Notification: Our email services are now fully restored after a brief, temporary outage caused by a denial-of-service (DoS) attack. If you sent an email on Dec 6 and haven't received a response, please resend your email.
CFP last date
20 December 2024
Reseach Article

Comparative Analysis of Network Forensic Systems

Published on October 2011 by Bhavesh Patel, Sanjay.M.Shah, Sameer Singh Chauhan
IP Multimedia Communications
Foundation of Computer Science USA
IPMC - Number 1
October 2011
Authors: Bhavesh Patel, Sanjay.M.Shah, Sameer Singh Chauhan
cf75cbc9-fb53-47ab-95c9-347f2eca1503

Bhavesh Patel, Sanjay.M.Shah, Sameer Singh Chauhan . Comparative Analysis of Network Forensic Systems. IP Multimedia Communications. IPMC, 1 (October 2011), 80-83.

@article{
author = { Bhavesh Patel, Sanjay.M.Shah, Sameer Singh Chauhan },
title = { Comparative Analysis of Network Forensic Systems },
journal = { IP Multimedia Communications },
issue_date = { October 2011 },
volume = { IPMC },
number = { 1 },
month = { October },
year = { 2011 },
issn = 0975-8887,
pages = { 80-83 },
numpages = 4,
url = { /specialissues/ipmc/number1/3754-ipmc018/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Special Issue Article
%1 IP Multimedia Communications
%A Bhavesh Patel
%A Sanjay.M.Shah
%A Sameer Singh Chauhan
%T Comparative Analysis of Network Forensic Systems
%J IP Multimedia Communications
%@ 0975-8887
%V IPMC
%N 1
%P 80-83
%D 2011
%I International Journal of Computer Applications
Abstract

At the leading edge of Artificial Intelligence, machine learning game applications use a combination of various algorithms and different types of information. Searching the large space of solutions in depth leads to better solution. In checker board game next move of disc is important to defeat the opponent. Different selection strategy can be employed to select best next move. In this paper, we present comparative performance of roulette wheel selection and tournament selection method. The focus of this paper is to incorporate systematic game playing approach by analyzing game of checkers. Expert game players reveal three major playing strategies to make game winning moves. The game moves are divided into three stages opening game, middle stage and endgame. An evolutionary program plays game of checkers with an intention to build resilient middle stage and a set of predefined rules are incorporated to make calculated moves in an endgame. The paper is organized into the sections of Introduction, Introduction to Checkers, Game Complexity and Genetic Algorithm. The last three sections are Implementation, Result Analysis, Conclusion and references.

References
  1. V. Broucek and P. Turner, “Forensic computing: Developing a conceptual approach for an emerging academic discipline,” 5th Australian Security Research Symposium, July, 2001.
  2. H. Berghel, “The discipline of Internet forensics,” Communications of the ACM, vol. 46, no. 8, Aug., 2003, pp. 15–20.
  3. S. Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy,” Dept of Computer Engineering, Chalmers University of Technology,Mar., 2000.
  4. Z. Liu and D. Feng, “Incremental Fuzzy Decision Tree-Based Network Forensic System,” Proc. Int’l Conf. Computational Intelligence and Security (CIS 2005), LNAI 3802, Springer, 2005, pp. 995-1002.
  5. W. Ren and H. Jin, “Distributed Agent-based Real Time Network Intrusion Forensics System Architecture Design,” Proc. IEEE 19th Int’l. Conf. Advanced Information Networking Applications (AINA 2005), pp. 177–182.
  6. L. Spitzner, “Honeypots: Definitions and Value of Honeypots,” http://www.tracking-hackers.com/papers/honeypots.html
  7. L. Spitzner, “Know Your Enemy: Defining Virtual Honeynets,”http://www.honeynet.org
  8. S. Garfinkel, “Network Forensics: Tapping the Internet” http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.html
  9. V. Broucek and P. Turner, “Forensic computing: Developing a conceptual approach for an emerging academic disciple Australian Security Research Symposium, July, 2001.
  10. Emmanuel S. Pilli “Network forensic frameworks: Survey and research challenges” Journal of Elsevier Ltd. 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Network forensics Intrusion Detection System Honeypot Honeynet Greynet