Network Forensics in the Era of Artificial Intelligence

Edited book (chapter)


Yang, Wencheng, Johnstone, Michael N., Wang, Song, Karie, Nickson M., Bin Sahri, Nor Masri and Kang, James Jin. 2022. "Network Forensics in the Era of Artificial Intelligence." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 171-190
Chapter Title

Network Forensics in the Era of Artificial Intelligence

Book Chapter CategoryEdited book (chapter)
ERA Publisher ID3337
Book TitleExplainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence
AuthorsYang, Wencheng (Author), Johnstone, Michael N. (Author), Wang, Song (Author), Karie, Nickson M. (Author), Bin Sahri, Nor Masri (Author) and Kang, James Jin (Author)
EditorsAhmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan
Volume1025
Page Range171-190
SeriesStudies in Computational Intelligence
Chapter Number8
Number of Pages20
Year2022
PublisherSpringer
Place of PublicationCham, Switzerland
ISBN9783030966294
9783030966300
ISSN1860-949X
1860-9503
Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-030-96630-0_8
Web Address (URL)https://link.springer.com/chapter/10.1007/978-3-030-96630-0_8
Abstract

Network forensics investigates a network attack by tracing the source of the attack and attributing the crime to a person, host or network. It can anticipate prospective attacks by establishing attack patterns based on available evidence and intrusion data traces. This chapter introduces network forensics, describes some common attacks targeting networks and existing network forensic tools. Moreover, this chapter describes the current development of network forensics techniques, such as IP Traceback Techniques, Intrusion Detection Systems, Attack Graph-based Techniques, Honeypots and Privacy-preserving Data Analytics. Based on the above, some specific research gaps in current network forensics research in the era of artificial intelligence are identified.

KeywordsArtificial intelligence; Cyberattacks; Intrusion detection systems; Network frensics
ANZSRC Field of Research 2020460402. Data and information privacy
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsEdith Cowan University
La Trobe University
Journal TitleStudies in Computational Intelligence
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q7v4y/network-forensics-in-the-era-of-artificial-intelligence

  • 35
    total views
  • 4
    total downloads
  • 0
    views this month
  • 0
    downloads this month

Export as

Related outputs

A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks
Bedari, Aseel, Wang, Song and Yang, Wencheng. 2022. "A Secure Online Fingerprint Authentication System for Industrial IoT Devices over 5G Networks." Sensors. 22 (19), pp. 1-16. https://doi.org/10.3390/s22197609
Multimedia security and privacy protection in the internet of things: research developments and challenges
Yang, Wencheng, Wang, Song, Hu, Jiankun and Karie, Nickson M.. 2022. "Multimedia security and privacy protection in the internet of things: research developments and challenges." International Journal of Multimedia Intelligence and Security. 4 (1), pp. 20-46. https://doi.org/10.1504/ijmis.2022.121282
Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats
Karie, Nickson M., Bin Sahri, Nor Masri Bin, Yang, Wencheng and Johnstone, Michael N.. 2022. "Leveraging Artificial Intelligence Capabilities for Real-Time Monitoring of Cybersecurity Threats." Ahmed, Mohiuddin, Islam, Sheikh Rabiul, Anwar, Adnan, Moustafa, Nour and Pathan, Al-Sakib Khan (ed.) Explainable Artificial Intelligence for Cyber Security: Next Generation Artificial Intelligence. Cham, Switzerland. Springer. pp. 141-169
A linear convolution-based cancelable fingerprint biometric authentication system
Yang, Wencheng, Wang, Song, Kang, James Jin, Johnstone, Michael N. and Bedari, Aseel. 2022. "A linear convolution-based cancelable fingerprint biometric authentication system." Computers and Security. 114, pp. 1-14. https://doi.org/10.1016/j.cose.2021.102583
A Review on Security Issues and Solutions of the Internet of Drones
Yang, Wencheng, Wang, Song, Yin, Xuefei, Wang, Xu and Hu, Jiankun. 2022. "A Review on Security Issues and Solutions of the Internet of Drones." IEEE Open Journal of the Computer Society. 3, pp. 96-110. https://doi.org/10.1109/OJCS.2022.3183003