Please use this identifier to cite or link to this item:
http://hdl.handle.net/10603/340166
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.coverage.spatial | ||
dc.date.accessioned | 2021-09-14T03:54:44Z | - |
dc.date.available | 2021-09-14T03:54:44Z | - |
dc.identifier.uri | http://hdl.handle.net/10603/340166 | - |
dc.description.abstract | With an exponential increase in the data size and complexity of various seized items to be investigated, existing methods of network and computer forensics are not very efficient when it comes to dealing with accuracy and detection ratio. Till the time a well-established forensic technique is developed to handle security threats, a much more sophisticated attacks strike on network. Traditional Intrusion Detection Systems (IDS) and forensics techniques used to detect and prevent malicious network behaviours, fail to handle new or zero day attacks. The accuracy of Intrusion Detection Systems (IDS) and Intrusion Prevention Systems (IPS) is questionable, which can t be trusted for forensics. Another important drawback with the exiting techniques, is their inability to tackle high velocity and huge amount of heterogeneous data. Cyber forensic investigation mechanism has volume constraint, while processing the fast growing data from Information and Communication Technology (ICT) infrastructure, including IoT based devices and platforms. Non-tangible sources often don t have the limit of flowing data through them, especially through communication media. Hence, increasing the desperate requirement for an efficient benchmarking of big data analysis. Existing techniques exhibit inherent limitations in processing huge volume, variety, and velocity of data. It makes the process time-consuming and resource intensive. Available solutions to date have used an anomaly-based approach or have proposed approaches based on the deviation from a regular pattern. To tackle the seized bytes, authors have proposed an approach for big data forensics, with efficient sensitivity and precision. In order to maintain a balance between processing time and output efficiency, existing techniques put a limit on the amount of data under analysis, which results in a non-polynomial time complexity of these solutions. | |
dc.format.extent | 153p. | |
dc.language | English | |
dc.relation | ||
dc.rights | university | |
dc.title | Design and Implementation of Computer and Network Forensics Framework | |
dc.title.alternative | ||
dc.creator.researcher | Chhabra, Gurpal Singh | |
dc.subject.keyword | Big Data Forensics | |
dc.subject.keyword | Cyber Forensics | |
dc.subject.keyword | Network Forensics | |
dc.description.note | ||
dc.contributor.guide | Singh, Maninder and Singh, Varinder Pal | |
dc.publisher.place | Patiala | |
dc.publisher.university | Thapar Institute of Engineering and Technology | |
dc.publisher.institution | Department of Computer Science and Engineering | |
dc.date.registered | ||
dc.date.completed | 2019 | |
dc.date.awarded | ||
dc.format.dimensions | ||
dc.format.accompanyingmaterial | None | |
dc.source.university | University | |
dc.type.degree | Ph.D. | |
Appears in Departments: | Department of Computer Science and Engineering |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
01_title.pdf | Attached File | 268.74 kB | Adobe PDF | View/Open |
02_dedication.pdf | 163.19 kB | Adobe PDF | View/Open | |
03_certificate.pdf | 268.61 kB | Adobe PDF | View/Open | |
04_acknowlwedgement.pdf | 300.36 kB | Adobe PDF | View/Open | |
05_abstract.pdf | 177.06 kB | Adobe PDF | View/Open | |
06_table of contents.pdf | 201.49 kB | Adobe PDF | View/Open | |
07_list of figures.pdf | 191.26 kB | Adobe PDF | View/Open | |
08_list of tables.pdf | 175.65 kB | Adobe PDF | View/Open | |
09_chapter 1.pdf | 817.71 kB | Adobe PDF | View/Open | |
10_chapter 2.pdf | 1.13 MB | Adobe PDF | View/Open | |
11_chapter 3.pdf | 353.76 kB | Adobe PDF | View/Open | |
12_chapter 4.pdf | 608.99 kB | Adobe PDF | View/Open | |
13_chapter 5.pdf | 2.58 MB | Adobe PDF | View/Open | |
14_chapter 6.pdf | 1.21 MB | Adobe PDF | View/Open | |
15_chapter 7.pdf | 242.74 kB | Adobe PDF | View/Open | |
16_references.pdf | 421.64 kB | Adobe PDF | View/Open | |
17_research publications.pdf | 222.65 kB | Adobe PDF | View/Open | |
80_recommendation.pdf | 343.31 kB | Adobe PDF | View/Open |
Items in Shodhganga are licensed under Creative Commons Licence Attribution-NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0).
Altmetric Badge: