The Community for Technology Leaders
Green Image
ABSTRACT
<p>Analysis of individual traffic flows is essential to a complete understanding of network usage, but real-time monitoring requires significant resources and doesn?t scale well. Network forensic analysis offers a more practical way to monitor and identify security vulnerabilities and configuration problems.</p>
INDEX TERMS
CITATION
Vicka Corey, Michael S. Greenberg, Sybil Shearin, Charles Peterman, James Van Bokkelen, "Network Forensics Analysis", IEEE Internet Computing, vol. 6, no. , pp. 60-66, November/December 2002, doi:10.1109/MIC.2002.1067738
95 ms
(Ver 3.3 (11022016))