2022
DOI: 10.1109/access.2022.3214506
|View full text |Cite
|
Sign up to set email alerts
|

Application of Artificial Intelligence to Network Forensics: Survey, Challenges and Future Directions

Abstract: Network forensics focuses on the identification and investigation of internal and external network attacks, the reverse engineering of network protocols, and the uninstrumented investigation of networked devices. It lies at the intersection of digital forensics, incident response and network security. Network attacks exploit software and hardware vulnerabilities and communication protocols. The scope of a network forensic investigation can range from Internet-wide down to a single device's network traffic. Net… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
13
0
1

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
3
1
1

Relationship

0
10

Authors

Journals

citations
Cited by 26 publications
(14 citation statements)
references
References 149 publications
0
13
0
1
Order By: Relevance
“…Rizvi introduced a deep learning approach for intrusion detection in resource-constrained environments, achieving high accuracy (Rizvi et al, 2023). Panigrahi provided a comprehensive assessment of supervised classifiers for designing NIDS, identifying the J48 Consolidated classifier as ideal (Panigrahi et al, 2021).…”
Section: Related Workmentioning
confidence: 99%
“…Rizvi introduced a deep learning approach for intrusion detection in resource-constrained environments, achieving high accuracy (Rizvi et al, 2023). Panigrahi provided a comprehensive assessment of supervised classifiers for designing NIDS, identifying the J48 Consolidated classifier as ideal (Panigrahi et al, 2021).…”
Section: Related Workmentioning
confidence: 99%
“…Intrusion detection is critical for high-density communications systems because the large number of devices and users makes it easier for malicious actors to gain access and take advantage of weak points in the system [12]. The challenge of intrusion detection in high-density communications systems can be addressed with the use of big data analytics and machine learning algorithms [13]. In addition to the use of big data analytics and machine learning algorithms, the security of high-density communications systems can be further strengthened with the use of encryption and authentication methods.…”
Section: Related Workmentioning
confidence: 99%
“…Dilated CNNs were recently used by Rizvi et al for an intrusion detection system [52]. Numerous successive dilated CNN layers without including any max-pooling layer are applied along with some feature engineering in the proposed model.…”
Section: Related Workmentioning
confidence: 99%