Cyber Crime and Forensic Computing : : Modern Principles, Practices, and Algorithms / / ed. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma.

This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding...

Full description

Saved in:
Bibliographic Details
Superior document:Title is part of eBook package: De Gruyter DG Ebook Package English 2021
MitwirkendeR:
HerausgeberIn:
Place / Publishing House:Berlin ;, Boston : : De Gruyter, , [2021]
©2021
Year of Publication:2021
Language:English
Series:De Gruyter Frontiers in Computational Intelligence , 11
Online Access:
Physical Description:1 online resource (X, 230 p.)
Tags: Add Tag
No Tags, Be the first to tag this record!
id 9783110677478
ctrlnum (DE-B1597)536547
(OCoLC)1266228156
collection bib_alma
record_format marc
spelling Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms / ed. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma.
Berlin ; Boston : De Gruyter, [2021]
©2021
1 online resource (X, 230 p.)
text txt rdacontent
computer c rdamedia
online resource cr rdacarrier
text file PDF rda
De Gruyter Frontiers in Computational Intelligence , 2512-8868 ; 11
Frontmatter -- Contents -- About the editors -- A survey of popular digital forensic tools -- An insight review on multimedia forensics technology -- An overview on advanced multimedia forensic techniques and future direction -- Computer forensics and Cyber Crimes: COVID-19 perspective -- Biometric forensic tools for criminal investigation -- Deep learning for optimization of e-evidence -- Electronic voting machine security issues and solution protocol by physical unclonable function -- Machine learning for mobile malware analysis -- Mobile platform security: issues and countermeasures -- Data leakage detection in Wi-Fi networks -- Index
restricted access http://purl.org/coar/access_right/c_16ec online access with authorization star
This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.
Issued also in print.
Mode of access: Internet via World Wide Web.
In English.
Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)
Algorithmus.
Big Data.
Computerforensik.
Forensische Informatik.
Künstliche Intelligenz.
Maschinelles Lernen.
COMPUTERS / Intelligence (AI) & Semantics. bisacsh
Agarwal, Prerna, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Arora, Shefali, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Bhatia, M. P. S., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Garg, Puneet, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Gupta, Deepak, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Gupta, Deepak, editor. edt http://id.loc.gov/vocabulary/relators/edt
Gupta, Swati, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Hariharan, K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, Ambeshwar, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, Prashant, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumar, Sachil, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Kumari, Meet, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Manikandan, R., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Meenakshi,, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Mittal, Ruchi, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Purohit, Gaurav, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Rajkumar, K., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Raju, Solomon, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Saxena, Geetika, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Selvakumari, R. Shantha, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sharma, Anand, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sharma, Kavita, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sharma, Kavita, editor. edt http://id.loc.gov/vocabulary/relators/edt
Shrivastava, Gulshan, editor. edt http://id.loc.gov/vocabulary/relators/edt
Shrivastava, Pranav, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Sivasankari, N., contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Tanwar, Pramod, contributor. ctb https://id.loc.gov/vocabulary/relators/ctb
Title is part of eBook package: De Gruyter DG Ebook Package English 2021 9783110750720
Title is part of eBook package: De Gruyter DG Plus DeG Package 2021 Part 1 9783110750706
Title is part of eBook package: De Gruyter De Gruyter English eBooks 2020 - UC 9783110659061
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English 9783110754001
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 9783110753776 ZDB-23-DGG
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021 English 9783110754070
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021 9783110753837 ZDB-23-DEI
EPUB 9783110677546
print 9783110677379
https://doi.org/10.1515/9783110677478
https://www.degruyter.com/isbn/9783110677478
Cover https://www.degruyter.com/document/cover/isbn/9783110677478/original
language English
format eBook
author2 Agarwal, Prerna,
Agarwal, Prerna,
Arora, Shefali,
Arora, Shefali,
Bhatia, M. P. S.,
Bhatia, M. P. S.,
Garg, Puneet,
Garg, Puneet,
Gupta, Deepak,
Gupta, Deepak,
Gupta, Deepak,
Gupta, Deepak,
Gupta, Swati,
Gupta, Swati,
Hariharan, K.,
Hariharan, K.,
Kumar, Ambeshwar,
Kumar, Ambeshwar,
Kumar, Prashant,
Kumar, Prashant,
Kumar, Sachil,
Kumar, Sachil,
Kumari, Meet,
Kumari, Meet,
Manikandan, R.,
Manikandan, R.,
Meenakshi,,
Meenakshi,,
Mittal, Ruchi,
Mittal, Ruchi,
Purohit, Gaurav,
Purohit, Gaurav,
Rajkumar, K.,
Rajkumar, K.,
Raju, Solomon,
Raju, Solomon,
Saxena, Geetika,
Saxena, Geetika,
Selvakumari, R. Shantha,
Selvakumari, R. Shantha,
Sharma, Anand,
Sharma, Anand,
Sharma, Kavita,
Sharma, Kavita,
Sharma, Kavita,
Sharma, Kavita,
Shrivastava, Gulshan,
Shrivastava, Gulshan,
Shrivastava, Pranav,
Shrivastava, Pranav,
Sivasankari, N.,
Sivasankari, N.,
Tanwar, Pramod,
Tanwar, Pramod,
author_facet Agarwal, Prerna,
Agarwal, Prerna,
Arora, Shefali,
Arora, Shefali,
Bhatia, M. P. S.,
Bhatia, M. P. S.,
Garg, Puneet,
Garg, Puneet,
Gupta, Deepak,
Gupta, Deepak,
Gupta, Deepak,
Gupta, Deepak,
Gupta, Swati,
Gupta, Swati,
Hariharan, K.,
Hariharan, K.,
Kumar, Ambeshwar,
Kumar, Ambeshwar,
Kumar, Prashant,
Kumar, Prashant,
Kumar, Sachil,
Kumar, Sachil,
Kumari, Meet,
Kumari, Meet,
Manikandan, R.,
Manikandan, R.,
Meenakshi,,
Meenakshi,,
Mittal, Ruchi,
Mittal, Ruchi,
Purohit, Gaurav,
Purohit, Gaurav,
Rajkumar, K.,
Rajkumar, K.,
Raju, Solomon,
Raju, Solomon,
Saxena, Geetika,
Saxena, Geetika,
Selvakumari, R. Shantha,
Selvakumari, R. Shantha,
Sharma, Anand,
Sharma, Anand,
Sharma, Kavita,
Sharma, Kavita,
Sharma, Kavita,
Sharma, Kavita,
Shrivastava, Gulshan,
Shrivastava, Gulshan,
Shrivastava, Pranav,
Shrivastava, Pranav,
Sivasankari, N.,
Sivasankari, N.,
Tanwar, Pramod,
Tanwar, Pramod,
author2_variant p a pa
p a pa
s a sa
s a sa
m p s b mps mpsb
m p s b mps mpsb
p g pg
p g pg
d g dg
d g dg
d g dg
d g dg
s g sg
s g sg
k h kh
k h kh
a k ak
a k ak
p k pk
p k pk
s k sk
s k sk
m k mk
m k mk
r m rm
r m rm
m
m
r m rm
r m rm
g p gp
g p gp
k r kr
k r kr
s r sr
s r sr
g s gs
g s gs
r s s rs rss
r s s rs rss
a s as
a s as
k s ks
k s ks
k s ks
k s ks
g s gs
g s gs
p s ps
p s ps
n s ns
n s ns
p t pt
p t pt
author2_role MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
HerausgeberIn
HerausgeberIn
HerausgeberIn
HerausgeberIn
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
MitwirkendeR
author_sort Agarwal, Prerna,
title Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms /
spellingShingle Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms /
De Gruyter Frontiers in Computational Intelligence ,
Frontmatter --
Contents --
About the editors --
A survey of popular digital forensic tools --
An insight review on multimedia forensics technology --
An overview on advanced multimedia forensic techniques and future direction --
Computer forensics and Cyber Crimes: COVID-19 perspective --
Biometric forensic tools for criminal investigation --
Deep learning for optimization of e-evidence --
Electronic voting machine security issues and solution protocol by physical unclonable function --
Machine learning for mobile malware analysis --
Mobile platform security: issues and countermeasures --
Data leakage detection in Wi-Fi networks --
Index
title_sub Modern Principles, Practices, and Algorithms /
title_full Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms / ed. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma.
title_fullStr Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms / ed. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma.
title_full_unstemmed Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms / ed. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma.
title_auth Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms /
title_alt Frontmatter --
Contents --
About the editors --
A survey of popular digital forensic tools --
An insight review on multimedia forensics technology --
An overview on advanced multimedia forensic techniques and future direction --
Computer forensics and Cyber Crimes: COVID-19 perspective --
Biometric forensic tools for criminal investigation --
Deep learning for optimization of e-evidence --
Electronic voting machine security issues and solution protocol by physical unclonable function --
Machine learning for mobile malware analysis --
Mobile platform security: issues and countermeasures --
Data leakage detection in Wi-Fi networks --
Index
title_new Cyber Crime and Forensic Computing :
title_sort cyber crime and forensic computing : modern principles, practices, and algorithms /
series De Gruyter Frontiers in Computational Intelligence ,
series2 De Gruyter Frontiers in Computational Intelligence ,
publisher De Gruyter,
publishDate 2021
physical 1 online resource (X, 230 p.)
Issued also in print.
contents Frontmatter --
Contents --
About the editors --
A survey of popular digital forensic tools --
An insight review on multimedia forensics technology --
An overview on advanced multimedia forensic techniques and future direction --
Computer forensics and Cyber Crimes: COVID-19 perspective --
Biometric forensic tools for criminal investigation --
Deep learning for optimization of e-evidence --
Electronic voting machine security issues and solution protocol by physical unclonable function --
Machine learning for mobile malware analysis --
Mobile platform security: issues and countermeasures --
Data leakage detection in Wi-Fi networks --
Index
isbn 9783110677478
9783110750720
9783110750706
9783110659061
9783110754001
9783110753776
9783110754070
9783110753837
9783110677546
9783110677379
issn 2512-8868 ;
url https://doi.org/10.1515/9783110677478
https://www.degruyter.com/isbn/9783110677478
https://www.degruyter.com/document/cover/isbn/9783110677478/original
illustrated Not Illustrated
doi_str_mv 10.1515/9783110677478
oclc_num 1266228156
work_keys_str_mv AT agarwalprerna cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT arorashefali cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT bhatiamps cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT gargpuneet cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT guptadeepak cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT guptaswati cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT hariharank cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT kumarambeshwar cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT kumarprashant cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT kumarsachil cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT kumarimeet cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT manikandanr cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT meenakshi cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT mittalruchi cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT purohitgaurav cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT rajkumark cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT rajusolomon cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT saxenageetika cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT selvakumarirshantha cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT sharmaanand cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT sharmakavita cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT shrivastavagulshan cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT shrivastavapranav cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT sivasankarin cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
AT tanwarpramod cybercrimeandforensiccomputingmodernprinciplespracticesandalgorithms
status_str n
ids_txt_mv (DE-B1597)536547
(OCoLC)1266228156
carrierType_str_mv cr
hierarchy_parent_title Title is part of eBook package: De Gruyter DG Ebook Package English 2021
Title is part of eBook package: De Gruyter DG Plus DeG Package 2021 Part 1
Title is part of eBook package: De Gruyter De Gruyter English eBooks 2020 - UC
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE COMPLETE 2021
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021 English
Title is part of eBook package: De Gruyter EBOOK PACKAGE Engineering, Computer Sciences 2021
is_hierarchy_title Cyber Crime and Forensic Computing : Modern Principles, Practices, and Algorithms /
container_title Title is part of eBook package: De Gruyter DG Ebook Package English 2021
author2_original_writing_str_mv noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
noLinkedField
_version_ 1806144532120600576
fullrecord <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>10977nam a22012495i 4500</leader><controlfield tag="001">9783110677478</controlfield><controlfield tag="003">DE-B1597</controlfield><controlfield tag="005">20230228015514.0</controlfield><controlfield tag="006">m|||||o||d||||||||</controlfield><controlfield tag="007">cr || ||||||||</controlfield><controlfield tag="008">230228t20212021gw fo d z eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783110677478</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1515/9783110677478</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-B1597)536547</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1266228156</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-B1597</subfield><subfield code="b">eng</subfield><subfield code="c">DE-B1597</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">gw</subfield><subfield code="c">DE</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM004000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 300</subfield><subfield code="q">DE-Ofb1/22</subfield><subfield code="2">rvk</subfield><subfield code="0">(DE-625)rvk/143650:</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Cyber Crime and Forensic Computing :</subfield><subfield code="b">Modern Principles, Practices, and Algorithms /</subfield><subfield code="c">ed. by Gulshan Shrivastava, Deepak Gupta, Kavita Sharma.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Berlin ;</subfield><subfield code="a">Boston : </subfield><subfield code="b">De Gruyter, </subfield><subfield code="c">[2021]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2021</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (X, 230 p.)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">text file</subfield><subfield code="b">PDF</subfield><subfield code="2">rda</subfield></datafield><datafield tag="490" ind1="0" ind2=" "><subfield code="a">De Gruyter Frontiers in Computational Intelligence ,</subfield><subfield code="x">2512-8868 ;</subfield><subfield code="v">11</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Frontmatter -- </subfield><subfield code="t">Contents -- </subfield><subfield code="t">About the editors -- </subfield><subfield code="t">A survey of popular digital forensic tools -- </subfield><subfield code="t">An insight review on multimedia forensics technology -- </subfield><subfield code="t">An overview on advanced multimedia forensic techniques and future direction -- </subfield><subfield code="t">Computer forensics and Cyber Crimes: COVID-19 perspective -- </subfield><subfield code="t">Biometric forensic tools for criminal investigation -- </subfield><subfield code="t">Deep learning for optimization of e-evidence -- </subfield><subfield code="t">Electronic voting machine security issues and solution protocol by physical unclonable function -- </subfield><subfield code="t">Machine learning for mobile malware analysis -- </subfield><subfield code="t">Mobile platform security: issues and countermeasures -- </subfield><subfield code="t">Data leakage detection in Wi-Fi networks -- </subfield><subfield code="t">Index</subfield></datafield><datafield tag="506" ind1="0" ind2=" "><subfield code="a">restricted access</subfield><subfield code="u">http://purl.org/coar/access_right/c_16ec</subfield><subfield code="f">online access with authorization</subfield><subfield code="2">star</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">This book presents a comprehensive study of different tools and techniques available to perform network forensics. Also, various aspects of network forensics are reviewed as well as related technologies and their limitations. This helps security practitioners and researchers in better understanding of the problem, current solution space, and future research scope to detect and investigate various network intrusions against such attacks efficiently. Forensic computing is rapidly gaining importance since the amount of crime involving digital systems is steadily increasing. Furthermore, the area is still underdeveloped and poses many technical and legal challenges. The rapid development of the Internet over the past decade appeared to have facilitated an increase in the incidents of online attacks. There are many reasons which are motivating the attackers to be fearless in carrying out the attacks. For example, the speed with which an attack can be carried out, the anonymity provided by the medium, nature of medium where digital information is stolen without actually removing it, increased availability of potential victims and the global impact of the attacks are some of the aspects. Forensic analysis is performed at two different levels: Computer Forensics and Network Forensics. Computer forensics deals with the collection and analysis of data from computer systems, networks, communication streams and storage media in a manner admissible in a court of law. Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. Network forensics generally refers to the collection and analysis of network data such as network traffic, firewall logs, IDS logs, etc. Technically, it is a member of the already-existing and expanding the field of digital forensics. Analogously, network forensics is defined as "The use of scientifically proved techniques to collect, fuses, identifies, examine, correlate, analyze, and document digital evidence from multiple, actively processing and transmitting digital sources for the purpose of uncovering facts related to the planned intent, or measured success of unauthorized activities meant to disrupt, corrupt, and or compromise system components as well as providing information to assist in response to or recovery from these activities." Network forensics plays a significant role in the security of today’s organizations. On the one hand, it helps to learn the details of external attacks ensuring similar future attacks are thwarted. Additionally, network forensics is essential for investigating insiders’ abuses that constitute the second costliest type of attack within organizations. Finally, law enforcement requires network forensics for crimes in which a computer or digital system is either being the target of a crime or being used as a tool in carrying a crime. Network security protects the system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. However, network forensics involves post mortem investigation of the attack and is initiated after crime notification. There are many tools which assist in capturing data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Similarly, various network forensic frameworks are proposed in the literature.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Issued also in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: Internet via World Wide Web.</subfield></datafield><datafield tag="546" ind1=" " ind2=" "><subfield code="a">In English.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Description based on online resource; title from PDF title page (publisher's Web site, viewed 28. Feb 2023)</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Algorithmus.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Big Data.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computerforensik.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Forensische Informatik.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Künstliche Intelligenz.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Maschinelles Lernen.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">COMPUTERS / Intelligence (AI) &amp; Semantics.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Agarwal, Prerna, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Arora, Shefali, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Bhatia, M. P. S., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Garg, Puneet, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Deepak, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Deepak, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Gupta, Swati, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hariharan, K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Ambeshwar, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Prashant, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumar, Sachil, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Kumari, Meet, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Manikandan, R., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Meenakshi,, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Mittal, Ruchi, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Purohit, Gaurav, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Rajkumar, K., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Raju, Solomon, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Saxena, Geetika, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Selvakumari, R. Shantha, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Anand, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Kavita, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sharma, Kavita, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shrivastava, Gulshan, </subfield><subfield code="e">editor.</subfield><subfield code="4">edt</subfield><subfield code="4">http://id.loc.gov/vocabulary/relators/edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Shrivastava, Pranav, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Sivasankari, N., </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Tanwar, Pramod, </subfield><subfield code="e">contributor.</subfield><subfield code="4">ctb</subfield><subfield code="4">https://id.loc.gov/vocabulary/relators/ctb</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Ebook Package English 2021</subfield><subfield code="z">9783110750720</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">DG Plus DeG Package 2021 Part 1</subfield><subfield code="z">9783110750706</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">De Gruyter English eBooks 2020 - UC</subfield><subfield code="z">9783110659061</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="z">9783110754001</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE COMPLETE 2021</subfield><subfield code="z">9783110753776</subfield><subfield code="o">ZDB-23-DGG</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2021 English</subfield><subfield code="z">9783110754070</subfield></datafield><datafield tag="773" ind1="0" ind2="8"><subfield code="i">Title is part of eBook package:</subfield><subfield code="d">De Gruyter</subfield><subfield code="t">EBOOK PACKAGE Engineering, Computer Sciences 2021</subfield><subfield code="z">9783110753837</subfield><subfield code="o">ZDB-23-DEI</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">EPUB</subfield><subfield code="z">9783110677546</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">print</subfield><subfield code="z">9783110677379</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1515/9783110677478</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://www.degruyter.com/isbn/9783110677478</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="3">Cover</subfield><subfield code="u">https://www.degruyter.com/document/cover/isbn/9783110677478/original</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-065906-1 De Gruyter English eBooks 2020 - UC</subfield><subfield code="b">2020</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075070-6 DG Plus DeG Package 2021 Part 1</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075072-0 DG Ebook Package English 2021</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075400-1 EBOOK PACKAGE COMPLETE 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">978-3-11-075407-0 EBOOK PACKAGE Engineering, Computer Sciences 2021 English</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_CL_LAEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_DGALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_CHCOMSGSEN</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ECL_LAEC</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_EEBKALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_ESTMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_SSHALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">EBA_STMALL</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">GBV-deGruyter-alles</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA11SSHE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA12STME</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA13ENGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA17SSHEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA18STMEE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">PDA5EBK</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DEI</subfield><subfield code="b">2021</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-23-DGG</subfield><subfield code="b">2021</subfield></datafield></record></collection>