The 2011 International Joint Conference on Neural Networks 2011
DOI: 10.1109/ijcnn.2011.6033434
|View full text |Cite
|
Sign up to set email alerts
|

Visualisation of network forensics traffic data with a self-organising map for qualitative features

Abstract: Digital crimes are a part of modern life but evidence of these crimes can be captured in network traffic data logs.Analysing these logs is a difficult process, this is especially true as the format that different attacks can take can vary tremendously and may be unknown at the time of the analysis. The main objective of the field of network forensics consists of gathering ev idence of illegal acts from a networking infrastructure. Therefore, software tools, and techniques, that can help with these digital inve… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2012
2012
2020
2020

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(3 citation statements)
references
References 10 publications
0
3
0
Order By: Relevance
“…Similarly, Palomo et al (2011) focussed upon the analysis and visualisation of network traffic data via the use of SOM to identify abnormal behaviour or intrusions. For their experiment, a dataset with 150,871 packet samples was created by monitoring a university network via WireShark during a four-day period; each sample contained nine features, including the IP addresses of source and destination, port numbers, protocol type, date and time stamps, and packet length.…”
Section: Related Workmentioning
confidence: 99%
“…Similarly, Palomo et al (2011) focussed upon the analysis and visualisation of network traffic data via the use of SOM to identify abnormal behaviour or intrusions. For their experiment, a dataset with 150,871 packet samples was created by monitoring a university network via WireShark during a four-day period; each sample contained nine features, including the IP addresses of source and destination, port numbers, protocol type, date and time stamps, and packet length.…”
Section: Related Workmentioning
confidence: 99%
“…Once that issue is resolved and the raw files are collected and duplicates are obtained, the forensic investigator can proceed at a pace which allows for appropriate diligence and care. The investigator begins by importing a toolset which allows for brute force password cracking [11]. After access is obtained, the file and directory structure is reconstructed onto the desktop of the workstation.…”
Section: Container and Vm Forensicsmentioning
confidence: 99%
“…However, this approach focusses on the extraction of evidence rather than the visualisation of the social networks discovered. Palomo et al (2011) focus on the visualisation of network traffic through self-organising maps to identify anomalous behaviour or system intrusions. However, this approach focusses on the identification and visualisation of network artefacts, such as source ports, destination addresses, protocols, etc.…”
Section: Email Network Narrativesmentioning
confidence: 99%