Reference Hub25
A Review of Current Research in Network Forensic Analysis

A Review of Current Research in Network Forensic Analysis

Ikuesan R. Adeyemi, Shukor Abd Razak, Nor Amira Nor Azhan
Copyright: © 2013 |Volume: 5 |Issue: 1 |Pages: 26
ISSN: 1941-6210|EISSN: 1941-6229|EISBN13: 9781466631168|DOI: 10.4018/jdcf.2013010101
Cite Article Cite Article

MLA

Adeyemi, Ikuesan R., et al. "A Review of Current Research in Network Forensic Analysis." IJDCF vol.5, no.1 2013: pp.1-26. http://doi.org/10.4018/jdcf.2013010101

APA

Adeyemi, I. R., Razak, S. A., & Azhan, N. A. (2013). A Review of Current Research in Network Forensic Analysis. International Journal of Digital Crime and Forensics (IJDCF), 5(1), 1-26. http://doi.org/10.4018/jdcf.2013010101

Chicago

Adeyemi, Ikuesan R., Shukor Abd Razak, and Nor Amira Nor Azhan. "A Review of Current Research in Network Forensic Analysis," International Journal of Digital Crime and Forensics (IJDCF) 5, no.1: 1-26. http://doi.org/10.4018/jdcf.2013010101

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Establishing facts on cyber crime is gradually gaining wider relevance in prosecuting cyber criminals. The branch of cyber policing saddled with this responsibility is the network forensic community (researchers, developer, and investigator). However, the recurring rate of advances in cybercrime poses greater challenge to the available improvements in network forensics analysis tools (NFAT) as well as to investigators, and ultimately, researchers. The need for an efficient cutting-edge research finding in curbing network crimes therefore is undeniably critical. This paper describes the distinction between network security and network forensics. In addition, the authors identify factors that militate against most network forensic techniques as well as the research challenges in network forensics. Furthermore, the paper discusses on the current research works on network forensics analysis. This research is useful to the research community of network forensics, for knowledge on existing research techniques, and direction on further research in network forensics.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.