About | Contact Us | Register | Login
ProceedingsSeriesJournalsSearchEAI
Intelligent Systems and Machine Learning. First EAI International Conference, ICISML 2022, Hyderabad, India, December 16-17, 2022, Proceedings, Part I

Research Article

An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration

Cite
BibTeX Plain Text
  • @INPROCEEDINGS{10.1007/978-3-031-35078-8_28,
        author={Saswati Chatterjee and Lal Mohan Pattnaik and Suneeta Satpathy},
        title={An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration},
        proceedings={Intelligent Systems and Machine Learning. First EAI International Conference, ICISML 2022, Hyderabad, India, December 16-17, 2022, Proceedings, Part I},
        proceedings_a={ICISML},
        year={2023},
        month={7},
        keywords={Network Forensic Intrusion Detection System Attack Analysis Attack Intention},
        doi={10.1007/978-3-031-35078-8_28}
    }
    
  • Saswati Chatterjee
    Lal Mohan Pattnaik
    Suneeta Satpathy
    Year: 2023
    An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration
    ICISML
    Springer
    DOI: 10.1007/978-3-031-35078-8_28
Saswati Chatterjee1,*, Lal Mohan Pattnaik1, Suneeta Satpathy1
  • 1: Faculty of Emerging Technologies, Sri Sri University
*Contact email: cshiva68@gmail.com

Abstract

Cyberattacks are occurring increasingly frequently as cyber science advances and people utilize the internet and other technology on a regular basis. Digital forensics is used to assess malicious evidence found in a network or system and compile it in a fashion that may be used in court. Network forensic analysis is a method for looking through intrusion data received from a networked environment in order to spot suspicious entities. Utilizing intrusion detection systems (IDS), such as Snort and Wireshark, is the initial step in spotting and reporting a network flooding attack.

As technology has advanced and its use has significantly expanded, there is a higher likelihood of attacks on computer networks. In order to help with the identification and/or prevention of such assaults, many techniques have been developed. One well-liked technique is the use of network intrusion detection and prevention systems or NIDS. Businesses can choose from a variety of open-source and commercial intrusion detection systems nowadays, but the fundamental problem is still their performance. An intrusion detection system's job is to safeguard a network against risks posed by security experts, hackers, and crackers as well as the possibility of unlawful activities. A network administrator needs to develop their signature and keep up with new attack types because issues might arise when new attacks appear quickly. IDS would monitor network traffic and only compare packets that included signatures from its own signature database or traits of known failed attacks in the past.

Keywords
Network Forensic Intrusion Detection System Attack Analysis Attack Intention
Published
2023-07-10
Appears in
SpringerLink
http://dx.doi.org/10.1007/978-3-031-35078-8_28
Copyright © 2022–2025 ICST
EBSCOProQuestDBLPDOAJPortico
EAI Logo

About EAI

  • Who We Are
  • Leadership
  • Research Areas
  • Partners
  • Media Center

Community

  • Membership
  • Conference
  • Recognition
  • Sponsor Us

Publish with EAI

  • Publishing
  • Journals
  • Proceedings
  • Books
  • EUDL