Please use this identifier to cite or link to this item: https://idr.nitk.ac.in/jspui/handle/123456789/7304
Full metadata record
DC FieldValueLanguage
dc.contributor.authorManesh, T.-
dc.contributor.authorBrijith, B.-
dc.contributor.authorSingh, M.P.-
dc.date.accessioned2020-03-30T09:58:48Z-
dc.date.available2020-03-30T09:58:48Z-
dc.date.issued2011-
dc.identifier.citationCommunications in Computer and Information Science, 2011, Vol.203 CCIS, , pp.385-392en_US
dc.identifier.urihttp://idr.nitk.ac.in/jspui/handle/123456789/7304-
dc.description.abstractNetwork packet analysis and reconstruction of network sessions are more sophisticated processes in any network forensic and analysis system. Here we introduce an integrated technique which can be used for inspecting, reordering and reconstructing the contents of packets in a network session as part of forensic investigation. Network analysts should be able to observe the stored packet information when a suspicious activity is reported and should collect adequate supporting evidences from stored packet information by recreating the original data/files/messages sent/received by each user. Thus suspicious user activities can be found by monitoring the packets in offline. So we need an efficient method for reordering packets and reconstructing the files or documents to execute forensic investigation and to create necessary evidence against any network crime. The proposed technique can be used for content level analysis of packets passing through the network based on HTTP and FTP protocols and reports deceptive network activities in the enterprise for forensic analysis. � 2011 Springer-Verlag.en_US
dc.titleAn improved approach towards network forensic investigation of HTTP and FTP protocolsen_US
dc.typeBook chapteren_US
Appears in Collections:2. Conference Papers

Files in This Item:
File Description SizeFormat 
7304.pdf180.81 kBAdobe PDFThumbnail
View/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.