1st International ICST Workshop on Computer Network Forensics Research Workshop

Research Article

Modeling the network forensics behaviors

  • @INPROCEEDINGS{10.1109/SECCMW.2005.1588287,
        author={Wei Ren and Samuel  Chanson},
        title={Modeling the network forensics behaviors},
        proceedings={1st International ICST Workshop on Computer Network Forensics Research Workshop},
        publisher={IEEE},
        proceedings_a={CNFR},
        year={2006},
        month={2},
        keywords={},
        doi={10.1109/SECCMW.2005.1588287}
    }
    
  • Wei Ren
    Samuel Chanson
    Year: 2006
    Modeling the network forensics behaviors
    CNFR
    ICST
    DOI: 10.1109/SECCMW.2005.1588287
Wei Ren1,2,*, Samuel Chanson1,2
  • 1: Dept. of Comupter Science, Hong Kong Univ. of Science & Technology,
  • 2: Hong Kong Univ. of Science & Technology
*Contact email: renw@cs.ust.hk

Abstract

Network forensics is a new coming approach to the network security. However, this field is not very clear to the new researchers. In this paper, we discuss the network forensics behaviors systematically from both the technical view and legal view. The goal of discussion is to outline the formalization and standardization of the network forensics behaviors. To our knowledge, this is the first time to comprehensively discuss the network forensics model and its fundamental fields, such as taxonomy, conceptual model, legal principles, key techniques, canonical processes and its accessory facilities and systems - network forensics system architecture and deployment. These discussions will give the guidance to the standardization of network forensics processes and the implementation of prototype system.