Academic literature on the topic 'Network forensic tools'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Network forensic tools.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Network forensic tools"

1

Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis." International Journal of Digital Crime and Forensics 5, no. 1 (2013): 1–26. http://dx.doi.org/10.4018/jdcf.2013010101.

Full text
Abstract:
Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinc
APA, Harvard, Vancouver, ISO, and other styles
2

Qureshi, Sirajuddin, Jianqiang Li, Faheem Akhtar, Saima Tunio, Zahid Hussain Khand, and Ahsan Wajahat. "Analysis of Challenges in Modern Network Forensic Framework." Security and Communication Networks 2021 (August 28, 2021): 1–13. http://dx.doi.org/10.1155/2021/8871230.

Full text
Abstract:
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many c
APA, Harvard, Vancouver, ISO, and other styles
3

Haggerty, John, Alexander J. Karran, David J. Lamb, and Mark Taylor. "A Framework for the Forensic Investigation of Unstructured Email Relationship Data." International Journal of Digital Crime and Forensics 3, no. 3 (2011): 1–18. http://dx.doi.org/10.4018/jdcf.2011070101.

Full text
Abstract:
The continued reliance on email communications ensures that it remains a major source of evidence during a digital investigation. Emails comprise both structured and unstructured data. Structured data provides qualitative information to the forensics examiner and is typically viewed through existing tools. Unstructured data is more complex as it comprises information associated with social networks, such as relationships within the network, identification of key actors and power relations, and there are currently no standardised tools for its forensic analysis. This paper posits a framework fo
APA, Harvard, Vancouver, ISO, and other styles
4

Montgomery, Jacob M., Santiago Olivella, Joshua D. Potter, and Brian F. Crisp. "An Informed Forensics Approach to Detecting Vote Irregularities." Political Analysis 23, no. 4 (2015): 488–505. http://dx.doi.org/10.1093/pan/mpv023.

Full text
Abstract:
Electoral forensics involves examining election results for anomalies to efficiently identify patterns indicative of electoral irregularities. However, there is disagreement about which, if any, forensics tool is most effective at identifying fraud, and there is no method for integrating multiple tools. Moreover, forensic efforts have failed to systematically take advantage of country-specific details that might aid in diagnosing fraud. We deploy a Bayesian additive regression trees (BART) model–a machine-learning technique–on a large cross-national data set to explore the dense network of pot
APA, Harvard, Vancouver, ISO, and other styles
5

Arévalo Ortega, Yamir Alexander, Sonia Rocio Corredor Vargas, and Gustavo Adolfo Higuera Castro. "Forensic analysis with hacking tools on android devices." Visión electrónica 13, no. 1 (2019): 162–77. http://dx.doi.org/10.14483/22484728.14405.

Full text
Abstract:
Currently, the use of mobile terminals is becoming a necessity for a high number of people around the world which has driven the development of devices with Android operating system; In addition to this, the same indiscriminate access to resources of internet and weak local and international regulations on the use, they have become vulnerable to attacks on the network - injection of malware, ransomware-, among many others. Therefore, this article reviews the hacking tools for the forensic investigation of mobile terminals, proposing from the documentary research a forensic information acquisit
APA, Harvard, Vancouver, ISO, and other styles
6

Bintang, Rauhulloh Noor, Rusydi Umar, and Anton Yudhana. "Assess of Forensic Tools on Android Based Facebook Lite with the NIST Method." Scientific Journal of Informatics 8, no. 1 (2021): 1–9. http://dx.doi.org/10.15294/sji.v8i1.26744.

Full text
Abstract:
The increase in social media use of Facebook lite by using Android-based smartphones is quite high. Activities when communicating through the social media network Facebook Lite Facebook lite can send a text message, image, or Video. Not a few users of Facebook lite social media abusing this app to commit fraud crimes, pornographic acts, or defamation actions from social media users Facebook lite. In such cases, it can be a digital forensic benchmark to get results from digital evidence from the Facebook lite application. In this investigation, National Institute of Standards and Technology NIS
APA, Harvard, Vancouver, ISO, and other styles
7

Ghannam, Hussein Abed. "Forensic Analysis of Artifacts of Giant Instant Messaging “WhatsApp” in Android Smartphone." Journal of Applied Information, Communication and Technology 5, no. 2 (2018): 73–83. http://dx.doi.org/10.33555/ejaict.v5i2.55.

Full text
Abstract:
WhatsApp is a giant mobile instant message IM application with over 1billion users. The huge usage of IM like WhatsApp through giant smart phone “Android” makes the digital forensic researchers to study deeply. The artefacts left behind in the smartphone play very important role in any electronic crime, or any terror attack. “WhatsApp” as a biggest IM in the globe is considered to be very important resource for information gathering about any digital crime. Recently, end-to-end encryption and many other important features were added and no device forensic analysis or network forensic analysis
APA, Harvard, Vancouver, ISO, and other styles
8

Raman, Jayakrishnan Anilakkad, and Vasanthi Varadharajan. "HoneyNetCloud Investigation Model, A Preventive Process Model for IoT Forensics." Ingénierie des systèmes d information 26, no. 3 (2021): 319–27. http://dx.doi.org/10.18280/isi.260309.

Full text
Abstract:
With the pervasive usage of sensing systems and IoT things, the importance of security has increased. Attempts towards breaching IoT security systems by attackers are on upsurge. Many intrusions in embedded systems, sensing equipment and IoT things have occurred in the past. Though there are cyber security tools like Antivirus, Intrusion detection and prevention systems available for securing the digital devices and its networks. However, a forensic methodology to be followed for the analysis and investigation to detect origin cause of network incidents is lacking. This paper derives a compreh
APA, Harvard, Vancouver, ISO, and other styles
9

Yasin, Firmansyah, Abdul Fadlil, and Rusydi Umar. "Identifikasi Bukti Forensik Jaringan Virtual Router Menggunakan Metode NIST." Jurnal RESTI (Rekayasa Sistem dan Teknologi Informasi) 5, no. 1 (2021): 91–98. http://dx.doi.org/10.29207/resti.v5i1.2784.

Full text
Abstract:
The evolution information technology has led to the growth of virtualization technology. Router OS is the operating system of the Mikrotik Router, which supports virtualization. Router Os virtualization technique which is easy to run is a metarouter. Metarouter provides benefits such as, building virtual servers, virtual machines, network topology and savings cost. As an object of research, Metarouter introduces challenges to digital forensic investigations, both practitioners and academics. Investigators need to use methodology and tools in order to prove the perpetrators of crimes. This stud
APA, Harvard, Vancouver, ISO, and other styles
10

Riadi, Imam, Sunardi Sunardi, and Muhamad Ermansyah Rauli. "Identifikasi Bukti Digital WhatsApp pada Sistem Operasi Proprietary Menggunakan Live Forensics." Jurnal Teknik Elektro 10, no. 1 (2018): 18–22. http://dx.doi.org/10.15294/jte.v10i1.14070.

Full text
Abstract:
Rapid development of computer technology is also accompanied with increasing of cybercrime. One of the most common crimes is fraud case in the online shop. This crime abuses Whatapps, one of the most popular Instant Messenger (IM) applications. WhatsApp is one of the IM applications that can be used on computers, especially on windows 8.1 operating system. All applications running on the computer leave data and information on Random Access Memory (RAM). The data and information that exist in RAM can be obtained using digital forensic technique calledLive Forensics. Live forensics can be used w
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Network forensic tools"

1

Zembjaková, Martina. "Prieskum a taxonómia sieťových forenzných nástrojov." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2021. http://www.nusl.cz/ntk/nusl-445488.

Full text
Abstract:
Táto diplomová práca sa zaoberá prieskumom a taxonómiou sieťových forenzných nástrojov. Popisuje základné informácie o sieťovej forenznej analýze, vrátane procesných modelov, techník a zdrojov dát používaných pri forenznej analýze. Ďalej práca obsahuje prieskum existujúcich taxonómií sieťových forenzných nástrojov vrátane ich porovnania, na ktorý naväzuje prieskum sieťových forenzných nástrojov. Diskutované sieťové nástroje obsahujú okrem nástrojov spomenutých v prieskume taxonómií aj niektoré ďalšie sieťové nástroje. Následne sú v práci detailne popísané a porovnané datasety, ktoré sú podklad
APA, Harvard, Vancouver, ISO, and other styles
2

Qaisi, Ahmed Abdulrheem Jerribi. "Network Forensics and Log Files Analysis : A Novel Approach to Building a Digital Evidence Bag and Its Own Processing Tool." Thesis, University of Canterbury. Computer Science and Software Engineering, 2011. http://hdl.handle.net/10092/5999.

Full text
Abstract:
Intrusion Detection Systems (IDS) tools are deployed within networks to monitor data that is transmitted to particular destinations such as MySQL,Oracle databases or log files. The data is normally dumped to these destinations without a forensic standard structure. When digital evidence is needed, forensic specialists are required to analyse a very large volume of data. Even though forensic tools can be utilised, most of this process has to be done manually, consuming time and resources. In this research, we aim to address this issue by combining several existing tools to archive the original
APA, Harvard, Vancouver, ISO, and other styles
3

Denton, Tarryn-Chevonne Morgaine. "Forensic audio : the relevance of Electric Network Frequency Analysis as an authentication tool in South Africa." Diss., 2015. http://hdl.handle.net/2263/50875.

Full text
Abstract:
The predominance of digital media in modern society has presented a need for methods of authenticating digital audio. When an audio recording is presented as part of legal or business proceedings, it may be necessary to provide proof of authenticity. This minidissertation investigates to what extent Electric Network Frequency (ENF) analysis can be implemented as an authentication technique within a South African context. The electricity supply frequency exhibits random deviations in time from the nominal frequency of 50 Hz. ENF analysis is based on the premise that the supply frequency i
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Network forensic tools"

1

How to Defeat Advanced Malware: New Tools for Protection and Forensics. Elsevier Science & Technology Books, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Network forensic tools"

1

Joshi, R. C., and Emmanuel S. Pilli. "Network Forensic Tools." In Computer Communications and Networks. Springer London, 2016. http://dx.doi.org/10.1007/978-1-4471-7299-4_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Amato, Flora, Giovanni Cozzolino, Marco Giacalone, Antonino Mazzeo, Francesco Moscato, and Francesco Romeo. "Overview of Digital Forensic Tools for DataBase Analysis." In Advances in Network-Based Information Systems. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98530-5_85.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Shashidhara, D., and Minavathi. "A Survey: On Network Forensic Data Acquisition and Analysis Tools." In Lecture Notes in Electrical Engineering. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-5802-9_57.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Shukla, Utkarsha, Bishwas Mandal, and K. V. D. Kiran. "Perlustration on Mobile Forensics Tools." In Computer Networks and Inventive Communication Technologies. Springer Singapore, 2021. http://dx.doi.org/10.1007/978-981-15-9647-6_97.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chen, Chia-Mei, Gu-Hsin Lai, and Zheng-Xun Tsai. "Integrated Forensic Tool for Network Attacks." In Security with Intelligent Computing and Big-data Services. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_35.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Gentry, Eric, Ryan McIntyre, Michael Soltys, and Frank Lyu. "SEAKER: A Tool for Fast Digital Forensic Triage." In Lecture Notes in Networks and Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12385-7_87.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Dhaka, Priyanka, and Bharti Nagpal. "ABFT: Analytics to Uplift Big Social Events Using Forensic Tools." In Handbook of Computer Networks and Cyber Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-22277-2_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Berbecaru, Diana. "On Creating Digital Evidence in IP Networks With NetTrack." In Handbook of Research on Network Forensics and Analysis Techniques. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-4100-4.ch012.

Full text
Abstract:
Computer forensic is the practice of collecting, analyzing, and reporting digital evidence in a way that is legally admissible in open court. Network forensics, an offset of computer forensic, is mainly concerned with the monitoring and analysis of network traffic, both local and WAN/internet, in order to identify security incidents and to investigate fraud or network misuse. In this chapter, the authors discuss challenges in creating high-speed network forensic tools and propose NetTrack, a tamper-proof device aimed to produce evidences with probative value via digital signatures for the network traffic. Since digitally signing each IP packet is not efficient, the authors used a specific technique exploiting the Merkle trees to create digital signatures for flows and multicasts and implemented it by using an optimized algorithm for Merkle tree traversal to save space and time. Through experiments, the authors show NetTrack signing is fast as it can produce digital evidence within a short time.
APA, Harvard, Vancouver, ISO, and other styles
9

Carlton, Gregory H., and Hill Zhou. "A Survey of Cloud Computing Challenges from a Digital Forensics Perspective." In Advancements and Innovations in Wireless Communications and Network Technologies. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-2154-1.ch016.

Full text
Abstract:
Computing and communication technologies have merged to produce an environment where many applications and their associated data reside in remote locations, often unknown to the users. The adoption of cloud computing promises many benefits to users and service providers, as it shifts users’ concerns away from the physical location of system components and toward the accessibility of the system’s services. While this adoption of cloud computing may be beneficial to users and service providers, it increases areas of concern for computer forensic examiners that need to obtain data from cloud computing environments for evidence in legal matters. The authors present an overview of cloud computing, discuss the challenges it raises from a digital forensics perspective, describe suitable tools for forensic analysis of cloud computing environments, and consider the future of cloud computing.
APA, Harvard, Vancouver, ISO, and other styles
10

Al-Saedy, Hasan L. "Cyber Crimes." In Handbook of Research on Threat Detection and Countermeasures in Network Security. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6583-5.ch009.

Full text
Abstract:
The financial cost of cyber crime now has an annual cost estimated in the UK in eleven figures. In this chapter an ethic based definition of cyber crime is introduced and cyber crimes are classified. The impact of each class of cyber crime on society, individual, government and international security is highlighted. The cost of cyber crime is evaluated and a technique to prevent and mitigate the effect of these crimes on individual, government and international security and world peace is indicated. The forensic techniques and tools used in cyber crime evidence gathering and prosecuting procedure is also indicated. Finally, recommendations and suggestion are given to mitigate the impact of cyber crime on individuals, societies, world finance and international security.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Network forensic tools"

1

Ghabban, Fahad M., Ibrahim M. Alfadli, Omair Ameerbakhsh, Amer Nizar AbuAli, Arafat Al-Dhaqm, and Mahmoud Ahmad Al-Khasawneh. "Comparative Analysis of Network Forensic Tools and Network Forensics Processes." In 2021 2nd International Conference on Smart Computing and Electronic Enterprise (ICSCEE). IEEE, 2021. http://dx.doi.org/10.1109/icscee50312.2021.9498226.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Narayanan, A. Sankara, and M. Mohamed Ashik. "Computer Forensic First Responder Tools." In 2012 International Conference on Advances in Mobile Network, Communication and its Applications (MNCAPPS). IEEE, 2012. http://dx.doi.org/10.1109/mncapps.2012.38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Northrop, Erik E., and Heather R. Lipford. "Exploring the Usability of Open Source Network Forensic Tools." In the 2014 ACM Workshop. ACM Press, 2014. http://dx.doi.org/10.1145/2663887.2663903.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mate, Mrunal H., and Smita R. Kapse. "Network Forensic Tool -- Concept and Architecture." In 2015 Fifth International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2015. http://dx.doi.org/10.1109/csnt.2015.204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Kelly, Michael D., and Sean J. Geoghegan. "FIRST Forensic Internet Replay Sequencing Tool." In 2009 Eighth IEEE International Symposium on Network Computing and Applications (NCA). IEEE, 2009. http://dx.doi.org/10.1109/nca.2009.44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Seyitoglu, Efe U. A., Attila A. Yavuz, and Muslum Ozgur Ozmen. "Compact and Resilient Cryptographic Tools for Digital Forensics." In 2020 IEEE Conference on Communications and Network Security (CNS). IEEE, 2020. http://dx.doi.org/10.1109/cns48642.2020.9162236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Ae Chun, Soon, and Francisco Artigas. "Tide gate sensor network as a forensic tool." In dg.o 2013: 14th Annual International Conference on Digital Government Research. ACM, 2013. http://dx.doi.org/10.1145/2479724.2479771.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Hunt, Ray. "New developments in network forensics — Tools and techniques." In 2012 18th IEEE International Conference on Networks (ICON). IEEE, 2012. http://dx.doi.org/10.1109/icon.2012.6506587.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Siddiqui, Ali, Oguntoyinbo Olufunmilayo, Hardik Gohel, and Bishwajeet Pandey. "Digital Healthcare System Vulnerability Analysis using Network Forensic Tool." In 2021 10th IEEE International Conference on Communication Systems and Network Technologies (CSNT). IEEE, 2021. http://dx.doi.org/10.1109/csnt51715.2021.9509647.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Malik, Parveen, and Kannan Karthik. "Limitation of PFA-events as a forensic tool." In 2017 4th International Conference on Signal Processing and Integrated Networks (SPIN). IEEE, 2017. http://dx.doi.org/10.1109/spin.2017.8049940.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!