Proceedings of the International Conference &Amp; Workshop on Emerging Trends in Technology - ICWET '11 2011
DOI: 10.1145/1980022.1980085
|View full text |Cite
|
Sign up to set email alerts
|

Data reduction by identification and correlation of TCP/IP attack attributes for network forensics

Abstract: Network forensics is an alternate approach to security, which monitors network traffic, stores the traces, detects anomalies, identifies the nature of attack, and investigates the source of attack. The challenge is to store, handle and analyze large volumes of network traffic. Attackers are exploiting the vulnerabilities in TCP/IP protocol suite and manipulating various attributes to launch attacks. In this paper, the attacks on TCP/IP protocol suite at the transport and network layer are studied and the signi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
4
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…In order to acquire evidences, various network forensic methods have been proposed to collect and analyze network data. Pilli proposed a method that collects packets under the TCP/IP protocol to analyze the common characteristics of attacks so as to filter suspicious packets [9]. However, high data rate of network traffic creates difficulties for network forensics in the capture and preservation of all network packets [10].…”
Section: Related Workmentioning
confidence: 99%
“…In order to acquire evidences, various network forensic methods have been proposed to collect and analyze network data. Pilli proposed a method that collects packets under the TCP/IP protocol to analyze the common characteristics of attacks so as to filter suspicious packets [9]. However, high data rate of network traffic creates difficulties for network forensics in the capture and preservation of all network packets [10].…”
Section: Related Workmentioning
confidence: 99%
“…Often, network forensics can be integrated with other techniques such as adaptive firewalls and malware and social network analysis . Further, maintaining network logs is not trivial, and analysis often requires the inspection of large files . To expedite the attribution mechanism, forensics can also be integrated with visualization tools .…”
Section: Survey Of Attribution Techniquesmentioning
confidence: 99%
“…For example, Pilli et al [17] focus on reducing the file size of captured data. They consider only TCP/IP headers and additionally reduce file size with a filter.…”
Section: Network Forensicsmentioning
confidence: 99%