The Open Automation and Control Systems Journal

2013, 5 : 167-173
Published online 2013 December 27. DOI: 10.2174/1874444301305010167
Publisher ID: TOAUTOCJ-5-167

The Application Research on Network Forensics

Hu Jingfang and Li Busheng
School of Information Engineering, Jingdezhen Ceramic Institute, Jiangxi, P.R. China, 333403.

ABSTRACT

With the development of network technology, computer crime, network forensics as a kind of active network security defense, has gained widely research and application. This article detailed introduces the concept of network Forensics, Forensics process, Forensics model and some common techniques and methods, the analysis of the Realtime Intrusion Forensics and other four kinds of typical network Forensics system framework on the basis of the Intrusion detection system is discussed combined with network Forensics system, the feasibility of the proposed and analyzed based on Intrusion tolerance, monitoring technologies such as network Forensics system design thought.

Keywords:

Computer crimes, network forensics, intrusion tolerance.