首页> 外文期刊>Annual review of communications >Network Forensics Methods, Categorization, and Evaluation
【24h】

Network Forensics Methods, Categorization, and Evaluation

机译:网络取证方法,分类和评估

获取原文
获取原文并翻译 | 示例
           

摘要

Traceback methods play an important role in contributing to the effectiveness of network forensics. This paper reviews, categorizes, and addresses evaluation of the methods that have been suggested for the identification of the source of an attack. These methods belong to two categories: the Internet protocol (IP) traceback approaches and the methods that identify the causality of traffic into and out of an intermediate host. For both categories, the problem statement, traceback techniques, and various criteria that can be used to evaluate the methods are addressed and presented. Finally, an attack scenario and open issues on the subject are provided.
机译:追溯方法在提高网络取证效率方面起着重要作用。本文对建议用于识别攻击源的方法进行了回顾,分类和地址评估。这些方法属于两类:Internet协议(IP)追溯方法和识别进出中间主机的流量的因果关系的方法。对于这两种类别,都提出并提出了问题陈述,追溯技术以及可用于评估方法的各种标准。最后,提供了攻击场景和有关该主题的未解决问题。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号