2016
DOI: 10.1016/j.jnca.2016.03.005
|View full text |Cite
|
Sign up to set email alerts
|

Network forensics: Review, taxonomy, and open challenges

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
52
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
7
2

Relationship

1
8

Authors

Journals

citations
Cited by 102 publications
(52 citation statements)
references
References 83 publications
0
52
0
Order By: Relevance
“…According to recent surveys, the storage and privacy problems are still open challenges in network forensics [15], [16]. Our analysis and experiments, presented in this paper, show that the previous payload attribution systems result in a high false positive rate for the flow determination step; hence, many flows are falsely reported as the excerpt carriers.…”
Section: Introductionmentioning
confidence: 82%
“…According to recent surveys, the storage and privacy problems are still open challenges in network forensics [15], [16]. Our analysis and experiments, presented in this paper, show that the previous payload attribution systems result in a high false positive rate for the flow determination step; hence, many flows are falsely reported as the excerpt carriers.…”
Section: Introductionmentioning
confidence: 82%
“…Nonetheless, there are some challenges to forensics procedures when dealing with network security evidence [35]. Due to the high transmission rate in networks, data is generated very fast, enforcing the necessity to have large storage capacity devices.…”
Section: Network Forensicsmentioning
confidence: 99%
“…Khan et al [35] also cite data integrity as a network forensics challenge. Digital evidence may be easily manipulated, either accidentally or not, compromising the validity of the evidence.…”
Section: Network Forensicsmentioning
confidence: 99%
“…A discussion of network forensic investigation in cloud computing environments can be found in [39,42]. A list of open problems can be found in [21], although not regarding the special characteristics of virtual networks.…”
Section: Related Workmentioning
confidence: 99%