Research the Computer Forensics Based on Network

Article Preview

Abstract:

With the development of network technology, computer crimes occur from time to time. As a mean of active defense in network security aspect, network forensics have been widely studied and used. This thesis detailed introduces some network forensics techniques and methods, advances and analyzes how to design the network forensics system based on the techniques of intrusion tolerance, network monitor and so on.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 694-697)

Pages:

2282-2285

Citation:

Online since:

May 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Dixon PD. An Overview of Computer Forensics [J]. IEEE Potentials, 2005, 24(5):7-10.

Google Scholar

[2] Yu Zhihong, Liu Zhe, Zhao Kuo, etc. Design and Implementation based on Dynamic Network Forensics System. Journal of Jilin University (Science Edition), 2008, 46(4):712-720

Google Scholar

[3] BERNATO S. The rise of anti-forensics [EB/OL] http://www. csoonline.com/article/print/ 221208.

Google Scholar

[4] Li Busheng, Computer Anti-Forensics Research and Implementation Based on NTFS File System [J]. Computer Engineering, 2010, 20.

Google Scholar

[5] A. Yasinsac and Y. Manzano, "Honeytraps, a network forensic tool,"in 6th Multi- Conference on Systemics, Cybernetics and Informatics.2010.

Google Scholar

[6] Richard Russon. NTFS Documentation [EB/OJ] .http://www. scribd.com/ doc/2187280/ NTFS- Documentation.2012.

Google Scholar