Menu
Home
Advanced Search
Directory of Libraries
عنوان
Fundamentals of network forensics :
پدید آورنده
موضوع
Computer crimes-- Investigation.,Computer networks-- Security measures.,Cyber intelligence (Computer security)
رده
TK5105
.
59
کتابخانه
Center and Library of Islamic Studies in European Languages
محل استقرار
استان:
Qom
ـ شهر:
Qom
تماس با کتابخانه :
32910706
-
025
INTERNATIONAL STANDARD BOOK NUMBER
(Number (ISBN
144717299X
(Number (ISBN
9781447172994
Erroneous ISBN
1447172973
Erroneous ISBN
9781447172970
NATIONAL BIBLIOGRAPHY NUMBER
Number
dltt
TITLE AND STATEMENT OF RESPONSIBILITY
Title Proper
Fundamentals of network forensics :
General Material Designation
[Book]
Other Title Information
a research perspective
PHYSICAL DESCRIPTION
Specific Material Designation and Extent of Item
1 online resource
CONTENTS NOTE
Text of Note
Preface; Introduction; Audience; Organization of the Book; Tools; Acknowledgements; Contents; Part I Fundamentals; 1 Network Forensics; 1.1 Introduction; 1.2 Definition of Network Forensics; 1.3 Classification of Network Forensic Systems; 1.4 Motivation; 1.5 Recent Trends in Network Forensics; 1.6 Challenges in Network Forensic Analysis; 1.7 Conclusion; 1.8 Questions; References; 2 Network Forensic Process Models; 2.1 Digital Forensic Process Models; 2.2 Hierarchical Process Model; Preparation; Incident Response Phase; Data Collection Phase; Data Analysis Phase; Presentation of Findings Phase
Text of Note
4 Network Forensic Tools4.1 Introduction; 4.2 Network Forensic Analysis Tools (NFAT); NetDetector; NetIntercept; OmniPeek; Python Forensic Log Analysis GUI (PyFLAG); Xplico; 4.3 Vulnerability Assessment Tools; Metasploit; Nessus; Nikto; Yersinia; Wikto; Acunetix Web Vulnerability Scanner; 4.4 Network Sniffing and Packet Analyzing Tools; Wireshark; Aircrack-ng; WebScarab; ngrep; NetworkMiner; Kismet; eMailTrackerPro; 4.5 Network Scanning Tools; Nmap; Angry IP Scanner; Wireless Network Watcher; 4.6 Network Monitoring Tools; IPTraf; VisualRoute; Ntop; TCPStat
Text of Note
4.7 Intrusion Detection Systems (IDS)Snort; Bro; 4.8 Conclusion; 4.9 Questions; References; Part II Techniques; 5 Network Forensic Acquisition; 5.1 TCP/IP Protocol Suite; 5.2 Packet Capture Format; 5.3 pcapng Dump File Format; 5.4 NetFlow Record Format; 5.5 Internet Protocol Flow Information Export (IPFIX) Format; 5.6 Conclusion; 5.7 Questions; References; 6 Network Forensic Analysis; 6.1 Misuse Detection; 6.1.1 Naive Bayes; 6.1.2 Decision Tree; 6.1.3 Nearest Neighbor; 6.1.4 Back Propagation Neural Network; 6.1.5 Support Vector Machine; 6.2 Anomaly Detection; 6.2.1 Self-Organizing Map
Text of Note
6.2.2 Apriori Algorithm6.2.3 K-Means Clustering; 6.2.4 Genetic Algorithm; 6.2.5 DBSCAN; 6.3 Conclusion; 6.4 Questions; Short-Answer Questions; Long-Answer Questions; References; 7 Network Forensic Attribution; 7.1 Probabilistic Packet Marking; 7.2 Deterministic Packet Marking; 7.3 Autonomous System-Based Traceback; 7.4 Router and Interface Marking; 7.5 Network Forensic Traceback; 7.6 Conclusion; 7.7 Questions; References; Part III Advances; 8 Botnet Forensics; 8.1 Introduction; 8.2 Botnets Forensics; 8.3 Acquisition; 8.4 Analysis; Spam-Based Analysis
Text of Note
Incident Closure Phase2.3 Network Forensic Process Models; 2.4 Generic Process Model for Network Forensics; Preparation; Detection; Incident Response; Collection; Preservation; Examination; Analysis; Investigation; Presentation; 2.5 Conclusion; 2.6 Questions; References; 3 Network Forensic Frameworks; 3.1 Distributed Systems-Based Frameworks; 3.2 Soft Computing-Based Frameworks; 3.3 Honeynet-Based Frameworks; 3.4 Attack Graph-Based Frameworks; 3.5 Formal Method-Based Frameworks; 3.6 Aggregation-Based Frameworks; 3.7 Data Mining-Based Frameworks; 3.8 Conclusion; 3.9 Questions; References
0
8
8
8
8
OTHER EDITION IN ANOTHER MEDIUM
International Standard Book Number
9781447172970
TOPICAL NAME USED AS SUBJECT
Computer crimes-- Investigation.
Computer networks-- Security measures.
Cyber intelligence (Computer security)
DEWEY DECIMAL CLASSIFICATION
Number
004
LIBRARY OF CONGRESS CLASSIFICATION
Class number
TK5105
.
59
PERSONAL NAME - PRIMARY RESPONSIBILITY
Joshi, R. C.
CORPORATE BODY NAME - ALTERNATIVE RESPONSIBILITY
Ohio Library and Information Network.
ORIGINATING SOURCE
Date of Transaction
20161209095707.8
Cataloguing Rules (Descriptive Conventions))
rda
ELECTRONIC LOCATION AND ACCESS
Electronic name
مطالعه متن کتاب
[Book]
Y
Proposal/Bug Report
×
Proposal/Bug Report
×
Warning!
Enter The Information Carefully
Error Report
Proposal