Affiliation:
1. Information Assurance and Security Research Group in the Department of Computer Science, Universiti Teknologi Malaysia, Johor Bahru, Johor, Malaysia
Abstract
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinction between network security and network forensics. In addition, the authors identify factors that militate against most network forensic techniques as well as the research challenges in network forensics. Furthermore, the paper discusses on the current research works on network forensics analysis. This research is useful to the research community of network forensics, for knowledge on existing research techniques, and direction on further research in network forensics.
Reference58 articles.
1. Adeyemi, I. R., Razak, S. A., & Azhan, N. A. (2012). Identifying critical features for network forensics investigation perspective critical. International Journal of Computer Science and Information Security, 1-23.
2. Al-Morjan, A. A. (2010). An investigation into a digital forensic model to distinguish between “insider” and “outsider”. PhD Thesis, Software Technology Research Laboratory, De Montfort University, Leicester, UK.
3. Almulhem, A. (2009). Network forensics: Notions and challenges. IEEE, 463-466.
4. Mining and Detecting Connection-Chains in Network Traffic
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献