Research Article
Cooperation Forensic Computing Research
@INPROCEEDINGS{10.4108/wkdd.2008.2687, author={Youdong ZHANG}, title={Cooperation Forensic Computing Research}, proceedings={1st International ICST Workshop on Knowledge Discovery and Data Mining}, publisher={ACM}, proceedings_a={WKDD}, year={2010}, month={5}, keywords={}, doi={10.4108/wkdd.2008.2687} }
- Youdong ZHANG
Year: 2010
Cooperation Forensic Computing Research
WKDD
ACM
DOI: 10.4108/wkdd.2008.2687
Abstract
The network forensic computing is faced with the question of the complex network intrusion analyses. So a new concept of cooperation forensic computing is defined. Through to extend the theory of function dependency, a new method called probability function dependency relationships is proposed. Combined it with the Bayesian network and K2 algorithm, the network forensic computing algorithm called CFA is proposed. For the complex network attack, CFA is able to synthesize the various forensic data resource to reappearance the crime scenario intuitionally and realize the network forensic analysis effectively.
Copyright © 2008–2024 ICST