Vol. 2 No. 2 (2022): African Journal of Artificial Intelligence and Sustainable Development
Articles

Network Forensics - Investigation Techniques: Investigating investigation techniques in network forensics for analyzing and reconstructing cyber attacks, data breaches, and security incidents

Dr. Li Wang
Professor of Electrical Engineering, Beijing Jiaotong University, China
Dr. Li Wang
Professor of Electrical Engineering, Beijing Jiaotong University, China
Cover

Published 11-08-2022

Keywords

  • Network Forensics,
  • Investigation Techniques,
  • Cybersecurity

How to Cite

[1]
Dr. Li Wang and Dr. Li Wang, “Network Forensics - Investigation Techniques: Investigating investigation techniques in network forensics for analyzing and reconstructing cyber attacks, data breaches, and security incidents”, African J. of Artificial Int. and Sust. Dev., vol. 2, no. 2, pp. 101–112, Aug. 2022, Accessed: Sep. 19, 2024. [Online]. Available: https://africansciencegroup.com/index.php/AJAISD/article/view/110

Abstract

Network forensics plays a crucial role in modern cybersecurity, enabling the investigation, analysis, and reconstruction of cyber attacks, data breaches, and security incidents. This paper explores various investigation techniques used in network forensics, highlighting their importance in identifying attackers, understanding attack vectors, and mitigating future threats. We delve into the tools, methodologies, and challenges associated with network forensics, providing insights into how organizations can enhance their cybersecurity posture through effective forensic investigations.

Downloads

Download data is not yet available.

References

  1. Prabhod, Kummaragunta Joel. "ANALYZING THE ROLE OF ARTIFICIAL INTELLIGENCE AND MACHINE LEARNING TECHNIQUES IN IMPROVING PRODUCTION SYSTEMS." Science, Technology and Development 10.7 (2021): 698-707.
  2. Sadhu, Amith Kumar Reddy, and Ashok Kumar Reddy Sadhu. "Fortifying the Frontier: A Critical Examination of Best Practices, Emerging Trends, and Access Management Paradigms in Securing the Expanding Internet of Things (IoT) Network." Journal of Science & Technology 1.1 (2020): 171-195.
  3. Tatineni, Sumanth, and Karthik Allam. "Implementing AI-Enhanced Continuous Testing in DevOps Pipelines: Strategies for Automated Test Generation, Execution, and Analysis." Blockchain Technology and Distributed Systems 2.1 (2022): 46-81.
  4. Pulimamidi, Rahul. "Emerging Technological Trends for Enhancing Healthcare Access in Remote Areas." Journal of Science & Technology 2.4 (2021): 53-62.
  5. Perumalsamy, Jegatheeswari, Chandrashekar Althati, and Lavanya Shanmugam. "Advanced AI and Machine Learning Techniques for Predictive Analytics in Annuity Products: Enhancing Risk Assessment and Pricing Accuracy." Journal of Artificial Intelligence Research 2.2 (2022): 51-82.
  6. Devan, Munivel, Lavanya Shanmugam, and Chandrashekar Althati. "Overcoming Data Migration Challenges to Cloud Using AI and Machine Learning: Techniques, Tools, and Best Practices." Australian Journal of Machine Learning Research & Applications 1.2 (2021): 1-39.
  7. Althati, Chandrashekar, Bhavani Krothapalli, and Bhargav Kumar Konidena. "Machine Learning Solutions for Data Migration to Cloud: Addressing Complexity, Security, and Performance." Australian Journal of Machine Learning Research & Applications 1.2 (2021): 38-79.
  8. Sadhu, Ashok Kumar Reddy, and Amith Kumar Reddy. "A Comparative Analysis of Lightweight Cryptographic Protocols for Enhanced Communication Security in Resource-Constrained Internet of Things (IoT) Environments." African Journal of Artificial Intelligence and Sustainable Development 2.2 (2022): 121-142.
  9. Tatineni, Sumanth, and Venkat Raviteja Boppana. "AI-Powered DevOps and MLOps Frameworks: Enhancing Collaboration, Automation, and Scalability in Machine Learning Pipelines." Journal of Artificial Intelligence Research and Applications 1.2 (2021): 58-88.