An anatomy for recognizing network attack intention

Citations of this article
Mendeley users who have this article in their library.
Get full text


Research in the field of Network forensics is tremendously expanding with the tendency to help in arbitrating, capturing and detaining the exponential growth of the cyber crimes. With this expansion, the field of Network forensics is still not clear and is uncertain. In this paper, we have presented the architecture of an analysis mechanism for network forensics. The work followed by generic process model for network forensics investigation is also presented and discussed in detail. Overall this paper presents an overview of the network forensics architecture, generic process models to help a user in the times of emergency by considering the incident and thus maintaining the privacy and security policies.




Bijalwan, A., Sando, S., & Lemma, M. (2019). An anatomy for recognizing network attack intention. International Journal of Recent Technology and Engineering, 8(3), 803–816.

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free