2023
DOI: 10.14569/ijacsa.2023.0140353
|View full text |Cite
|
Sign up to set email alerts
|

A Novel Approach to Network Forensic Analysis: Combining Packet Capture Data and Social Network Analysis

Abstract: Log data from computers used for network forensic analysis is ineffective at identifying specific security threats. Log data limitations include the difficulty in reconstructing communication patterns between nodes and the inability to identify more advanced security threats. By combining traditional log data analysis methods with a more effective combination of approaches, a more comprehensive view of communication patterns can be achieved. This combined approach can then help identify potential security thre… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 20 publications
0
0
0
Order By: Relevance
“…The audit is carried out by an information-based computer audit method. The requirements of the traditional audit include assurance, economic supervision, and evaluation [29]. Based on the traditional audit, computer audit includes another two requirements: a computer system and a computer.…”
Section: Tax Data Characteristicsmentioning
confidence: 99%
“…The audit is carried out by an information-based computer audit method. The requirements of the traditional audit include assurance, economic supervision, and evaluation [29]. Based on the traditional audit, computer audit includes another two requirements: a computer system and a computer.…”
Section: Tax Data Characteristicsmentioning
confidence: 99%