An Anatomy for Recognizing Network Attack Intention

Show simple item record

dc.contributor.author Anchit Bijalwan, Satenaw Sando, Muluneh Lemma
dc.date.accessioned 2020-09-18T08:22:25Z
dc.date.available 2020-09-18T08:22:25Z
dc.date.issued 201-01
dc.identifier.citation International Journal of Recent Technology and Engineering (IJRTE en_US
dc.identifier.issn 2277-3878
dc.identifier.uri http://hdl.handle.net/123456789/1571
dc.description.abstract Research in the field of Network forensics is tremendously expanding with the tendency to help in arbitrating, capturing and detaining the exponential growth of the cyber crimes. With this expansion, the field of Network forensics is still not clear and is uncertain. In this paper, we have presented the architecture of an analysis mechanism for network forensics. The work followed by generic process model for network forensics investigation is also presented and discussed in detail. Overall this paper presents an overview of the network forensics architecture, generic process models to help a user in the times of emergency by considering the incident and thus maintaining the privacy and security policies. Index en_US
dc.language.iso en en_US
dc.publisher ARBAMINCH UNIVERSITY en_US
dc.subject Index Terms: Network Forensics, Attack Intention, Traceback, Attribution, Incident response en_US
dc.title An Anatomy for Recognizing Network Attack Intention en_US
dc.type Article en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record

Search AMU IR


Advanced Search

Browse

My Account