Network Forensics with Neurofuzzy Techniques

被引:2
|
作者
Aguirre Anaya, Eleazar [1 ]
Nakano-Miyatake, Mariko [1 ]
Perez Meana, Hector Manuel [1 ]
机构
[1] Inst Politecn Nacl, SEPI ESIME Culhuacan, Mexico City 07738, DF, Mexico
关键词
D O I
10.1109/MWSCAS.2009.5235900
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Forensics science is based on a methodology composed by a group of stages, being the analysis one of them. Analysis is responsible to determine when a data constitutes evidence; and as a consequence it can be presented to a court. When the amount of data in a Network is small, its analysis is relatively simple, but when it is huge the data analysis becomes a challenge for the forensics expert. In this paper a forensics network model is proposed, which allows to obtain the existing evidence in an involved TCP/IP network. This Model uses the Fuzzy Logic and the Artificial Neural Networks to detect the Network flows that realize suspicious activities in the network or hosts, minimizing also the cost and the time to process the information in order to discriminate which are normal network flows and which has been subjected to attacks and intrusions.
引用
收藏
页码:848 / 852
页数:5
相关论文
共 50 条
  • [1] Highly Efficient Techniques for Network Forensics
    Ponec, Miroslav
    Giura, Paul
    Bronnimann, Herve
    Wein, Joel
    [J]. CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 150 - 160
  • [2] New Developments In Network Forensics - Tools and Techniques
    Hunt, Ray
    [J]. 2012 18th IEEE International Conference on Networks (ICON), 2012, : 376 - 381
  • [3] Network Forensics: A Comprehensive Review of Tools and Techniques
    Qureshi, Sirajuddin
    Tunio, Saima
    Akhtar, Faheem
    Wajahat, Ahsan
    Nazir, Ahsan
    Ullah, Faheem
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 879 - 887
  • [4] Network Forensics: An Analysis of Techniques, Tools, and Trends
    Hunt, Ray
    Zeadally, Sherali
    [J]. COMPUTER, 2012, 45 (12) : 36 - 43
  • [5] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
    Liu, Xue-Hua
    Ding, Li-Ping
    Zheng, Tao
    Wu, Jing-Zheng
    Li, Yan-Feng
    [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
  • [6] A neurofuzzy classification network and its application
    Fu, P
    Hope, AD
    King, GA
    [J]. 1998 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS, VOLS 1-5, 1998, : 4234 - 4239
  • [7] Challenges in Network forensics
    Buric, J.
    Delija, D.
    [J]. 2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386
  • [8] Foundation of Network Forensics
    Dobrynin, Andrey V.
    Jacobs, Michael
    Tian, Yuan
    [J]. MACROMOLECULES, 2023, 56 (22) : 9289 - 9296
  • [9] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    [J]. IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [10] Trusted Internet Forensics: design of a network forensics appliance
    Bruschi, D.
    Monga, M.
    Rosti, E.
    [J]. 2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 35 - 37