000 11257nam a22012735i 4500
001 9783110677478
003 DE-B1597
005 20240730161550.0
006 m|||||o||d||||||||
007 cr || ||||||||
008 230228t20212021gw fo d z eng d
020 _a9783110677478
024 7 _a10.1515/9783110677478
_2doi
035 _a(DE-B1597)536547
035 _a(OCoLC)1266228156
040 _aDE-B1597
_beng
_cDE-B1597
_erda
041 0 _aeng
044 _agw
_cDE
072 7 _aCOM004000
_2bisacsh
084 _aST 300
_qDE-Ofb1/22
_2rvk
_0(DE-625)rvk/143650:
245 0 0 _aCyber Crime and Forensic Computing :
_bModern Principles, Practices, and Algorithms /
_ced. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma.
264 1 _aBerlin ;
_aBoston :
_bDe Gruyter,
_c[2021]
264 4 _c©2021
300 _a1 online resource (X, 230 p.)
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 0 _aDe Gruyter Frontiers in Computational Intelligence ,
_x2512-8868 ;
_v11
505 0 0 _tFrontmatter --
_tContents --
_tAbout the editors --
_tA survey of popular digital forensic tools --
_tAn insight review on multimedia forensics technology --
_tAn overview on advanced multimedia forensic techniques and future direction --
_tComputer forensics and Cyber Crimes: COVID-19 perspective --
_tBiometric forensic tools for criminal investigation --
_tDeep learning for optimization of e-evidence --
_tElectronic voting machine security issues and solution protocol by physical unclonable function --
_tMachine learning for mobile malware analysis --
_tMobile platform security: issues and countermeasures --
_tData leakage detection in Wi-Fi networks --
_tIndex
506 0 _arestricted access
_uhttp://purl.org/coar/access_right/c_16ec
_fonline access with authorization
_2star
520 _aThis book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
530 _aIssued also in print.
538 _aMode of access: Internet via World Wide Web.
546 _aIn English.
588 0 _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)
650 4 _aAlgorithmus.
_963838
650 4 _aBig Data.
_94174
650 4 _aComputerforensik.
_976275
650 4 _aForensische Informatik.
_976276
650 4 _aKünstliche Intelligenz.
_975263
650 4 _aMaschinelles Lernen.
_975264
650 7 _aCOMPUTERS / Intelligence (AI) & Semantics.
_2bisacsh
_976277
700 1 _aAgarwal, Prerna,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976278
700 1 _aArora, Shefali,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976279
700 1 _aBhatia, M. P. S.,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976280
700 1 _aGarg, Puneet,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976281
700 1 _aGupta, Deepak,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976282
700 1 _aGupta, Deepak,
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_976282
700 1 _aGupta, Swati,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976283
700 1 _aHariharan, K.,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976284
700 1 _aKumar, Ambeshwar,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976285
700 1 _aKumar, Prashant,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976286
700 1 _aKumar, Sachil,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976287
700 1 _aKumari, Meet,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976288
700 1 _aManikandan, R.,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_9885
700 1 _aMeenakshi,,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976289
700 1 _aMittal, Ruchi,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976290
700 1 _aPurohit, Gaurav,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976291
700 1 _aRajkumar, K.,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976292
700 1 _aRaju, Solomon,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976293
700 1 _aSaxena, Geetika,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976294
700 1 _aSelvakumari, R. Shantha,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976295
700 1 _aSharma, Anand,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976296
700 1 _aSharma, Kavita,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976297
700 1 _aSharma, Kavita,
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_976297
700 1 _aShrivastava, Gulshan,
_eeditor.
_4edt
_4http://id.loc.gov/vocabulary/relators/edt
_976298
700 1 _aShrivastava, Pranav,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976299
700 1 _aSivasankari, N.,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976300
700 1 _aTanwar, Pramod,
_econtributor.
_4ctb
_4https://id.loc.gov/vocabulary/relators/ctb
_976301
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDG Ebook Package English 2021
_z9783110750720
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDG Plus DeG Package 2021 Part 1
_z9783110750706
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tDe Gruyter English eBooks 2020 - UC
_z9783110659061
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE 2021 English
_z9783110754001
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE COMPLETE 2021
_z9783110753776
_oZDB-23-DGG
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE Engineering, Computer Sciences 2021 English
_z9783110754070
773 0 8 _iTitle is part of eBook package:
_dDe Gruyter
_tEBOOK PACKAGE Engineering, Computer Sciences 2021
_z9783110753837
_oZDB-23-DEI
776 0 _cEPUB
_z9783110677546
776 0 _cprint
_z9783110677379
856 4 0 _uhttps://doi.org/10.1515/9783110677478
856 4 0 _uhttps://www.degruyter.com/isbn/9783110677478
856 4 2 _3Cover
_uhttps://www.degruyter.com/document/cover/isbn/9783110677478/original
912 _a978-3-11-065906-1 De Gruyter English eBooks 2020 - UC
_b2020
912 _a978-3-11-075070-6 DG Plus DeG Package 2021 Part 1
_b2021
912 _a978-3-11-075072-0 DG Ebook Package English 2021
_b2021
912 _a978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English
_b2021
912 _a978-3-11-075407-0 EBOOK PACKAGE Engineering, Computer Sciences 2021 English
_b2021
912 _aEBA_CL_CHCOMSGSEN
912 _aEBA_CL_LAEC
912 _aEBA_DGALL
912 _aEBA_EBKALL
912 _aEBA_ECL_CHCOMSGSEN
912 _aEBA_ECL_LAEC
912 _aEBA_EEBKALL
912 _aEBA_ESSHALL
912 _aEBA_ESTMALL
912 _aEBA_SSHALL
912 _aEBA_STMALL
912 _aGBV-deGruyter-alles
912 _aPDA11SSHE
912 _aPDA12STME
912 _aPDA13ENGE
912 _aPDA17SSHEE
912 _aPDA18STMEE
912 _aPDA5EBK
912 _aZDB-23-DEI
_b2021
912 _aZDB-23-DGG
_b2021
942 _cEBK
999 _c84438
_d84438