Please use this identifier to cite or link to this item:
https://idr.l1.nitk.ac.in/jspui/handle/123456789/7304
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Manesh, T. | - |
dc.contributor.author | Brijith, B. | - |
dc.contributor.author | Singh, M.P. | - |
dc.date.accessioned | 2020-03-30T09:58:48Z | - |
dc.date.available | 2020-03-30T09:58:48Z | - |
dc.date.issued | 2011 | - |
dc.identifier.citation | Communications in Computer and Information Science, 2011, Vol.203 CCIS, , pp.385-392 | en_US |
dc.identifier.uri | http://idr.nitk.ac.in/jspui/handle/123456789/7304 | - |
dc.description.abstract | Network packet analysis and reconstruction of network sessions are more sophisticated processes in any network forensic and analysis system. Here we introduce an integrated technique which can be used for inspecting, reordering and reconstructing the contents of packets in a network session as part of forensic investigation. Network analysts should be able to observe the stored packet information when a suspicious activity is reported and should collect adequate supporting evidences from stored packet information by recreating the original data/files/messages sent/received by each user. Thus suspicious user activities can be found by monitoring the packets in offline. So we need an efficient method for reordering packets and reconstructing the files or documents to execute forensic investigation and to create necessary evidence against any network crime. The proposed technique can be used for content level analysis of packets passing through the network based on HTTP and FTP protocols and reports deceptive network activities in the enterprise for forensic analysis. � 2011 Springer-Verlag. | en_US |
dc.title | An improved approach towards network forensic investigation of HTTP and FTP protocols | en_US |
dc.type | Book chapter | en_US |
Appears in Collections: | 2. Conference Papers |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.