Design and Implementation of Network Forensic System Based on Intrusion Detection Analysis
To meet the needs of the digital evidence on legal action proceedings, network forensics technology plays an important role in the process of fighting against computer crime and hacking crime. To try to solve some problems of eliminating intrusion track after hacking and some drawbacks of network fo...
Saved in:
| Published in | 2012 International Conference on Control Engineering and Communication Technology pp. 689 - 692 |
|---|---|
| Main Authors | , , |
| Format | Conference Proceeding |
| Language | English |
| Published |
IEEE
01.12.2012
|
| Subjects | |
| Online Access | Get full text |
| ISBN | 9781467344999 1467344990 |
| DOI | 10.1109/ICCECT.2012.51 |
Cover
| Summary: | To meet the needs of the digital evidence on legal action proceedings, network forensics technology plays an important role in the process of fighting against computer crime and hacking crime. To try to solve some problems of eliminating intrusion track after hacking and some drawbacks of network forensics products, in this paper, we present a network forensic solution which adopts dynamic and static methods to analyze network intrusion data and make detailed records of the data and log. This network forensics solution is able to carry out deep and multi-angle forensic analysis with network evidence, and can ensure the reliability and credibility of the network evidence through effective technical methods. |
|---|---|
| ISBN: | 9781467344999 1467344990 |
| DOI: | 10.1109/ICCECT.2012.51 |