Network Forensics Article Swipe
R. C. Joshi
,
Emmanuel S. Pilli
·
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1007/978-1-4471-7299-4_1
YOU?
·
· 2016
· Open Access
·
· DOI: https://doi.org/10.1007/978-1-4471-7299-4_1
This chapter discusses about the various terms used in the network forensics. The background of network forensics and difference with the network security is discussed. Classification of network forensics based on purpose, capture of packet, time of analysis, and data source is discussed. Definitions, applications, and motivation behind them are discussed. The recent trends of network forensics based on steganography, honeypot forensics, IP version 6, botnet forensics, wireless network, application layer forensics, etc., are elaborated. Challenges in packet identification, preservation, collection, examination, analysis, preservation, and decision-making and associated research areas with respect to network forensics are also discussed.
Related Topics
Concepts
Metadata
- Type
- book-chapter
- Language
- en
- Landing Page
- https://doi.org/10.1007/978-1-4471-7299-4_1
- OA Status
- hybrid
- References
- 24
- Related Works
- 10
- OpenAlex ID
- https://openalex.org/W4256292341
All OpenAlex metadata
Raw OpenAlex JSON
- OpenAlex ID
-
https://openalex.org/W4256292341Canonical identifier for this work in OpenAlex
- DOI
-
https://doi.org/10.1007/978-1-4471-7299-4_1Digital Object Identifier
- Title
-
Network ForensicsWork title
- Type
-
book-chapterOpenAlex work type
- Language
-
enPrimary language
- Publication year
-
2016Year of publication
- Publication date
-
2016-01-01Full publication date if available
- Authors
-
R. C. Joshi, Emmanuel S. PilliList of authors in order
- Landing page
-
https://doi.org/10.1007/978-1-4471-7299-4_1Publisher landing page
- Open access
-
YesWhether a free full text is available
- OA status
-
hybridOpen access status per OpenAlex
- OA URL
-
https://doi.org/10.1007/978-1-4471-7299-4_1Direct OA link when available
- Concepts
-
Network forensics, Honeypot, Computer science, Computer security, Network security, Identification (biology), Digital forensics, Packet analyzer, Network packet, Botany, BiologyTop concepts (fields/topics) attached by OpenAlex
- Cited by
-
0Total citation count in OpenAlex
- References (count)
-
24Number of works referenced by this work
- Related works (count)
-
10Other works algorithmically related by OpenAlex
Full payload
| id | https://openalex.org/W4256292341 |
|---|---|
| doi | https://doi.org/10.1007/978-1-4471-7299-4_1 |
| ids.doi | https://doi.org/10.1007/978-1-4471-7299-4_1 |
| ids.openalex | https://openalex.org/W4256292341 |
| fwci | 0.0 |
| type | book-chapter |
| title | Network Forensics |
| biblio.issue | |
| biblio.volume | |
| biblio.last_page | 16 |
| biblio.first_page | 3 |
| topics[0].id | https://openalex.org/T12034 |
| topics[0].field.id | https://openalex.org/fields/17 |
| topics[0].field.display_name | Computer Science |
| topics[0].score | 1.0 |
| topics[0].domain.id | https://openalex.org/domains/3 |
| topics[0].domain.display_name | Physical Sciences |
| topics[0].subfield.id | https://openalex.org/subfields/1710 |
| topics[0].subfield.display_name | Information Systems |
| topics[0].display_name | Digital and Cyber Forensics |
| topics[1].id | https://openalex.org/T11241 |
| topics[1].field.id | https://openalex.org/fields/17 |
| topics[1].field.display_name | Computer Science |
| topics[1].score | 0.9998000264167786 |
| topics[1].domain.id | https://openalex.org/domains/3 |
| topics[1].domain.display_name | Physical Sciences |
| topics[1].subfield.id | https://openalex.org/subfields/1711 |
| topics[1].subfield.display_name | Signal Processing |
| topics[1].display_name | Advanced Malware Detection Techniques |
| topics[2].id | https://openalex.org/T11598 |
| topics[2].field.id | https://openalex.org/fields/17 |
| topics[2].field.display_name | Computer Science |
| topics[2].score | 0.9994999766349792 |
| topics[2].domain.id | https://openalex.org/domains/3 |
| topics[2].domain.display_name | Physical Sciences |
| topics[2].subfield.id | https://openalex.org/subfields/1702 |
| topics[2].subfield.display_name | Artificial Intelligence |
| topics[2].display_name | Internet Traffic Analysis and Secure E-voting |
| is_xpac | False |
| apc_list | |
| apc_paid | |
| concepts[0].id | https://openalex.org/C50747538 |
| concepts[0].level | 3 |
| concepts[0].score | 0.8416346907615662 |
| concepts[0].wikidata | https://www.wikidata.org/wiki/Q7001032 |
| concepts[0].display_name | Network forensics |
| concepts[1].id | https://openalex.org/C191267431 |
| concepts[1].level | 2 |
| concepts[1].score | 0.7580313086509705 |
| concepts[1].wikidata | https://www.wikidata.org/wiki/Q911932 |
| concepts[1].display_name | Honeypot |
| concepts[2].id | https://openalex.org/C41008148 |
| concepts[2].level | 0 |
| concepts[2].score | 0.6907263398170471 |
| concepts[2].wikidata | https://www.wikidata.org/wiki/Q21198 |
| concepts[2].display_name | Computer science |
| concepts[3].id | https://openalex.org/C38652104 |
| concepts[3].level | 1 |
| concepts[3].score | 0.5464183688163757 |
| concepts[3].wikidata | https://www.wikidata.org/wiki/Q3510521 |
| concepts[3].display_name | Computer security |
| concepts[4].id | https://openalex.org/C182590292 |
| concepts[4].level | 2 |
| concepts[4].score | 0.535883367061615 |
| concepts[4].wikidata | https://www.wikidata.org/wiki/Q989632 |
| concepts[4].display_name | Network security |
| concepts[5].id | https://openalex.org/C116834253 |
| concepts[5].level | 2 |
| concepts[5].score | 0.4792878031730652 |
| concepts[5].wikidata | https://www.wikidata.org/wiki/Q2039217 |
| concepts[5].display_name | Identification (biology) |
| concepts[6].id | https://openalex.org/C84418412 |
| concepts[6].level | 2 |
| concepts[6].score | 0.45874127745628357 |
| concepts[6].wikidata | https://www.wikidata.org/wiki/Q3246940 |
| concepts[6].display_name | Digital forensics |
| concepts[7].id | https://openalex.org/C95362637 |
| concepts[7].level | 3 |
| concepts[7].score | 0.4581526815891266 |
| concepts[7].wikidata | https://www.wikidata.org/wiki/Q54366 |
| concepts[7].display_name | Packet analyzer |
| concepts[8].id | https://openalex.org/C158379750 |
| concepts[8].level | 2 |
| concepts[8].score | 0.43682146072387695 |
| concepts[8].wikidata | https://www.wikidata.org/wiki/Q214111 |
| concepts[8].display_name | Network packet |
| concepts[9].id | https://openalex.org/C59822182 |
| concepts[9].level | 1 |
| concepts[9].score | 0.0 |
| concepts[9].wikidata | https://www.wikidata.org/wiki/Q441 |
| concepts[9].display_name | Botany |
| concepts[10].id | https://openalex.org/C86803240 |
| concepts[10].level | 0 |
| concepts[10].score | 0.0 |
| concepts[10].wikidata | https://www.wikidata.org/wiki/Q420 |
| concepts[10].display_name | Biology |
| keywords[0].id | https://openalex.org/keywords/network-forensics |
| keywords[0].score | 0.8416346907615662 |
| keywords[0].display_name | Network forensics |
| keywords[1].id | https://openalex.org/keywords/honeypot |
| keywords[1].score | 0.7580313086509705 |
| keywords[1].display_name | Honeypot |
| keywords[2].id | https://openalex.org/keywords/computer-science |
| keywords[2].score | 0.6907263398170471 |
| keywords[2].display_name | Computer science |
| keywords[3].id | https://openalex.org/keywords/computer-security |
| keywords[3].score | 0.5464183688163757 |
| keywords[3].display_name | Computer security |
| keywords[4].id | https://openalex.org/keywords/network-security |
| keywords[4].score | 0.535883367061615 |
| keywords[4].display_name | Network security |
| keywords[5].id | https://openalex.org/keywords/identification |
| keywords[5].score | 0.4792878031730652 |
| keywords[5].display_name | Identification (biology) |
| keywords[6].id | https://openalex.org/keywords/digital-forensics |
| keywords[6].score | 0.45874127745628357 |
| keywords[6].display_name | Digital forensics |
| keywords[7].id | https://openalex.org/keywords/packet-analyzer |
| keywords[7].score | 0.4581526815891266 |
| keywords[7].display_name | Packet analyzer |
| keywords[8].id | https://openalex.org/keywords/network-packet |
| keywords[8].score | 0.43682146072387695 |
| keywords[8].display_name | Network packet |
| language | en |
| locations[0].id | doi:10.1007/978-1-4471-7299-4_1 |
| locations[0].is_oa | True |
| locations[0].source.id | https://openalex.org/S4210175725 |
| locations[0].source.issn | 1617-7975, 2197-8433 |
| locations[0].source.type | book series |
| locations[0].source.is_oa | False |
| locations[0].source.issn_l | 1617-7975 |
| locations[0].source.is_core | True |
| locations[0].source.is_in_doaj | False |
| locations[0].source.display_name | Computer communications and networks |
| locations[0].source.host_organization | |
| locations[0].source.host_organization_name | |
| locations[0].license | cc-by-nc |
| locations[0].pdf_url | |
| locations[0].version | publishedVersion |
| locations[0].raw_type | book-chapter |
| locations[0].license_id | https://openalex.org/licenses/cc-by-nc |
| locations[0].is_accepted | True |
| locations[0].is_published | True |
| locations[0].raw_source_name | Computer Communications and Networks |
| locations[0].landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_1 |
| indexed_in | crossref |
| authorships[0].author.id | https://openalex.org/A5101884639 |
| authorships[0].author.orcid | https://orcid.org/0000-0001-9612-2691 |
| authorships[0].author.display_name | R. C. Joshi |
| authorships[0].countries | IN |
| authorships[0].affiliations[0].institution_ids | https://openalex.org/I60054993 |
| authorships[0].affiliations[0].raw_affiliation_string | Graphic Era University, Dehradun, Uttarakhand, India |
| authorships[0].institutions[0].id | https://openalex.org/I60054993 |
| authorships[0].institutions[0].ror | https://ror.org/03wqgqd89 |
| authorships[0].institutions[0].type | education |
| authorships[0].institutions[0].lineage | https://openalex.org/I60054993 |
| authorships[0].institutions[0].country_code | IN |
| authorships[0].institutions[0].display_name | Graphic Era University |
| authorships[0].author_position | first |
| authorships[0].raw_author_name | R. C. Joshi |
| authorships[0].is_corresponding | False |
| authorships[0].raw_affiliation_strings | Graphic Era University, Dehradun, Uttarakhand, India |
| authorships[1].author.id | https://openalex.org/A5040360984 |
| authorships[1].author.orcid | https://orcid.org/0000-0002-6056-1147 |
| authorships[1].author.display_name | Emmanuel S. Pilli |
| authorships[1].countries | IN |
| authorships[1].affiliations[0].institution_ids | https://openalex.org/I83205935 |
| authorships[1].affiliations[0].raw_affiliation_string | Malaviya National Institute of Technology, Jaipur, Rajasthan, India |
| authorships[1].institutions[0].id | https://openalex.org/I83205935 |
| authorships[1].institutions[0].ror | https://ror.org/0077k1j32 |
| authorships[1].institutions[0].type | education |
| authorships[1].institutions[0].lineage | https://openalex.org/I83205935 |
| authorships[1].institutions[0].country_code | IN |
| authorships[1].institutions[0].display_name | Malaviya National Institute of Technology Jaipur |
| authorships[1].author_position | last |
| authorships[1].raw_author_name | Emmanuel S. Pilli |
| authorships[1].is_corresponding | False |
| authorships[1].raw_affiliation_strings | Malaviya National Institute of Technology, Jaipur, Rajasthan, India |
| has_content.pdf | False |
| has_content.grobid_xml | False |
| is_paratext | False |
| open_access.is_oa | True |
| open_access.oa_url | https://doi.org/10.1007/978-1-4471-7299-4_1 |
| open_access.oa_status | hybrid |
| open_access.any_repository_has_fulltext | False |
| created_date | 2022-05-12T00:00:00 |
| display_name | Network Forensics |
| has_fulltext | False |
| is_retracted | False |
| updated_date | 2025-11-06T03:46:38.306776 |
| primary_topic.id | https://openalex.org/T12034 |
| primary_topic.field.id | https://openalex.org/fields/17 |
| primary_topic.field.display_name | Computer Science |
| primary_topic.score | 1.0 |
| primary_topic.domain.id | https://openalex.org/domains/3 |
| primary_topic.domain.display_name | Physical Sciences |
| primary_topic.subfield.id | https://openalex.org/subfields/1710 |
| primary_topic.subfield.display_name | Information Systems |
| primary_topic.display_name | Digital and Cyber Forensics |
| related_works | https://openalex.org/W2036903135, https://openalex.org/W2121070677, https://openalex.org/W2972427363, https://openalex.org/W2161391695, https://openalex.org/W4238452393, https://openalex.org/W1500698787, https://openalex.org/W188028618, https://openalex.org/W4385257722, https://openalex.org/W2347635077, https://openalex.org/W2258115363 |
| cited_by_count | 0 |
| locations_count | 1 |
| best_oa_location.id | doi:10.1007/978-1-4471-7299-4_1 |
| best_oa_location.is_oa | True |
| best_oa_location.source.id | https://openalex.org/S4210175725 |
| best_oa_location.source.issn | 1617-7975, 2197-8433 |
| best_oa_location.source.type | book series |
| best_oa_location.source.is_oa | False |
| best_oa_location.source.issn_l | 1617-7975 |
| best_oa_location.source.is_core | True |
| best_oa_location.source.is_in_doaj | False |
| best_oa_location.source.display_name | Computer communications and networks |
| best_oa_location.source.host_organization | |
| best_oa_location.source.host_organization_name | |
| best_oa_location.license | cc-by-nc |
| best_oa_location.pdf_url | |
| best_oa_location.version | publishedVersion |
| best_oa_location.raw_type | book-chapter |
| best_oa_location.license_id | https://openalex.org/licenses/cc-by-nc |
| best_oa_location.is_accepted | True |
| best_oa_location.is_published | True |
| best_oa_location.raw_source_name | Computer Communications and Networks |
| best_oa_location.landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_1 |
| primary_location.id | doi:10.1007/978-1-4471-7299-4_1 |
| primary_location.is_oa | True |
| primary_location.source.id | https://openalex.org/S4210175725 |
| primary_location.source.issn | 1617-7975, 2197-8433 |
| primary_location.source.type | book series |
| primary_location.source.is_oa | False |
| primary_location.source.issn_l | 1617-7975 |
| primary_location.source.is_core | True |
| primary_location.source.is_in_doaj | False |
| primary_location.source.display_name | Computer communications and networks |
| primary_location.source.host_organization | |
| primary_location.source.host_organization_name | |
| primary_location.license | cc-by-nc |
| primary_location.pdf_url | |
| primary_location.version | publishedVersion |
| primary_location.raw_type | book-chapter |
| primary_location.license_id | https://openalex.org/licenses/cc-by-nc |
| primary_location.is_accepted | True |
| primary_location.is_published | True |
| primary_location.raw_source_name | Computer Communications and Networks |
| primary_location.landing_page_url | https://doi.org/10.1007/978-1-4471-7299-4_1 |
| publication_date | 2016-01-01 |
| publication_year | 2016 |
| referenced_works | https://openalex.org/W3022669415, https://openalex.org/W2087263546, https://openalex.org/W1685415006, https://openalex.org/W2340377793, https://openalex.org/W1966241962, https://openalex.org/W4247813319, https://openalex.org/W2086021498, https://openalex.org/W2005063137, https://openalex.org/W2134992366, https://openalex.org/W2138696233, https://openalex.org/W1517918327, https://openalex.org/W2053995654, https://openalex.org/W2124429752, https://openalex.org/W1570872333, https://openalex.org/W2019297318, https://openalex.org/W1985864255, https://openalex.org/W2031397481, https://openalex.org/W1545599162, https://openalex.org/W1536940247, https://openalex.org/W2156350103, https://openalex.org/W2493772046, https://openalex.org/W1999234217, https://openalex.org/W2106671073, https://openalex.org/W2743377870 |
| referenced_works_count | 24 |
| abstract_inverted_index.6, | 64 |
| abstract_inverted_index.IP | 62 |
| abstract_inverted_index.in | 8, 76 |
| abstract_inverted_index.is | 23, 41 |
| abstract_inverted_index.of | 14, 26, 33, 36, 54 |
| abstract_inverted_index.on | 30, 58 |
| abstract_inverted_index.to | 92 |
| abstract_inverted_index.The | 12, 51 |
| abstract_inverted_index.and | 17, 38, 45, 84, 86 |
| abstract_inverted_index.are | 49, 73, 95 |
| abstract_inverted_index.the | 4, 9, 20 |
| abstract_inverted_index.This | 0 |
| abstract_inverted_index.also | 96 |
| abstract_inverted_index.data | 39 |
| abstract_inverted_index.them | 48 |
| abstract_inverted_index.time | 35 |
| abstract_inverted_index.used | 7 |
| abstract_inverted_index.with | 19, 90 |
| abstract_inverted_index.about | 3 |
| abstract_inverted_index.areas | 89 |
| abstract_inverted_index.based | 29, 57 |
| abstract_inverted_index.etc., | 72 |
| abstract_inverted_index.layer | 70 |
| abstract_inverted_index.terms | 6 |
| abstract_inverted_index.behind | 47 |
| abstract_inverted_index.botnet | 65 |
| abstract_inverted_index.packet | 77 |
| abstract_inverted_index.recent | 52 |
| abstract_inverted_index.source | 40 |
| abstract_inverted_index.trends | 53 |
| abstract_inverted_index.capture | 32 |
| abstract_inverted_index.chapter | 1 |
| abstract_inverted_index.network | 10, 15, 21, 27, 55, 93 |
| abstract_inverted_index.packet, | 34 |
| abstract_inverted_index.respect | 91 |
| abstract_inverted_index.various | 5 |
| abstract_inverted_index.version | 63 |
| abstract_inverted_index.honeypot | 60 |
| abstract_inverted_index.network, | 68 |
| abstract_inverted_index.purpose, | 31 |
| abstract_inverted_index.research | 88 |
| abstract_inverted_index.security | 22 |
| abstract_inverted_index.wireless | 67 |
| abstract_inverted_index.analysis, | 37, 82 |
| abstract_inverted_index.discusses | 2 |
| abstract_inverted_index.forensics | 16, 28, 56, 94 |
| abstract_inverted_index.Challenges | 75 |
| abstract_inverted_index.associated | 87 |
| abstract_inverted_index.background | 13 |
| abstract_inverted_index.difference | 18 |
| abstract_inverted_index.discussed. | 24, 42, 50, 97 |
| abstract_inverted_index.forensics, | 61, 66, 71 |
| abstract_inverted_index.forensics. | 11 |
| abstract_inverted_index.motivation | 46 |
| abstract_inverted_index.application | 69 |
| abstract_inverted_index.collection, | 80 |
| abstract_inverted_index.elaborated. | 74 |
| abstract_inverted_index.Definitions, | 43 |
| abstract_inverted_index.examination, | 81 |
| abstract_inverted_index.applications, | 44 |
| abstract_inverted_index.preservation, | 79, 83 |
| abstract_inverted_index.Classification | 25 |
| abstract_inverted_index.steganography, | 59 |
| abstract_inverted_index.decision-making | 85 |
| abstract_inverted_index.identification, | 78 |
| cited_by_percentile_year | |
| countries_distinct_count | 1 |
| institutions_distinct_count | 2 |
| sustainable_development_goals[0].id | https://metadata.un.org/sdg/5 |
| sustainable_development_goals[0].score | 0.6600000262260437 |
| sustainable_development_goals[0].display_name | Gender equality |
| citation_normalized_percentile.value | 0.51620239 |
| citation_normalized_percentile.is_in_top_1_percent | False |
| citation_normalized_percentile.is_in_top_10_percent | False |