1st International ICST Workshop on Knowledge Discovery and Data Mining

Research Article

Cooperation Forensic Computing Research

  • @INPROCEEDINGS{10.4108/wkdd.2008.2687,
        author={Youdong ZHANG},
        title={Cooperation Forensic Computing Research},
        proceedings={1st International ICST Workshop on Knowledge Discovery and Data Mining},
        publisher={ACM},
        proceedings_a={WKDD},
        year={2010},
        month={5},
        keywords={},
        doi={10.4108/wkdd.2008.2687}
    }
    
  • Youdong ZHANG
    Year: 2010
    Cooperation Forensic Computing Research
    WKDD
    ACM
    DOI: 10.4108/wkdd.2008.2687
Youdong ZHANG1,*
  • 1: Department of Computer Engineering, Huaiyin Institute of Technology, Huaian, China.
*Contact email: z.yd@163.com

Abstract

The network forensic computing is faced with the question of the complex network intrusion analyses. So a new concept of cooperation forensic computing is defined. Through to extend the theory of function dependency, a new method called probability function dependency relationships is proposed. Combined it with the Bayesian network and K2 algorithm, the network forensic computing algorithm called CFA is proposed. For the complex network attack, CFA is able to synthesize the various forensic data resource to reappearance the crime scenario intuitionally and realize the network forensic analysis effectively.