Call for Paper - July 2022 Edition
IJCA solicits original research papers for the July 2022 Edition. Last date of manuscript submission is June 20, 2022. Read More

Comparative Analysis of Network Forensic Systems

IP Multimedia Communications
© 2011 by IJCA Journal
ISBN : 978-93-80864-99-3
Year of Publication: 2011
Bhavesh Patel
Sameer Singh Chauhan

Bhavesh Patel, Sanjay.M.Shah and Sameer Singh Chauhan. Comparative Analysis of Network Forensic Systems. Special issues on IP Multimedia Communications (1):80-83, October 2011. Full text available. BibTeX

	author = {Bhavesh Patel and Sanjay.M.Shah and Sameer Singh Chauhan},
	title = {Comparative Analysis of Network Forensic Systems},
	journal = {Special issues on IP Multimedia Communications},
	month = {October},
	year = {2011},
	number = {1},
	pages = {80-83},
	note = {Full text available}


At the leading edge of Artificial Intelligence, machine learning game applications use a combination of various algorithms and different types of information. Searching the large space of solutions in depth leads to better solution. In checker board game next move of disc is important to defeat the opponent. Different selection strategy can be employed to select best next move. In this paper, we present comparative performance of roulette wheel selection and tournament selection method. The focus of this paper is to incorporate systematic game playing approach by analyzing game of checkers. Expert game players reveal three major playing strategies to make game winning moves. The game moves are divided into three stages opening game, middle stage and endgame. An evolutionary program plays game of checkers with an intention to build resilient middle stage and a set of predefined rules are incorporated to make calculated moves in an endgame. The paper is organized into the sections of Introduction, Introduction to Checkers, Game Complexity and Genetic Algorithm. The last three sections are Implementation, Result Analysis, Conclusion and references.


  1. V. Broucek and P. Turner, “Forensic computing: Developing a conceptual approach for an emerging academic discipline,” 5th Australian Security Research Symposium, July, 2001.
  2. H. Berghel, “The discipline of Internet forensics,” Communications of the ACM, vol. 46, no. 8, Aug., 2003, pp. 15–20.
  3. S. Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy,” Dept of Computer Engineering, Chalmers University of Technology,Mar., 2000.
  4. Z. Liu and D. Feng, “Incremental Fuzzy Decision Tree-Based Network Forensic System,” Proc. Int’l Conf. Computational Intelligence and Security (CIS 2005), LNAI 3802, Springer, 2005, pp. 995-1002.
  5. W. Ren and H. Jin, “Distributed Agent-based Real Time Network Intrusion Forensics System Architecture Design,” Proc. IEEE 19th Int’l. Conf. Advanced Information Networking Applications (AINA 2005), pp. 177–182.
  6. L. Spitzner, “Honeypots: Definitions and Value of Honeypots,”
  7. L. Spitzner, “Know Your Enemy: Defining Virtual Honeynets,”
  8. S. Garfinkel, “Network Forensics: Tapping the Internet”
  9. V. Broucek and P. Turner, “Forensic computing: Developing a conceptual approach for an emerging academic disciple Australian Security Research Symposium, July, 2001.
  10. Emmanuel S. Pilli “Network forensic frameworks: Survey and research challenges” Journal of Elsevier Ltd. 2010.