A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2022; you can also visit the original URL.
The file type is application/pdf
.
A Network Forensic Framework for Port Scan Attack based on Efficient Packet Capturing
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
In the last two decades the networks become larger in scale, more complex in structure and more diversified in traffic. Which generate huge amount of network packets such as TCP, UDP and HTTP etc. Log files are repository for captured packets and play a vital role in investigation. However, a significant and obvious limitation of current packet logging is that, data storage volume increases rapidly depending on factors such as network bandwidth and the number of points in the network that need
doi:10.35940/ijitee.l3850.1081219
fatcat:uhocjpcedvazppmdfeacjsg5ya