Network forensics involves the capture, recording, and analysis of network events in order to discover the source of security attacks and other problem incidents. We extend our previously proposed model for collecting network data, identifying suspicious packets, examining protocol features misused and correlating attack attributes. This model is capable of handling attacks on the TCP/IP suite. The results obtained by this model are validated. © Springer-Verlag Berlin Heidelberg 2010.
CITATION STYLE
Kaushik, A. K., Pilli, E. S., & Joshi, R. C. (2010). Network Forensic Analysis by Correlation of Attacks with Network Attributes. In Communications in Computer and Information Science (Vol. 101, pp. 124–128). https://doi.org/10.1007/978-3-642-15766-0_18
Mendeley helps you to discover research relevant for your work.