000 | 11257nam a22012735i 4500 | ||
---|---|---|---|
001 | 9783110677478 | ||
003 | DE-B1597 | ||
005 | 20240730161550.0 | ||
006 | m|||||o||d|||||||| | ||
007 | cr || |||||||| | ||
008 | 230228t20212021gw fo d z eng d | ||
020 | _a9783110677478 | ||
024 | 7 |
_a10.1515/9783110677478 _2doi |
|
035 | _a(DE-B1597)536547 | ||
035 | _a(OCoLC)1266228156 | ||
040 |
_aDE-B1597 _beng _cDE-B1597 _erda |
||
041 | 0 | _aeng | |
044 |
_agw _cDE |
||
072 | 7 |
_aCOM004000 _2bisacsh |
|
084 |
_aST 300 _qDE-Ofb1/22 _2rvk _0(DE-625)rvk/143650: |
||
245 | 0 | 0 |
_aCyber Crime and Forensic Computing : _bModern Principles, Practices, and Algorithms / _ced. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma. |
264 | 1 |
_aBerlin ; _aBoston : _bDe Gruyter, _c[2021] |
|
264 | 4 | _c©2021 | |
300 | _a1 online resource (X, 230 p.) | ||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 0 |
_aDe Gruyter Frontiers in Computational Intelligence , _x2512-8868 ; _v11 |
|
505 | 0 | 0 |
_tFrontmatter -- _tContents -- _tAbout the editors -- _tA survey of popular digital forensic tools -- _tAn insight review on multimedia forensics technology -- _tAn overview on advanced multimedia forensic techniques and future direction -- _tComputer forensics and Cyber Crimes: COVID-19 perspective -- _tBiometric forensic tools for criminal investigation -- _tDeep learning for optimization of e-evidence -- _tElectronic voting machine security issues and solution protocol by physical unclonable function -- _tMachine learning for mobile malware analysis -- _tMobile platform security: issues and countermeasures -- _tData leakage detection in Wi-Fi networks -- _tIndex |
506 | 0 |
_arestricted access _uhttp://purl.org/coar/access_right/c_16ec _fonline access with authorization _2star |
|
520 | _aThis book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today's organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders' abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature. | ||
530 | _aIssued also in print. | ||
538 | _aMode of access: Internet via World Wide Web. | ||
546 | _aIn English. | ||
588 | 0 | _aDescription based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023) | |
650 | 4 |
_aAlgorithmus. _963838 |
|
650 | 4 |
_aBig Data. _94174 |
|
650 | 4 |
_aComputerforensik. _976275 |
|
650 | 4 |
_aForensische Informatik. _976276 |
|
650 | 4 |
_aKünstliche Intelligenz. _975263 |
|
650 | 4 |
_aMaschinelles Lernen. _975264 |
|
650 | 7 |
_aCOMPUTERS / Intelligence (AI) & Semantics. _2bisacsh _976277 |
|
700 | 1 |
_aAgarwal, Prerna, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976278 |
|
700 | 1 |
_aArora, Shefali, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976279 |
|
700 | 1 |
_aBhatia, M. P. S., _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976280 |
|
700 | 1 |
_aGarg, Puneet, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976281 |
|
700 | 1 |
_aGupta, Deepak, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976282 |
|
700 | 1 |
_aGupta, Deepak, _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _976282 |
|
700 | 1 |
_aGupta, Swati, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976283 |
|
700 | 1 |
_aHariharan, K., _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976284 |
|
700 | 1 |
_aKumar, Ambeshwar, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976285 |
|
700 | 1 |
_aKumar, Prashant, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976286 |
|
700 | 1 |
_aKumar, Sachil, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976287 |
|
700 | 1 |
_aKumari, Meet, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976288 |
|
700 | 1 |
_aManikandan, R., _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _9885 |
|
700 | 1 |
_aMeenakshi,, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976289 |
|
700 | 1 |
_aMittal, Ruchi, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976290 |
|
700 | 1 |
_aPurohit, Gaurav, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976291 |
|
700 | 1 |
_aRajkumar, K., _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976292 |
|
700 | 1 |
_aRaju, Solomon, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976293 |
|
700 | 1 |
_aSaxena, Geetika, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976294 |
|
700 | 1 |
_aSelvakumari, R. Shantha, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976295 |
|
700 | 1 |
_aSharma, Anand, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976296 |
|
700 | 1 |
_aSharma, Kavita, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976297 |
|
700 | 1 |
_aSharma, Kavita, _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _976297 |
|
700 | 1 |
_aShrivastava, Gulshan, _eeditor. _4edt _4http://id.loc.gov/vocabulary/relators/edt _976298 |
|
700 | 1 |
_aShrivastava, Pranav, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976299 |
|
700 | 1 |
_aSivasankari, N., _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976300 |
|
700 | 1 |
_aTanwar, Pramod, _econtributor. _4ctb _4https://id.loc.gov/vocabulary/relators/ctb _976301 |
|
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tDG Ebook Package English 2021 _z9783110750720 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tDG Plus DeG Package 2021 Part 1 _z9783110750706 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tDe Gruyter English eBooks 2020 - UC _z9783110659061 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE COMPLETE 2021 English _z9783110754001 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE COMPLETE 2021 _z9783110753776 _oZDB-23-DGG |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE Engineering, Computer Sciences 2021 English _z9783110754070 |
773 | 0 | 8 |
_iTitle is part of eBook package: _dDe Gruyter _tEBOOK PACKAGE Engineering, Computer Sciences 2021 _z9783110753837 _oZDB-23-DEI |
776 | 0 |
_cEPUB _z9783110677546 |
|
776 | 0 |
_cprint _z9783110677379 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1515/9783110677478 |
856 | 4 | 0 | _uhttps://www.degruyter.com/isbn/9783110677478 |
856 | 4 | 2 |
_3Cover _uhttps://www.degruyter.com/document/cover/isbn/9783110677478/original |
912 |
_a978-3-11-065906-1 De Gruyter English eBooks 2020 - UC _b2020 |
||
912 |
_a978-3-11-075070-6 DG Plus DeG Package 2021 Part 1 _b2021 |
||
912 |
_a978-3-11-075072-0 DG Ebook Package English 2021 _b2021 |
||
912 |
_a978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English _b2021 |
||
912 |
_a978-3-11-075407-0 EBOOK PACKAGE Engineering, Computer Sciences 2021 English _b2021 |
||
912 | _aEBA_CL_CHCOMSGSEN | ||
912 | _aEBA_CL_LAEC | ||
912 | _aEBA_DGALL | ||
912 | _aEBA_EBKALL | ||
912 | _aEBA_ECL_CHCOMSGSEN | ||
912 | _aEBA_ECL_LAEC | ||
912 | _aEBA_EEBKALL | ||
912 | _aEBA_ESSHALL | ||
912 | _aEBA_ESTMALL | ||
912 | _aEBA_SSHALL | ||
912 | _aEBA_STMALL | ||
912 | _aGBV-deGruyter-alles | ||
912 | _aPDA11SSHE | ||
912 | _aPDA12STME | ||
912 | _aPDA13ENGE | ||
912 | _aPDA17SSHEE | ||
912 | _aPDA18STMEE | ||
912 | _aPDA5EBK | ||
912 |
_aZDB-23-DEI _b2021 |
||
912 |
_aZDB-23-DGG _b2021 |
||
942 | _cEBK | ||
999 |
_c84438 _d84438 |