Call for Paper - November 2022 Edition
IJCA solicits original research papers for the November 2022 Edition. Last date of manuscript submission is October 20, 2022. Read More

Network Forensics Framework Development using Interactive Planning Approach

Print
PDF
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2017
Authors:
Missi Hikmatyar, Yudi Prayudi, Imam Riadi
10.5120/ijca2017913352

Missi Hikmatyar, Yudi Prayudi and Imam Riadi. Network Forensics Framework Development using Interactive Planning Approach. International Journal of Computer Applications 161(10):41-48, March 2017. BibTeX

@article{10.5120/ijca2017913352,
	author = {Missi Hikmatyar and Yudi Prayudi and Imam Riadi},
	title = {Network Forensics Framework Development using Interactive Planning Approach},
	journal = {International Journal of Computer Applications},
	issue_date = {March 2017},
	volume = {161},
	number = {10},
	month = {Mar},
	year = {2017},
	issn = {0975-8887},
	pages = {41-48},
	numpages = {8},
	url = {http://www.ijcaonline.org/archives/volume161/number10/27188-2017913352},
	doi = {10.5120/ijca2017913352},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}
}

Abstract

Utilization of the network become a trend present with the development of technology, especially the Internet, but the trend of web use is directly proportional to the usage of the crime, or that is better known as cyber crime. Cyber crime is the duty of law enforcement in combating it.In the disclosure of a case on the network needed a method of handling.

Integrated Digital Forensics Investigation Framework (IDFIF) is a method of investigation of a general nature. IDFIF evolved into IDFIF version 2 that is a method of treatment focuses on smartphones. IDFIF v2 can not be applied to network investigation it is necessary to develop a version 3 IDFIF focused on network forensics. This research is the development of network forensics framework using interactive planning.

References

  1. Chhabra, G.S., 2015. Distributed Network Forensics Framework : A Systematic Review. International Journal of Computer Applications (IJCA), 119(19), pp.31–35
  2. Jazi, I.R. et al., 2013. Internet Forensics Framework Based on Clustering. International Journal of Advanced Computer Science and Applications (IJACSA), 4(12), pp.115–123.
  3. Goel, R., Sardana, A. & Joshi, R.C., 2013. Wireless Honeypot: Framework, architectures, and tools. International Journal of Network Security, 15(5), pp.373–383.
  4. Wang, W., 2010. A graph-oriented approach for network forensic analysis. , p.123
  5. Tretmans, J., 1999. Testing Concurrent Systems: A Formal Approach. Proceedings of the 10th International Conference on Concurrency Theory (CONCUR), 1664, pp.46–65.
  6. Almulhem, A. & Traore, I., 2008. Profiling distributed connection chains. International Journal of Communication Networks and Distributed Systems, 1(1), pp.4–18.
  7. S. Ciardhuain, 2004. An Extended Model of Cybercrime Investigation. International Journal of Digital Evidence, Vol. 3, No. 1, pp. 1-22.
  8. Beebe, N. l., & Clark, J. G., 2004. A Hierarchical, Objectives - Based Framework for the Digital Investigations Process. Proceedings of Digital Forensics Research Workshop. Baltimore, MD.
  9. Baryamureeba, V., & Tushabe, F., 2004. The Enhanced Digital Investigation Process Model. Proceeding of Digital Forensic Research Workshop. Baltimore, MD.
  10. M. K. Rogers, J. Goldman, R. Mislan, T. Wedge & S. Debrota., 2006. Computer Forensic Field Triage Process Model.presented at the Conference on Digital Forensics, Security and Law, pp. 27-40.
  11. Pilli, E.S., Joshi, R.C. & Niyogi, R., 2010. A Generic Framework for Network Forensics. International Journal of Computer Applications, 1(11), pp.1–6.
  12. Alharbi, S., Weber-Jahnke, J. & Traore, I., 2011. The Proactive and Reactive Digital Forensics Investigation Process: A Systematic Literature Review. International Journal of …, 5(4), pp.87–100.
  13. Huang, J.et al., 2012. A Framework of Network Forensics and its Application of Locating Suspects in Wireless Crime Scene Investigation. , pp.1–22
  14. Mariza, N.et al., 2014. Critical Phases in Network Forensics - A Review. , pp.68–75.
  15. Al-qerem, A., 2015. PNFEA : A Proposal Approach for Proactive Network Forensics Evidence Analysis to Resolve Cyber Crimes. , (January), pp.25–32.
  16. Kumar, M.V. & Lalitha, T., 2016. Soft Computing : Fuzzy Logic Approach in Wireless Sensors Networks. , (June), pp.1242–1249.
  17. He, J.et al., 2016. Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning. Future Internet, 8(4), p.54.
  18. Dhammearatchi, D., 2015. Use of Network Forensic Mechanisms. , 7(4), pp.21–36

Keywords

IDFIF, Network Forensics Framework, Interactive Planning.

Learn about the IJCA article correction policy and process
Dealing with any form of infringement.
‘Peer Review – A Critical Inquiry’ by David Shatz
Directly place requests for print/ hard copies of IJCA via Google Docs