Explore chapters and articles related to this topic
Security in the Cloud
Published in John W. Rittinghouse, James F. Ransome, Cloud Computing, 2017
John W. Rittinghouse, James F. Ransome
Computer forensics is used to retrieve and analyze data. The practice of computer forensics means responding to an event by gathering and preserving data, analyzing data to reconstruct events, and assessing the state of an event. Network forensics includes recording and analyzing network events to determine the nature and source of information abuse, security attacks, and other such incidents on your network. This is typically achieved by recording or capturing packets long-term from a key point or points in your infrastructure (such as the core or firewall) and then data mining for analysis and re-creating content.10
Deep Ensemble Technique for Cyber Attack Detection in Big Data Environment
Published in Cybernetics and Systems, 2022
D. Raghunath Kumar Babu, A. Packialatha
Network security is indeed the technique of capturing, recording, and analyzing network packets to discover the source of network security threats. Furthermore, network forensics seems to be the practice of identifying intrusion patterns as well as concentrating on attack behaviors (Baykara and Das 2018; Selvakumar et al. 2019; Aldwairi, Perera, and Novotny 2018; Qu et al. 2018; Hamed, Dara, and Kremer 2018). In order to evaluate network traffic data, it gathers information from several sites as well as network equipment such as firewalls and intrusion detection systems (IDS). Network forensics may also be used to detect, prevent, and investigate possible threats. Identification, preservation, collecting, inspection, analysis, and dissemination, as well as incident handling, are all phases in a network forensics investigation (Zhang et al. 2017; Zha and Li 2018; Sedjelmaci, Senouci, and Ansari 2017; Dong and Sarem 2020; Praseed and Thilagam 2021). One of the most frequent ways of dealing with DDoS and ensuring the confidentiality, authenticity, and accessibility of internet services and computer network resources would be to have an intrusion detection system (Perez-Diaz et al. 2020).
LDPC Codes and Digital Forensics – A Perspective Approach
Published in IETE Journal of Research, 2022
Network forensics is related to the monitoring and analysis of computer network traffic. The challenges here are loss in Network traffic during transmission, limitations in an Intrusion detection system's effectiveness due to noise. This leads to the use of constantly changing library of signatures to mitigate threats and this can be achieved using an appropriate log-likelihood ratio (LLR) evaluating algorithm. The sum product algorithm used in the case of decoding of Low density Parity check code can be a valid candidate as explored through this theoretical endeavor.