Issue No. 06 - November/December (2002 vol. 6)
<p>Analysis of individual traffic flows is essential to a complete understanding of network usage, but real-time monitoring requires significant resources and doesn?t scale well. Network forensic analysis offers a more practical way to monitor and identify security vulnerabilities and configuration problems.</p>
V. Corey, M. S. Greenberg, S. Shearin, C. Peterman and J. Van Bokkelen, "Network Forensics Analysis," in IEEE Internet Computing, vol. 6, no. , pp. 60-66, 2002.