-
2
-
-
24144444085
-
Experience with engineering a network forensics system
-
Springer-Verlag Berlin, Heidelberg
-
A. Almulhem, and I. Traore Experience with engineering a network forensics system Proceedings of the international conference on information networking (ICOIN 2005), Korea, LNCS 3391 2005 Springer-Verlag Berlin, Heidelberg 62 71
-
(2005)
Proceedings of the International Conference on Information Networking (ICOIN 2005), Korea, LNCS 3391
, pp. 62-71
-
-
Almulhem, A.1
Traore, I.2
-
4
-
-
78449249981
-
-
Argus
-
Argus, http://www.qosient.com/argus.
-
-
-
-
7
-
-
4243105024
-
The discipline of Internet forensics
-
H. Berghel The discipline of Internet forensics Communications of the ACM 46 8 2003 15 20
-
(2003)
Communications of the ACM
, vol.46
, Issue.8
, pp. 15-20
-
-
Berghel, H.1
-
8
-
-
78449248134
-
-
Bro, http://www.bro-ids.org.
-
Bro
-
-
-
9
-
-
33748968514
-
Forensic computing: Developing a conceptual approach for an emerging academic discipline
-
July
-
Broucek V, Turner P. Forensic computing: developing a conceptual approach for an emerging academic discipline. In: Fifth Australian Security Research Symposium; July 2001.
-
(2001)
Fifth Australian Security Research Symposium
-
-
Broucek, V.1
Turner, P.2
-
16
-
-
0036870198
-
Network forensics analysis
-
V. Corey, C. Peterman, S. Shearin, M.S. Greenberg, and J.V. Bokkelen Network forensics analysis IEEE Internet Computing 6 6 2002 60 66
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.6
, pp. 60-66
-
-
Corey, V.1
Peterman, C.2
Shearin, S.3
Greenberg, M.S.4
Bokkelen, J.V.5
-
17
-
-
78449266049
-
-
DDOS attackers continue hitting Twitter, Facebook, Google
-
DDOS attackers continue hitting Twitter, Facebook, Google, http://www.computerworld.com/s/article/9136402/.
-
-
-
-
19
-
-
78449262395
-
-
Flow-tools
-
Flow-tools, http://www.splintered.net/sw/flow-tools.
-
-
-
-
22
-
-
78449246660
-
-
Infinistream
-
Infinistream, http://www.netscout.com/Products/infinistream.asp.
-
-
-
-
23
-
-
78449244074
-
-
Iris
-
Iris, http://www.eeye.com/Iris.
-
-
-
-
24
-
-
78449233880
-
-
ISO/IEC 27001. Information technology (security techniques, information security management, requirements)
-
ISO/IEC 27001. Information technology (security techniques, information security management, requirements), http://www.iso.org/iso/catalogue-detail.htm? csnumber=42103 ; 2005.
-
-
-
-
25
-
-
85016936853
-
Palantir: A framework for collaborative incident response and investigation
-
Maryland; April
-
Khurana H, Basney J, Bakht M, Freemon M, Welch V, Butler R. Palantir: a framework for collaborative incident response and investigation. In: Proceedings of the eighth symposium on identity and trust on the Internet, Maryland; April 2009, p. 38-51.
-
(2009)
Proceedings of the Eighth Symposium on Identity and Trust on the Internet
, pp. 38-51
-
-
Khurana, H.1
Basney, J.2
Bakht, M.3
Freemon, M.4
Welch, V.5
Butler, R.6
-
27
-
-
69249213464
-
Network forensics based on fuzzy logic and expert system
-
N. Liao, S. Tian, and T. Wang Network forensics based on fuzzy logic and expert system Computer Communications 32 17 Nov. 2009 1881 1892
-
(2009)
Computer Communications
, vol.32
, Issue.17
, pp. 1881-1892
-
-
Liao, N.1
Tian, S.2
Wang, T.3
-
32
-
-
1542492748
-
Identifying significant features for network forensic analysis using artificial intelligent techniques
-
S. Mukkamala, and A.H. Sung Identifying significant features for network forensic analysis using artificial intelligent techniques International Journal of Digital Evidence 1 4 2003
-
(2003)
International Journal of Digital Evidence
, vol.1
, Issue.4
-
-
Mukkamala, S.1
Sung, A.H.2
-
33
-
-
78449260629
-
-
Master's thesis. Department of Computing Studies, Arizona State University
-
Nagesh A. Distributed network forensics using JADE mobile agent framework. Master's thesis. Department of Computing Studies, Arizona State University; 2007, http://www.technology.asu.edu/files/documents/tradeshow/Dec06/ asha-nagesh-report.pdf
-
(2007)
Distributed Network Forensics Using JADE Mobile Agent Framework
-
-
Nagesh, A.1
-
34
-
-
78449262766
-
-
Nessus
-
Nessus, http://www.nessus.org.
-
-
-
-
35
-
-
78449236680
-
-
NetDetector
-
NetDetector, http://www.niksun.com.
-
-
-
-
36
-
-
78449259144
-
-
NetFlow
-
NetFlow, http://www.cisco.com/web/go/netflow.
-
-
-
-
37
-
-
78449234274
-
-
Network forensics and digital time travel
-
Network forensics and digital time travel, http://www.technewsworld.com/ story/68651.html.
-
-
-
-
38
-
-
78449243894
-
-
netForensics security compliance management
-
netForensics security compliance management, http://www.netforensics.com/ compliance.
-
-
-
-
39
-
-
78449236484
-
-
NetIntercept
-
NetIntercept, http://www.sandstorm.net.
-
-
-
-
40
-
-
78449231518
-
-
NetWitness
-
NetWitness, http://www.netwitness.com.
-
-
-
-
41
-
-
78449253870
-
-
NetworkMiner
-
NetworkMiner, http://networkminer.sourceforge.net.
-
-
-
-
42
-
-
78449254431
-
-
NfDump
-
NfDump, http://nfdump.sourceforge.net/.
-
-
-
-
43
-
-
78449255859
-
-
Ngrep
-
Ngrep, http://ngrep.sourceforge.net.
-
-
-
-
47
-
-
78449238568
-
-
Nmap
-
Nmap, http://www.nmap.org.
-
-
-
-
48
-
-
78449247931
-
-
Ntop
-
Ntop, http://www.ntop.org.
-
-
-
-
49
-
-
78449253692
-
-
OmniPeek
-
OmniPeek, http://www.wildpackets.com.
-
-
-
-
50
-
-
78449248676
-
-
P0f
-
P0f, http://www.lcamtuf.coredump.cx/p0f.shtml.
-
-
-
-
51
-
-
78449255134
-
-
PADS
-
PADS, http://passive.sourceforge.net.
-
-
-
-
53
-
-
33845421705
-
Network forensics and the inside job
-
S. Perry Network forensics and the inside job Network Security 2006 2006 11 13
-
(2006)
Network Security
, vol.2006
, pp. 11-13
-
-
Perry, S.1
-
54
-
-
78449257931
-
-
PyFlag
-
PyFlag, http://www.pyflag.net
-
-
-
-
62
-
-
78449240224
-
-
Sebek
-
Sebek, http://projects.honeynet.org/sebek/.
-
-
-
-
63
-
-
35248838230
-
ForNet: A distributed forensics network
-
Springer
-
K. Shanmugasundaram, N. Memon, A. Savant, and H. Bronnimann ForNet: a distributed forensics network Proceedings of the second international workshop on mathematical methods models and architectures for computer networks security (MMM-ACNS 2003), LNCS 2776 2003 Springer 1 16
-
(2003)
Proceedings of the Second International Workshop on Mathematical Methods Models and Architectures for Computer Networks Security (MMM-ACNS 2003), LNCS 2776
, pp. 1-16
-
-
Shanmugasundaram, K.1
Memon, N.2
Savant, A.3
Bronnimann, H.4
-
64
-
-
78449253165
-
-
SilentRunner
-
SilentRunner, http://www.accessdata.com/silentrunner.html.
-
-
-
-
65
-
-
78449232966
-
-
SiLK
-
SiLK, http://tools.netsa.cert.org/silk/.
-
-
-
-
67
-
-
78449254939
-
-
Snort
-
Snort, http://www.snort.org.
-
-
-
-
68
-
-
78449257356
-
-
Solera DS 5150, DeepSee
-
Solera DS 5150, DeepSee, http://www.soleranetworks.com.
-
-
-
-
70
-
-
78449259143
-
-
TCPDstat
-
TCPDstat, http://staff.washington.edu/dittrich/talks/core02/tools.
-
-
-
-
71
-
-
78449252977
-
-
TCPDump
-
TCPDump, http://www.tcpdump.org.
-
-
-
-
72
-
-
78449251254
-
-
TCPFlow
-
TCPFlow, http://www.circlemud.org/jelson/software/tcpflow.
-
-
-
-
73
-
-
78449262210
-
-
TCPReplay
-
TCPReplay, http://tcpreplay.synfin.net/trac/.
-
-
-
-
74
-
-
78449242441
-
-
TCPStat
-
TCPStat, http://www.frenchfries.net/paul/tcpstat.
-
-
-
-
75
-
-
78449261629
-
-
TCPTrace
-
TCPTrace, http://www.tcptrace.org.
-
-
-
-
76
-
-
78449256219
-
-
TCPXtract
-
TCPXtract, http://tcpxtract.sourceforge.net.
-
-
-
-
81
-
-
38049056759
-
Dynamical network forensics based on immune agent
-
D. Wang, T. Li, S. Liu, J. Zhang, and C. Liu Dynamical network forensics based on immune agent Proceedings of the international conference on natural computation (ICNC 2007) vol. 3 Aug. 2007 651-656
-
(2007)
Proceedings of the International Conference on Natural Computation (ICNC 2007)
, vol.3
-
-
Wang, D.1
Li, T.2
Liu, S.3
Zhang, J.4
Liu, C.5
-
82
-
-
78449256615
-
-
Why is Twitter so vulnerable to DDoS attack?
-
Why is Twitter so vulnerable to DDoS attack?, http://www.crn.com/ security/219300104.
-
-
-
-
83
-
-
78449240040
-
-
Wireshark
-
Wireshark, http://www.wireshark.org.
-
-
-
-
84
-
-
78449237852
-
-
Xplico
-
Xplico, http://www.xplico.org.
-
-
-
-
86
-
-
77749306505
-
Honeytraps, a network forensic tool
-
Florida, USA
-
Yasinsac A, Manzano Y. Honeytraps, a network forensic tool. In: Proceedings of the sixth multi-conference on systemics, cybernetics and informatics, Florida, USA; 2002.
-
(2002)
Proceedings of the Sixth Multi-conference on Systemics, Cybernetics and Informatics
-
-
Yasinsac, A.1
Manzano, Y.2
|