Design and Implementation of Network Forensic System Based on Intrusion Detection Analysis

To meet the needs of the digital evidence on legal action proceedings, network forensics technology plays an important role in the process of fighting against computer crime and hacking crime. To try to solve some problems of eliminating intrusion track after hacking and some drawbacks of network fo...

Full description

Saved in:
Bibliographic Details
Published in2012 International Conference on Control Engineering and Communication Technology pp. 689 - 692
Main Authors Jiang Liu, Tian Guiyan, Zhu Shidong
Format Conference Proceeding
LanguageEnglish
Published IEEE 01.12.2012
Subjects
Online AccessGet full text
ISBN9781467344999
1467344990
DOI10.1109/ICCECT.2012.51

Cover

More Information
Summary:To meet the needs of the digital evidence on legal action proceedings, network forensics technology plays an important role in the process of fighting against computer crime and hacking crime. To try to solve some problems of eliminating intrusion track after hacking and some drawbacks of network forensics products, in this paper, we present a network forensic solution which adopts dynamic and static methods to analyze network intrusion data and make detailed records of the data and log. This network forensics solution is able to carry out deep and multi-angle forensic analysis with network evidence, and can ensure the reliability and credibility of the network evidence through effective technical methods.
ISBN:9781467344999
1467344990
DOI:10.1109/ICCECT.2012.51