2011
DOI: 10.1007/978-3-642-22540-6_3
|View full text |Cite
|
Sign up to set email alerts
|

Defense Strategy against Network Worms Causing ICMP Attacks and Its Forensic Analysis

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2013
2013

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 3 publications
0
2
0
Order By: Relevance
“…Additionally, it is practically infeasible to log all raw traffic data for forensic purpose (Mukkamala, 2003) due to lack of availability of storage resources 8 . In (Garfinkel, 2010;Palmer, 2001;Pilli, 2010b;Nance, 2011;Aathira & Kutty, 2011) the following research challenges were identified:…”
Section: Challenges In Network Forensicsmentioning
confidence: 99%
See 1 more Smart Citation
“…Additionally, it is practically infeasible to log all raw traffic data for forensic purpose (Mukkamala, 2003) due to lack of availability of storage resources 8 . In (Garfinkel, 2010;Palmer, 2001;Pilli, 2010b;Nance, 2011;Aathira & Kutty, 2011) the following research challenges were identified:…”
Section: Challenges In Network Forensicsmentioning
confidence: 99%
“…An answer to these questions forms the premise for efficient data analysis. Aathira and Kutty (2011) implemented ICMP defense mechanism using the integration of network forensics capability into network security system.…”
Section: Network Forensic Analysis Researchmentioning
confidence: 99%