Book Details

NETWORK FORENSICS: AN IN-DEPTH STUDY OF TECHNIQUES, CHALLENGES, AND FUTURE PERSPECTIVES

International Journal of Computer Science (IJCS) Published by SK Research Group of Companies (SKRGC)

Download this PDF format

Abstract

As cyber threats evolve in complexity, the need for comprehensive investigative methods intensifies. Network forensics is a critical domain within digital forensics that specializes in the monitoring, capture, recording, and analysis of network events to reconstruct security incidents and gather admissible evidence. This paper presents a detailed overview of network forensics, encompassing techniques, tools, challenges, case studies, and emerging trends. We discuss the integration of machine learning, blockchain, and cloud computing into forensic frameworks and highlight the open research challenges that must be addressed to advance the field.

References

1. B. Carrier, "File System Forensic Analysis," Addison-Wesley, 2005.

2. R. Bace and P. Mell, "Intrusion Detection Systems," NIST Special Publication 800-31, 2001.

3. K. Kent, S. Chevalier, T. Grance, and H. Dang, "Guide to Integrating Forensic Techniques into Incident Response," NIST Special Publication 800-86, 2006.

4. C. H. Liu, I. C. Lin, and D. T. Lin, "Blockchain-based forensic framework for IoT digital evidence," Journal of Parallel and Distributed Computing, 2020.

5. M. Ahmed, A. N. Mahmood, and J. Hu, "A survey of network anomaly detection techniques," Journal of Network and Computer Applications, vol. 60, 2016.

6. M. Bejtlich, "The Practice of Network Security Monitoring: Understanding Incident Detection and Response," No Starch Press, 2013.

7. S. Zander, T. Nguyen, and G. Armitage, "Automated traffic classification and application identification using machine learning," IEEE LCN, 2005.

8. C. Tankard, "Advanced persistent threats and how to monitor and deter them," Network Security, vol. 2011, no. 8, pp. 16-19, 2011.

9. N. Gruschka, M. Jensen, L. Iacono, and M. Schwenk, "Privacy issues and solutions for cloud computing," Future Generation Computer Systems, vol. 53, 2015.

10. Wireshark Foundation, "Wireshark User Guide," Available: https://www.wireshark.org/docs/

Keywords

Network Forensics, Cybersecurity, Intrusion Detection, Deep Packet Inspection, Traffic Analysis, Encrypted Traffic Analysis, Malware Communication, AI in Forensics, Blockchain for Evidence, Cloud Forensics, IoT Forensics, Evidence Preservation, Chain of Custody.

Image
  • Format Volume 11, Issue 1, No 6, 2023
  • Copyright All Rights Reserved ©2023
  • Year of Publication 2023
  • Author Thirupurasundari Chandrasekaran
  • Reference IJCS-SI-016
  • Page No 3276-3279

Copyright 2025 SK Research Group of Companies. All Rights Reserved.