Open Access
An Anatomy for Recognizing Network Attack Intention
Author(s) -
Anchit Bijalwan*,
Satenaw Sando,
Muluneh Lemma
Publication year - 2019
Publication title -
international journal of recent technology and engineering
Language(s) - English
Resource type - Journals
ISSN - 2277-3878
DOI - 10.35940/ijrte.c4022.098319
Subject(s) - network forensics , computer science , computer security , process (computing) , architecture , computer forensics , field (mathematics) , network security , network architecture , digital forensics , art , mathematics , pure mathematics , visual arts , operating system
Research in the field of Network forensics is tremendously expanding with the tendency to help in arbitrating, capturing and detaining the exponential growth of the cyber crimes. With this expansion, the field of Network forensics is still not clear and is uncertain. In this paper, we have presented the architecture of an analysis mechanism for network forensics. The work followed by generic process model for network forensics investigation is also presented and discussed in detail. Overall this paper presents an overview of the network forensics architecture, generic process models to help a user in the times of emergency by considering the incident and thus maintaining the privacy and security policies.