The Community for Technology Leaders
RSS Icon
Subscribe
Issue No.12 - Dec. (2012 vol.45)
pp: 36-43
Ray Hunt , University of South Australia
Sherali Zeadally , University of the District of Columbia
ABSTRACT
Researchers in the growing fields of digital and network forensics require new tools and techniques to stay on top of the latest attack trends, especially as attack vectors shift into new domains, such as the cloud and social networks.
INDEX TERMS
Digital forensics, Network security, Forensics, Malware, Digital forensics, botnet and sinkhole forensics, network and digital forensics, intrusion detection, malware, IP traceback, honeypots
CITATION
Ray Hunt, Sherali Zeadally, "Network Forensics: An Analysis of Techniques, Tools, and Trends", Computer, vol.45, no. 12, pp. 36-43, Dec. 2012, doi:10.1109/MC.2012.252
REFERENCES
1. D. Anstee, “Worldwide Infrastructure Security Report,” vol. 7," Arbor Networks, Feb. 2012; www.arbornetworks.comreport.
2. NIST Information Testing Laboratory, “Computer Forensics Tool Testing Program,” 2012; www.cftt.nist.gov.
3. NIST, 2012; “Guide to Integrating Forensic Techniques into Incident Response,” http://csrc.nist.gov/publications/nistpubs/ 800-86SP800-86.pdf.
4. J. Broadway, B. Turnbull, and J. Slay, “Improving the Analysis of Lawfully Intercepted Network Packet Data Captured for Forensic Analysis,” Proc. 3rd Int'l Conf. Availability, Reliability, and Security (ARES 08), IEEE CS, 2008, pp. 1361-1368.
5. K. Ruan et al., “Cloud Forensics: An Overview,” Proc. 7th IFIP Conf. Cloud Computing, Centre for Cybercrime Investigation, Univ. College Dublin, 2012; http://cloudforensicsresearch.org/publication Cloud_Forensics_ An_Overview_7th_IFIP.pdf .
6. S. Zimmerman and D. Glavach, “Cyber Forensics in the Cloud,” IA Newsletter, vol. 14, no. 1, 2011, pp. 4-7; http://iac.dtic.mil/iatac/downloadVol14_No1.pdf .
7. C. Zhou, C. Leckie, and S. Karunasekera, “A Survey of Coordinated Attacks and Collaborative Intrusion Detection,” Computers & Security, vol. 29, no. 1, 2010, pp. 124-140.
8. J. Cheng et al., “Forensics Tools for Social Network Security Solutions,” Pace Univ., May 2009; http://csis.pace.edu/~ctappert/srd2009a4.pdf .
9. H.V. Zhao et al., “Behavior Modeling and Forensics for Multimedia Social Networks: A Case Study in Multimedia Fingerprinting,” IEEE Signal Processing Magazine, Jan. 2009, pp. 118-139.
10. V.H. Bhat, “A Novel Data Generation Approach for Digital Forensic Application in Data Mining,” Proc. 2nd Int'l Conf. on Machine Learning and Computing (ICMLC 10), IEEE, 2010, pp. 86-90.
11. F. Camastra, A. Ciaramella, and A. Staiano, “Machine Learning and Soft Computing for ICT Security: An Overview of Current Trends,” J. Ambient Intelligence and Humanized Computing, Oct. 2011; doi:10.1007/s12652-011-0073-z.
12. T. Kilpatrick et al., “An Architecture for SCADA Network Forensics,” Proc. IFIP Int'l Conf. Digital Forensics (IFIP 06), Nat'l Center for Forensic Science, 2006, pp. 273-285.
13. B. Fei, “Data Visualisation in Digital Forensics,” Univ. of Pretoria, 2007; http://upetd.up.ac.za/thesis/submitted/etd-03072007-153241/ unrestricteddissertation.pdf .
28 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool