alexander J. Karran, David J. Lamb und Mark Taylor. „A Framework for the Forensic Investigation of Unstructured Email Relationship Data“. International Journal of Digital Crime and Forensics 3, Nr. 3 (Juli 2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.

Der volle Inhalt der Quelle
Annotation:
The continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. This paper posits a framework for the forensic investigation of email data. In particular, it focuses on the triage and analysis of unstructured data to identify key actors and relationships within an email network. This paper demonstrates the applicability of the approach by applying relevant stages of the framework to the Enron email corpus. The paper illustrates the advantage of triaging this data to identify (and discount) actors and potential sources of further evidence. It then applies social network analysis techniques to key actors within the data set. This paper posits that visualisation of unstructured data can greatly aid the examiner in their analysis of evidence discovered during an investigation.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Montgomery, Jacob M., Santiago Olivella, Joshua D. Potter und Brian F. Crisp. „An Informed Forensics Approach to Detecting Vote Irregularities“. Political Analysis 23, Nr. 4 (2015): 488–505. http://dx.doi.org/10.1093/pan/mpv023.

Der volle Inhalt der Quelle
Annotation:
Electoral forensics involves examining election results for anomalies to efficiently identify patterns indicative of electoral irregularities. However, there is disagreement about which, if any, forensics tool is most effective at identifying fraud, and there is no method for integrating multiple tools. Moreover, forensic efforts have failed to systematically take advantage of country-specific details that might aid in diagnosing fraud. We deploy a Bayesian additive regression trees (BART) model–a machine-learning technique–on a large cross-national data set to explore the dense network of potential relationships between various forensic indicators of anomalies and electoral fraud risk factors, on the one hand, and the likelihood of fraud, on the other. This approach allows us to arbitrate between the relative importance of different forensic and contextual features for identifying electoral fraud and results in a diagnostic tool that can be relatively easily implemented in cross-national research.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Arévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas und Gustavo Adolfo Higuera Castro. „Forensic analysis with hacking tools on android devices“. Visión electrónica 13, Nr. 1 (31.01.2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.

Der volle Inhalt der Quelle
Annotation:
Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisition model to determine tangible and significant evidences as a probative material.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Bintang, Rauhulloh Noor, Rusydi Umar und Anton Yudhana. „Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method“. Scientific Journal of Informatics 8, Nr. 1 (10.05.2021): 1–9. http://dx.doi.org/10.15294/sji.v8i1.26744.

Der volle Inhalt der Quelle
Annotation:
The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite Facebook lite can send a text message, image, or Video. Not a few users of Facebook lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. In this investigation, National Institute of Standards and Technology NIST research methods with various stages, namely Collection, Examination, Analysis, and Reporting. While the forensic tools to be used are Magnet Axiom Forensic and MOBILedit Forensic Express Pro. Comparison and results of data conducted with forensic tools Magnet Axiom Forensic and MOBILedit Forensic Express Pro in the form of parameter data specified. Axiom Forensic Magnet data is 57.14% while MOBILedit Forensic Express Pro data is 85.71%. This data is the data of the performance results of both forensic tool applications in obtaining digital evidence on Facebook lite application.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ghannam, Hussein Abed. „Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone“. Journal of Applied Information, Communication and Technology 5, Nr. 2 (28.10.2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.

Der volle Inhalt der Quelle
Annotation:
WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis studies have been performed to the time of writing this paper. This paper explains how can we able to extract the Crypt Key of “WhatsApp” to decrypt the databases and extract precious artefacts resides in the android system without rooting the device. Artefacts that extracted from the last version of WhatsApp have been analysed and correlate to give new valuable evidentiary traces that help in investigating. Many hardware and software tools for mobile and forensics are used to collect as much digital evidence as possible from persistent storage on android device. Some of these tools are commercial like UFED Cellebrite and Andriller, and other are open source tools such as autopsy, adb, WhatCrypt. All of these tools that forensically sound accompanied this research to discover a lot of artefacts resides in android internal storage in WhatsApp application.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Raman, Jayakrishnan Anilakkad, und Vasanthi Varadharajan. „HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics“. Ingénierie des systèmes d information 26, Nr. 3 (30.06.2021): 319–27. http://dx.doi.org/10.18280/isi.260309.

Der volle Inhalt der Quelle
Annotation:
With the pervasive usage of sensing systems and IoT things, the importance of security has increased. Attempts towards breaching IoT security systems by attackers are on upsurge. Many intrusions in embedded systems, sensing equipment and IoT things have occurred in the past. Though there are cyber security tools like Antivirus, Intrusion detection and prevention systems available for securing the digital devices and its networks. However, a forensic methodology to be followed for the analysis and investigation to detect origin cause of network incidents is lacking. This paper derives a comprehensive preventive cyber forensic process model with honeypots for the digital IoT investigation process which is formal, that can assist in the court of law in defining the reliability of the investigative process. One year data of various attacks to the IoT network has been recorded by the honeypots for this study. The newly derived model HIM has been validated using various methods and instead of converging on a particular aspect of investigation, it details the entire lifecycle of IoT forensic investigation. The model is targeted to address the forensic analysts’ requirements and the need of legal fraternity for a forensic model. The process model follows a preventive method which reduce further attacks on network.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Yasin, Firmansyah, Abdul Fadlil und Rusydi Umar. „Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST“. Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, Nr. 1 (20.02.2021): 91–98. http://dx.doi.org/10.29207/resti.v5i1.2784.

Der volle Inhalt der Quelle
Annotation:
The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This study uses the Windump forensic tool as a means of recording network traffic activity. Network Miner and Wireshark as an analytical tool for identifying digital evidence. The use of the National Institute of Standard and Technology (NIST) method which collection, examination, analysis and reporting, can be repeated and maintained with the same data. Based on experiments with virtual router network traffic testing, the system built has succeeded in obtaining digital evidence, either by direct or indirectly. The system scenario that has been planned succeeded recording 220494 packages, but by the Windump, it is automatically divided into 9 (nine) parts of the package which are Buktidigital0 to Buktidigital8. The inspection stage produces evidence that has been verified by Wireshark and Network Miner. The analysis stage proves that there were attacks carried out by addresses 192.168.10.10 and 192.168.234.10. Based on the results of forensic testing, the use of the NIST method on a forensic system that has been built with a virtual router object can be used by investigators to identify evidence of cyber-attacks.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Riadi, Imam, Sunardi Sunardi und Muhamad Ermansyah Rauli. „Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics“. Jurnal Teknik Elektro 10, Nr. 1 (20.06.2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.

Der volle Inhalt der Quelle
Annotation:
Rapid development of computer technology is also accompanied with increasing of cybercrime. One of the most common crimes is fraud case in the online shop. This crime abuses Whatapps, one of the most popular Instant Messenger (IM) applications. WhatsApp is one of the IM applications that can be used on computers, especially on windows 8.1 operating system. All applications running on the computer leave data and information on Random Access Memory (RAM). The data and information that exist in RAM can be obtained using digital forensic technique calledLive Forensics. Live forensics can be used when the computer is running and connected to the network. This research aims to find digital evidence related to online shop fraud case. The digital evidence can be obtained using one of the forensic tools FTK Imager. FTK Imager can retrieve and analyze data and information on RAM. The results obtained in this research is the content of WhatsApp conversations that can be used as digital evidence to reveala fraud in the online shop.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Dissertationen zum Thema "Network forensic tools"

1

Zembjaková, Martina. „Prieskum a taxonómia sieťových forenzných nástrojov“. Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445488.

Der volle Inhalt der Quelle
Annotation:
Táto diplomová práca sa zaoberá prieskumom a taxonómiou sieťových forenzných nástrojov. Popisuje základné informácie o sieťovej forenznej analýze, vrátane procesných modelov, techník a zdrojov dát používaných pri forenznej analýze. Ďalej práca obsahuje prieskum existujúcich taxonómií sieťových forenzných nástrojov vrátane ich porovnania, na ktorý naväzuje prieskum sieťových forenzných nástrojov. Diskutované sieťové nástroje obsahujú okrem nástrojov spomenutých v prieskume taxonómií aj niektoré ďalšie sieťové nástroje. Následne sú v práci detailne popísané a porovnané datasety, ktoré sú podkladom pre analýzu jednotlivými sieťovými nástrojmi. Podľa získaných informácií z vykonaných prieskumov sú navrhnuté časté prípady použitia a nástroje sú demonštrované v rámci popisu jednotlivých prípadov použitia. Na demonštrovanie nástrojov sú okrem verejne dostupných datasetov použité aj novo vytvorené datasety, ktoré sú detailne popísane vo vlastnej kapitole. Na základe získaných informácií je navrhnutá nová taxonómia, ktorá je založená na prípadoch použitia nástrojov na rozdiel od ostatných taxonómií založených na NFAT a NSM nástrojoch, uživateľskom rozhraní, zachytávaní dát, analýze, či type forenznej analýzy.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Qaisi, Ahmed Abdulrheem Jerribi. „Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool“. Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.

Der volle Inhalt der Quelle
Annotation:
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmitted to particular destinations such as MySQL,Oracle databases or log files. The data is normally dumped to these destinations without a forensic standard structure. When digital evidence is needed, forensic specialists are required to analyse a very large volume of data. Even though forensic tools can be utilised, most of this process has to be done manually, consuming time and resources. In this research, we aim to address this issue by combining several existing tools to archive the original IDS data into a new container (Digital Evidence Bag) that has a structure based upon standard forensic processes. The aim is to develop a method to improve the current IDS database function in a forensic manner. This database will be optimised for future, forensic, analysis. Since evidence validity is always an issue, a secondary aim of this research is to develop a new monitoring scheme. This is to provide the necessary evidence to prove that an attacker had surveyed the network prior to the attack. To achieve this, we will set up a network that will be monitored by multiple IDSs. Open source tools will be used to carry input validation attacks into the network including SQL injection. We will design a new tool to obtain the original data in order to store it within the proposed DEB. This tool will collect the data from several databases of the different IDSs. We will assume that the IDS will not have been compromised.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Denton, Tarryn-Chevonne Morgaine. „Forensic audio : the relevance of Electric Network Frequency Analysis as an authentication tool in South Africa“. Diss., 2015. http://hdl.handle.net/2263/50875.

Der volle Inhalt der Quelle
Annotation:
The predominance of digital media in modern society has presented a need for methods of authenticating digital audio. When an audio recording is presented as part of legal or business proceedings, it may be necessary to provide proof of authenticity. This minidissertation investigates to what extent Electric Network Frequency (ENF) analysis can be implemented as an authentication technique within a South African context. The electricity supply frequency exhibits random deviations in time from the nominal frequency of 50 Hz. ENF analysis is based on the premise that the supply frequency is detectable in audio recordings made on equipment utilising, or in close proximity to, electrical equipment that utilises the main electrical network. The recorded ENF signal can be extracted and used as a unique temporal identifier for determining the authenticity of an audio recording. Results of experiments conducted in this study indicate that it is possible for a detectable ENF signal to be induced into an audio recording, and subsequently isolated for further analysis. It is possible to compare the extracted ENF signal to the extracted ENF signal from a reliable database to determine temporal authenticity, and investigate the integrity of the file. It is found that the following minimum requirements must be met for successful ENF authenticity analysis: • The recording device be powered by the main electrical network, • The equipment be proven to be suitable for use in ENF analysis, i.e. no UPS device is used; the microphone does not have any electrical components that could alter the ENF signal, and the sound card does not induce any frequency components or noise into the signal; and • The availability of a reliable comparative temporal database of ENF values. Furthermore, results indicate that establishing an ENF temporal database by recording the supply frequency utilising a data acquisition unit, and subsequently processing the signal, is more practical than recording the database as an audio file. It was found that the South African electricity supply is sufficiently random to be suitable for ENF authenticity analysis. Recommendations for further study are made.
Mini-dissertation (MMus)--University of Pretoria, 2015.
tm2015
Music
Mmus
Unrestricted
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Bücher zum Thema "Network forensic tools"

1

How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.

Den vollen Inhalt der Quelle finden
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Buchteile zum Thema "Network forensic tools"

1

Joshi, R. C., und Emmanuel S. Pilli. „Network Forensic Tools“. In Computer Communications and Networks, 71–93. London: Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_4.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Amato, Flora, Giovanni Cozzolino, Marco Giacalone, Antonino Mazzeo, Francesco Moscato und Francesco Romeo. „Overview of Digital Forensic Tools for DataBase Analysis“. In Advances in Network-Based Information Systems, 939–43. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_85.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Shashidhara, D., und Minavathi. „A Survey: On Network Forensic Data Acquisition and Analysis Tools“. In Lecture Notes in Electrical Engineering, 649–59. Singapore: Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5802-9_57.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Shukla, Utkarsha, Bishwas Mandal und K. V. D. Kiran. „Perlustration on Mobile Forensics Tools“. In Computer Networks and Inventive Communication Technologies, 1225–31. Singapore: Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_97.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Chen, Chia-Mei, Gu-Hsin Lai und Zheng-Xun Tsai. „Integrated Forensic Tool for Network Attacks“. In Security with Intelligent Computing and Big-data Services, 451–55. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_35.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Gentry, Eric, Ryan McIntyre, Michael Soltys und Frank Lyu. „SEAKER: A Tool for Fast Digital Forensic Triage“. In Lecture Notes in Networks and Systems, 1227–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_87.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Dhaka, Priyanka, und Bharti Nagpal. „ABFT: Analytics to Uplift Big Social Events Using Forensic Tools“. In Handbook of Computer Networks and Cyber Security, 929–48. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_38.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Berbecaru, Diana. „On Creating Digital Evidence in IP Networks With NetTrack“. In Handbook of Research on Network Forensics and Analysis Techniques, 225–45. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch012.

Der volle Inhalt der Quelle
Annotation:
Computer forensic is the practice of collecting, analyzing, and reporting digital evidence in a way that is legally admissible in open court. Network forensics, an offset of computer forensic, is mainly concerned with the monitoring and analysis of network traffic, both local and WAN/internet, in order to identify security incidents and to investigate fraud or network misuse. In this chapter, the authors discuss challenges in creating high-speed network forensic tools and propose NetTrack, a tamper-proof device aimed to produce evidences with probative value via digital signatures for the network traffic. Since digitally signing each IP packet is not efficient, the authors used a specific technique exploiting the Merkle trees to create digital signatures for flows and multicasts and implemented it by using an optimized algorithm for Merkle tree traversal to save space and time. Through experiments, the authors show NetTrack signing is fast as it can produce digital evidence within a short time.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Carlton, Gregory H., und Hill Zhou. „A Survey of Cloud Computing Challenges from a Digital Forensics Perspective“. In Advancements and Innovations in Wireless Communications and Network Technologies, 213–28. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2154-1.ch016.

Der volle Inhalt der Quelle
Annotation:
Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Al-Saedy, Hasan L. „Cyber Crimes“. In Handbook of Research on Threat Detection and Countermeasures in Network Security, 154–68. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6583-5.ch009.

Der volle Inhalt der Quelle
Annotation:
The financial cost of cyber crime now has an annual cost estimated in the UK in eleven figures. In this chapter an ethic based definition of cyber crime is introduced and cyber crimes are classified. The impact of each class of cyber crime on society, individual, government and international security is highlighted. The cost of cyber crime is evaluated and a technique to prevent and mitigate the effect of these crimes on individual, government and international security and world peace is indicated. The forensic techniques and tools used in cyber crime evidence gathering and prosecuting procedure is also indicated. Finally, recommendations and suggestion are given to mitigate the impact of cyber crime on individuals, societies, world finance and international security.
APA, Harvard, Vancouver, ISO und andere Zitierweisen

Konferenzberichte zum Thema "Network forensic tools"

1

Ghabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm und Mahmoud Ahmad Al-Khasawneh. „Comparative Analysis of Network Forensic Tools and Network Forensics Processes“. In 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
2

Narayanan, A. Sankara, und M. Mohamed Ashik. „Computer Forensic First Responder Tools“. In 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.38.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
3

Northrop, Erik E., und Heather R. Lipford. „Exploring the Usability of Open Source Network Forensic Tools“. In the 2014 ACM Workshop. New York, New York, USA: ACM Press, 2014. http://dx.doi.org/10.1145/2663887.2663903.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
4

Mate, Mrunal H., und Smita R. Kapse. „Network Forensic Tool -- Concept and Architecture“. In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.204.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
5

Kelly, Michael D., und Sean J. Geoghegan. „FIRST Forensic Internet Replay Sequencing Tool“. In 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA). IEEE, 2009. http://dx.doi.org/10.1109/nca.2009.44.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
6

Seyitoglu, Efe U. A., Attila A. Yavuz und Muslum Ozgur Ozmen. „Compact and Resilient Cryptographic Tools for Digital Forensics“. In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 2020. http://dx.doi.org/10.1109/cns48642.2020.9162236.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
7

Ae Chun, Soon, und Francisco Artigas. „Tide gate sensor network as a forensic tool“. In dg.o 2013: 14th Annual International Conference on Digital Government Research. New York, NY, USA: ACM, 2013. http://dx.doi.org/10.1145/2479724.2479771.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
8

Hunt, Ray. „New developments in network forensics — Tools and techniques“. In 2012 18th IEEE International Conference on Networks (ICON). IEEE, 2012. http://dx.doi.org/10.1109/icon.2012.6506587.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
9

Siddiqui, Ali, Oguntoyinbo Olufunmilayo, Hardik Gohel und Bishwajeet Pandey. „Digital Healthcare System Vulnerability Analysis using Network Forensic Tool“. In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2021. http://dx.doi.org/10.1109/csnt51715.2021.9509647.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
10

Malik, Parveen, und Kannan Karthik. „Limitation of PFA-events as a forensic tool“. In 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2017. http://dx.doi.org/10.1109/spin.2017.8049940.

Der volle Inhalt der Quelle
APA, Harvard, Vancouver, ISO und andere Zitierweisen
Wir bieten Rabatte auf alle Premium-Pläne für Autoren, deren Werke in thematische Literatursammlungen aufgenommen wurden. Kontaktieren Sie uns, um einen einzigartigen Promo-Code zu erhalten!

Zur Bibliographie