Academic Journals Database
Disseminating quality controlled scientific knowledge

A Review of Network Forensics Techniques for the Analysis of Web Based Attack

ADD TO MY LIST
 
Author(s): Mr. Sudhakar Parate, Ms. S. M. Nirkhi

Journal: International Journal of Advanced Computer Research
ISSN 2249-7277

Volume: 2;
Issue: 6;
Start page: 114;
Date: 2012;
VIEW PDF   PDF DOWNLOAD PDF   Download PDF Original page

Keywords: Evidence | Network Forensics | Log Files | Forensic Process | Analysis.

ABSTRACT
Network forensics has been the most prevalenttechnology to investigate different attack. It used fortroubleshooting connection issues and helping tosolve various network security problems, such assystem log, router log, and access control. NetworkForensic help to identify the evidences of datasource as intermediate side and the end sides. Thispaper gives comprehensive review on varioustechniques that helps to improve the system,analysis of different attack, detection of attack. Itfocuses on the critical stages of preservation andacquisition of digital evidence from the differentsource to be used as evidence for aidinginvestigation.
Why do you need a reservation system?      Affiliate Program