Paper Title:
A Method of Network Forensics Analysis Based on Frequent Sequence Mining
  Abstract

For the mistaken report and false alarm occurring frequently in intrusion detection system (IDS), the evidence based on forensics system of IDS is inefficient and low credibility. Frequent sequence mining based on Jpcap is proposed for network forensics analysis. After fetching and filtering network data package, the system mines data with frequent sequence according to the evidence relevance to build and update signature database of offense, and judges whether the current user’s behavior is legal in the network forensics analysis stage or not. Simulation results show that the algorithm of frequent sequence mining can identify the new crime behavior and improve the credibility and efficiency of evidence in network forensics analysis.

  Info
Periodical
Edited by
Shaobo Zhong, Yimin Cheng and Xilong Qu
Pages
578-582
DOI
10.4028/www.scientific.net/AMM.50-51.578
Citation
X. Y. Zhong, "A Method of Network Forensics Analysis Based on Frequent Sequence Mining", Applied Mechanics and Materials, Vols. 50-51, pp. 578-582, 2011
Online since
February 2011
Authors
Export
Price
$32.00
Share

In order to see related information, you need to Login.

In order to see related information, you need to Login.

Authors: Wang Lan Tian
Abstract:Fuzzy neural network, which can deal with complex data and prediction process that other algorithms can not accomplish, has become a focus in...
930
Authors: Shan Chen
Abstract:In this paper, data mining algorithms have been refined and optimized to achieve the intelligent detection of network data. Winsock2 SPI used...
2248
Authors: Shu Fang Zhao, Li Chao Chen
Chapter 3: Sensor, Test and Signal Processing
Abstract:Data mining is the process of abstracting unaware, potential and useful information and knowledge from plentiful, incomplete, noisy, fuzzy...
731
Authors: Cui Fang Zheng, Long Jiang, Li Qing Jiang, Zhi Jie Wu
Chapter 5: Information Processing and Computational Science
Abstract:Data mining techniques give us a feasible method to deal with great amount of data, which is generated during the software developing. Many...
738
Authors: Hai Feng Guo
Chapter 4: Sensors, Measurement, Monitoring and Detection
Abstract:Proposed a way to UPD flow and UPD system ideology. The system is considered the one-way characteristics of UDP flow in the backbone of the...
946