Network Forensics Research Papers - Academia.edu (original) (raw)

Introduction Network Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Network Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law... more

Introduction
Network Forensic has grown from a relatively obscure tradecraft to an important part of many investigations. Network Forensic tools are now used on a daily basis by examiners and analysts within local, state and Federal law enforcement; within the military and other US government organizations; and within the private “e-Discovery” industry. Developments in forensic research, tools, and process over the past decade have been very successful and many in leadership positions now rely on these tools on a regular basis frequently without realizing it. Moreover, there seems to be a widespread belief, buttressed on by portrayals in the popular media, that advanced tools and skillful practitioners can extract actionable information from practically any device that a government, private agency, or even a skillful individual might encounter. The field of computer forensic analysis is as rapidly changing as other security fields.

Objective
Network security when combined with forensic computing gives rise to a term known as network forensics which is nothing but a type of digital forensics which aims at the analysis of network traffic of a system for collection of information pertaining to the legal evidences related to various security breaches and intrusion detection. The network investigations that are performed by it utilize the dynamic information characteristic of a system which changes rapidly with time; hence it is a crucial task.

The two major tasks that are performed by it include:
• Keeping a check over anomalous traffic
• Intrusion detection

The intruder tries to steal the significant information from the communication that takes place in the network. Network forensic analysis deals with identifying all such vulnerable operation along with the legal law enforcements that will be triggered after that. Example: analyzing the chat sessions. Several tools are available for performing network forensics like Wireshark. Another category of network forensics is Wireless forensics which deals with the wireless traffic and its transmission. The use of Voice-over-IP (VoIP) technology plays a crucial role in this.

Target Audience
The target audience of this book will be composed of professionals and researchers working in the field of network security, computer science, security engineering, cyber crime and network forensic. Moreover, the book will provide insights and support from practitioners and academia in order to highlight the most debated aspects in the field.

Recommended Topics
Network Security: Attacks and Controls
Analysis of attacks, defenses, and countermeasures
Anonymity, Privacy, ID theft and Ethics
Dependability and security forensics
Denial-of-Service and botnet analysis, detection, and mitigation
NetworkMinerCLI: Automating content extraction with our command line tool
Cyber Crime Toolkit Development
Securing Wireless Sensor Networks
Web Service Security
Problem in Cyber Ethics
Mobile Ad Hoc Network Security Vulnerabilities
Cyber Crimes and Profiling System
Impact of Big Data on Security
Forensic Impacts on Social Media Platforms
Forensic Computing: Today & Tomorrow
Network Security & Forensic Analysis

Submission Procedure
Researchers and practitioners are invited to submit on or before March 30, 2017, a chapter proposal of 1,000 to 2,000 words clearly explaining the mission and concerns of his or her proposed chapter. Authors will be notified by April 30, 2017 about the status of their proposals and sent chapter guidelines. Full chapters are expected to be submitted by May 30, 2017, and all interested authors must consult the guidelines for manuscript submissions at http://www.igi-global.com/publish/contributor-resources/before-you-write/ prior to submission. All submitted chapters will be reviewed on a double-blind review basis. Contributors may also be requested to serve as reviewers for this project.

Note: There are no submission or acceptance fees for manuscripts submitted to this book publication, Trust in Knowledge Management and Systems in Organizations. All manuscripts are accepted based on a double-blind peer review editorial process.

All proposals should be submitted through the E-Editorial DiscoveryTM online submission manager.

Publisher
This book is scheduled to be published by IGI Global (formerly Idea Group Inc.), publisher of the "Information Science Reference" (formerly Idea Group Reference), "Medical Information Science Reference," "Business Science Reference," and "Engineering Science Reference" imprints. For additional information regarding the publisher, please visit www.igi-global.com. This publication is anticipated to be released in 2017.

Important Dates

Full chapter Submission: .................................................................. May 30, 2017
Review Results to Chapter Authors: ................................................. July 30, 2017
Revised Chapter Submission from Chapter Authors: ....................... August 30, 2017
Final Acceptance Notifications to Chapter Authors: ........................ September 15, 2017
Submission of Final Chapters to Editor: ...........................................September 30, 2017

Inquiries
Gulshan Shrivastava
gulshanstv@gmail.com

Prabhat Kumar
prabhat@nitp.ac.in

B.B. Gupta
gupta.brij@gmail.com

Suman Bala
suman1005@gmail.com

Nilanjan Dey
neelanjandey@gmail.com