Crime psychology using network forensics


Anchit Bijalwan

British University Vietnam, Vietnam

: J Comput Eng Inf Technol

Abstract


Network Forensics is a nascent science that focuses on postmortem activities. Due to the tremendous growth of the user’s dependency on the Internet, the black hat community is thriving themselves for intending their purpose. It is very difficult to retard these black hat communities as they use to proliferate attacks through umpteen new ideas. Even sometimes the cyber expert is also unable to find from where the attack emanates. This kind of problem evolved the terminology “Network Forensics”. It is also referred to as a dynamic analysis of an attack. The expert used to analyze all ingress and egress traffic and through various steps, they generate documentary evidence of the source as well as the type of crime. This network-based evidence is a field of study that focuses on a systematic investigation of crime. It unfolds the clue, which is hidden in web servers, network servers as well as in email servers over the internet. The different tools and techniques help to retrieve the types of crime and incident response ensures us the origin of the crime. The investigation takes place on various grounds such as all the previous cyber-attacks, viruses, Trojans, worms, and all types of network attacks. It is obvious that the complete comprehend information of attack intention can be acquired through the investigation of network forensics. This presentation will show the attacker’s psychology for permeating their intention, and shows the various terminologies of network security, network forensics, computer forensics, and digital forensics. The presentation will also show the latest research trends in network forensics Recent Publications: 1. Effect on Compressive Strength of Portland Pozzolana Cement on Adding Admixtures Using Machine Learning Technique DOI:10.1007/978-981-99-1909-3_20 2.An early detection and segmentation of Brain Tumor using Deep Neural Network DOI:10.1186/s12911-023-02174-8 3.Acceleration of Deep Neural Network Training Using Field Programmable Gate Arrays DOI:10.1155/2022/8387364 4.An Optimized Approach Using Transfer Learning to Detect Drunk Driving DOI:10.1155/2022/8775607 5.Multivariate Analysis for Overcoming Complexities of Corporate Governance and Managerial Dilemma Using Data Mining Techniques DOI:10.1155/2022/5660442

Biography


Anchit has authored two books “Advanced Java Programming” and “Network Forensics: Privacy and Security”. He has also published more than fifty research papers in reputable international journals and conferences and has also been involved in many funded projects. His specialization is in Privacy and security. He has chaired the technical sessions for IEEE, ACM and Springer conferences, and he is also a committee member for umpteen conferences. He was a keynote speaker and special guest at the IEEE conference in El Salvador, and a keynote in Ethiopia, India, Vietnam, etc. He is a reviewer of Inderscience, IGI Global, IEEE Internet of Things Magazine, Willey, and many other publishers. He has a professional membership of the Association for Computing Machinery (ACM) and IEEE (Vietnam Section). In 2018, he was awarded an International Research Award from the International Research Association, London, UK..

Track Your Manuscript

Awards Nomination

GET THE APP