Visual Network Forensic Techniques and Processes
نویسندگان
چکیده
Network forensics is the critical next step in the analysis of network attacks, intrusions, and misuses. It is the forensic process that will aid identification of what occurred and how. With the explosion in numbers and types of attacks it is critical that new techniques be developed to aid in the analysis of said attacks. For instance, with the recent widespread deployment of botnets, it is forensic techniques that will allow these botnets to be dissected to determine their extent, their capability, their control mechanisms, etc. In this paper we discuss visualization techniques designed around the analysis of network traffic data and tailored to the scalability issues intrinsic to such data. In conjunction with these techniques we discuss how these techniques fit into an analysts repertoire, how we foresee them being used, their advantages to the forensic process, and the process through which they will be effectively applied. Keywords—Network Forensics, Legal Issues, Visualization, Intrusion Detection, Interactive Feedback Loop
منابع مشابه
Network Traffic Visualization Framework for Threat Prediction and Detection
---------------------------------------------------------------------***-------------------------------------------------------------------AbstractComputer network plays a very important role in information and which also suffers from all kinds of illegal access and attacks. So network forensic analysts may need to check the entire network traffic data, which takes long time to complete the eva...
متن کاملMachine learning based Visual Evoked Potential (VEP) Signals Recognition
Introduction: Visual evoked potentials contain certain diagnostic information which have proved to be of importance in the visual systems functional integrity. Due to substantial decrease of amplitude in extra macular stimulation in commonly used pattern VEPs, differentiating normal and abnormal signals can prove to be quite an obstacle. Due to developments of use of machine l...
متن کاملQuad-pixel edge detection using neural network
One of the most fundamental features of digital image and the basic steps in image processing, analysis, pattern recognition and computer vision is the edge of an image where the preciseness and reliability of its results will affect directly on the comprehension machine system made objective world. Several edge detectors have been developed in the past decades, although no single edge detector...
متن کاملThe Effect of Visual Representation, Textual Representation, and Glossing on Second Language Vocabulary Learning
In this study, the researcher chose three different vocabulary techniques (Visual Representation, Textual Enhancement, and Glossing) and compared them with traditional method of teaching vocabulary. 80 advanced EFL Learners were assigned as four intact groups (three experimental and one control group) through using a proficiency test and a vocabulary test as a pre-test. In the visual group, stu...
متن کاملThe effects of skeletal preparation techniques on DNA from human and non-human bone.
The forensic pathologist increasingly relies on the forensic anthropologist to be the consulting expert in human identification. Likewise, if identification is not possible from visual inspection of skeletal remains, the forensic biologist may be called upon to conduct DNA analysis. The possibility of downstream DNA testing needs to be considered when skeletal preparation techniques are employe...
متن کامل