2015 Fifth International Conference on Communication Systems and Network Technologies 2015
DOI: 10.1109/csnt.2015.204
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensic Tool -- Concept and Architecture

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(1 citation statement)
references
References 6 publications
0
1
0
Order By: Relevance
“…Network forensic tools help in network investigation to gather essential information about an intrusion activity. These tools are used to analyze network traffic to identify the nature and type of activities within the network over a specific duration [45]. The forensic tools are designed so that they are compatible with network hardware devices such as firewalls, thereby making it possible to collect and preserve network traffic.…”
Section: Network Forensic Toolsmentioning
confidence: 99%
“…Network forensic tools help in network investigation to gather essential information about an intrusion activity. These tools are used to analyze network traffic to identify the nature and type of activities within the network over a specific duration [45]. The forensic tools are designed so that they are compatible with network hardware devices such as firewalls, thereby making it possible to collect and preserve network traffic.…”
Section: Network Forensic Toolsmentioning
confidence: 99%