2022
DOI: 10.1007/978-3-030-96630-0_8
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensics in the Era of Artificial Intelligence

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
1
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(4 citation statements)
references
References 46 publications
0
1
0
Order By: Relevance
“…Artificial intelligence plays a vital role in making the proactive framework successful [35]. Artificial intelligence can predict cyber-attacks by launching a cyber-attack model based on network packets collected [36].…”
Section: A Multi-component View Of Digital Forensics[29]mentioning
confidence: 99%
“…Artificial intelligence plays a vital role in making the proactive framework successful [35]. Artificial intelligence can predict cyber-attacks by launching a cyber-attack model based on network packets collected [36].…”
Section: A Multi-component View Of Digital Forensics[29]mentioning
confidence: 99%
“…DDoS attacks can overload multiple levels of SDN, including the channels for communication between the controller and the application layer or between the controller and the open flow switch. SDN has a single point of failure, so if it is destroyed by a DDoS attack, the entire network will go down at once [6], [32], [33], [41], [43].…”
Section: Dos Injectionmentioning
confidence: 99%
“…The rapid development of machine learning presents a variety of methods that can be used for various needs with the advantages and disadvantages of these methods. Support Vector Machine (SVM) is one of the machine learning algorithms that can be used in classification due to its ability to clearly classify data points by creating a hyperplane in n-dimensional space, where n represents the number of features [33], [40], [41], [43], [61]. [2], [26], [28], [35], [49], [62].…”
Section: Dos Injectionmentioning
confidence: 99%
“…This area is purely live forensics and cannot be done offline until and unless the physical memory dump is captured on devices [34]. In a live investigation, system logs, network logs, and events are captured, identified, and analyzed by various packet analyzers [35] [36]. Since the physical memory contains network information such as open connections, open ports, visited web-pages, cookies, and server and client logs, it allows for the analysis to continue even when the plug is pulled.. NF aids in the monitoring and recovery of anomalous traffic, intrusion attacks, active/passive attacks, phishing, spamming, and DoS attacks, etc [37].…”
Section: Network Forensicsmentioning
confidence: 99%