
Research Article
An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration
@INPROCEEDINGS{10.1007/978-3-031-35078-8_28, author={Saswati Chatterjee and Lal Mohan Pattnaik and Suneeta Satpathy}, title={An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration}, proceedings={Intelligent Systems and Machine Learning. First EAI International Conference, ICISML 2022, Hyderabad, India, December 16-17, 2022, Proceedings, Part I}, proceedings_a={ICISML}, year={2023}, month={7}, keywords={Network Forensic Intrusion Detection System Attack Analysis Attack Intention}, doi={10.1007/978-3-031-35078-8_28} }
- Saswati Chatterjee
Lal Mohan Pattnaik
Suneeta Satpathy
Year: 2023
An Intrusion Detection System and Attack Intension Used in Network Forensic Exploration
ICISML
Springer
DOI: 10.1007/978-3-031-35078-8_28
Abstract
Cyberattacks are occurring increasingly frequently as cyber science advances and people utilize the internet and other technology on a regular basis. Digital forensics is used to assess malicious evidence found in a network or system and compile it in a fashion that may be used in court. Network forensic analysis is a method for looking through intrusion data received from a networked environment in order to spot suspicious entities. Utilizing intrusion detection systems (IDS), such as Snort and Wireshark, is the initial step in spotting and reporting a network flooding attack.
As technology has advanced and its use has significantly expanded, there is a higher likelihood of attacks on computer networks. In order to help with the identification and/or prevention of such assaults, many techniques have been developed. One well-liked technique is the use of network intrusion detection and prevention systems or NIDS. Businesses can choose from a variety of open-source and commercial intrusion detection systems nowadays, but the fundamental problem is still their performance. An intrusion detection system's job is to safeguard a network against risks posed by security experts, hackers, and crackers as well as the possibility of unlawful activities. A network administrator needs to develop their signature and keep up with new attack types because issues might arise when new attacks appear quickly. IDS would monitor network traffic and only compare packets that included signatures from its own signature database or traits of known failed attacks in the past.