Third International Conference on Natural Computation (ICNC 2007) 2007
DOI: 10.1109/icnc.2007.345
|View full text |Cite
|
Sign up to set email alerts
|

Dynamical Network Forensics Based on Immune Agent

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
23
0

Year Published

2009
2009
2019
2019

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 17 publications
(23 citation statements)
references
References 4 publications
0
23
0
Order By: Relevance
“…One of the main problems with these approaches is not good at detecting and reconstructing the hidden/multi-steps attacks. Recently artificial intelligence technologies, such as artificial neural network (ANN) [20], support vector machine (SVM) [22], artificial immune system (AIS) [2], etc., are developed to extract significant features for computer forensics to automate and simplify the process. These techniques are effective in reducing the computingtime and increasing the intrusion detection accuracy to a certain extent, but they are limited in forensic analysis.…”
Section: Network Forensicsmentioning
confidence: 99%
See 3 more Smart Citations
“…One of the main problems with these approaches is not good at detecting and reconstructing the hidden/multi-steps attacks. Recently artificial intelligence technologies, such as artificial neural network (ANN) [20], support vector machine (SVM) [22], artificial immune system (AIS) [2], etc., are developed to extract significant features for computer forensics to automate and simplify the process. These techniques are effective in reducing the computingtime and increasing the intrusion detection accuracy to a certain extent, but they are limited in forensic analysis.…”
Section: Network Forensicsmentioning
confidence: 99%
“…Wang [6] summarizes two major technical challenges in this field: (1) Forensic analysts are overwhelmed by huge volumes of low-quality evidence. (2) Cyber attacks are becoming increasingly sophisticated. There are many variations of multi-stage attacks.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Such approach would provide forensics as a service (FaaS) [ 14 ] to MCC users [ 15 ]. A number of current NFFs can help CSPs adapt to MCC networks to identify vulnerabilities and the origin of the attack [ 16 18 ]. However, comprehensive studies on the adaptability of current NFFs to MCC networks are rare.…”
Section: Introductionmentioning
confidence: 99%