ABSTRACT

This book primarily focuses on providing deep insight into the concepts of network security, network forensics, botnet forensics, ethics and incident response in global perspectives. It also covers the dormant and contentious issues of the subject in most scientific and objective manner. Various case studies addressing contemporary network forensics issues are also included in this book to provide practical know – how of the subject.

Network Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, intention of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the dormant and latent issues of the acquisition and system live investigation too.

Features:

  • Follows an outcome-based learning approach.
  • A systematic overview of the state-of-the-art in network security, tools, Digital forensics.
  • Differentiation among network security, computer forensics, network forensics and botnet forensics.
  • Discussion on various cybercrimes, attacks and cyber terminologies.
  • Discussion on network forensics process model.
  • Network forensics tools and different techniques
  • Network Forensics analysis through case studies.
  • Discussion on evidence handling and incident response.
  • System Investigations and the ethical issues on network forensics.

This book serves as a reference book for post graduate and research investigators who need to study in cyber forensics. It can also be used as a textbook for a graduate level course in Electronics & Communication, Computer Science and Computer Engineering.

part A|94 pages

Network Forensics Concepts

chapter 1|27 pages

Introduction to Network Forensics

chapter 2|21 pages

Cyber Crime

chapter 3|23 pages

Network Forensics Process Model

chapter 4|18 pages

Classification of Network Forensics

part B|62 pages

Network Forensics Acquisition

chapter 5|21 pages

Network Forensics Tools

chapter 6|18 pages

Network Forensics Techniques

chapter 7|20 pages

Detection of Vulnerabilities

part C|114 pages

Network Forensics Attribution

chapter 8|22 pages

Network Forensics Analysis

chapter 9|19 pages

Evidence and Incident Response

chapter 10|19 pages

Introduction to Botnet

chapter 11|25 pages

Botnet Forensics

chapter 12|24 pages

System Investigation and Ethical Issues