首页    期刊浏览 2024年09月16日 星期一
登录注册

文章基本信息

  • 标题:Network Intrusion Forensic Analysis Using Intrusion Detection System
  • 本地全文:下载
  • 作者:Manish Kumar ; Dr.M Hanumanthappa ; Dr.T V Suresh Kumar
  • 期刊名称:International Journal of Computer Technology and Applications
  • 电子版ISSN:2229-6093
  • 出版年度:2011
  • 卷号:2
  • 期号:3
  • 页码:612-618
  • 出版社:Technopark Publications
  • 摘要:The need for computer intrusion forensics arises from the alarming increase in the number of computer crimes that are committed annually. After a computer system has been breached and an intrusion has been detected, there is a need for a computer forensics investigation to follow. Computer forensics is used to bring to justice, those responsible for conducting attacks on computer systems throughout the world. Because of this the law must be follow precisely when conducting a forensics investigation. It is not enough to simple know an attacker is responsible for the crime, the forensics investigation must be carried out in a precise manner that will produce evidence that is amicable in a court room. For computer intrusion forensics many methodologies have been designed to be used when conducting an investigation. With the birth of the Internet and networks, the computer intrusion has never been as significant as it is now. There are different preventive measures available, such as access control and authentication, to attempt to prevent intruders. Intrusion detection systems (IDS) are developed to detect an intrusion as it occurs, and to execute countermeasures when detected. Intrusion detection (ID) takes over where preventive security fails. In order to choose the best IDS for a given system, one should be aware of the advantages and disadvantages of the each IDS. This paper views a forensic application within the framework of Intrusion Detection and details the advantages and disadvantages of IDS
  • 关键词:Intrusion Detection System; Network Forensic; IP Spoofing
国家哲学社会科学文献中心版权所有