Application Layer Based Packet Analysis And Intrusion Detection

Journal Title: INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY - Year 2012, Vol 3, Issue 4

Abstract

 Network forensics is basically a new approach when it comes to the network information security, because the IDS and firewall cannot always discover and stop the misuse in the whole network. This proposed work is used to capture and analyze the data exchanged among the many different IP traceback techniques like packet marking that assist a forensic investigator to recognize the promicious ip source packets. The proposed network forensics only focus on the network traffic capture,arp spoofing,mac spoofing,attack alerting and traffic replay, that often results in the performance of forensics analysis difficulties. In this particular paper, the frameworks of distributed real time network intrusion forensics system, that's deployed in local area network environment is analyzed and investigated.

Authors and Affiliations

BONTHAGORLA VENKATA KOTESWARAO#1 , SHAIK SALMA BEGUM#2

Keywords

Related Articles

Peak Monitoring the Egotistic Nodes in MANET During Duplication Allocation

Mobile Ad Hoc Network is a collection of mobile hosts. The mobility nature of the MANET causes the mobile host to move freely in the network, due to that network disconnections occurs frequently and this causes frequent...

Feature Extraction of ECG Signal Using HHT Algorithm

This paper describe the features extraction algorithm for electrocardiogram (ECG) signal using Huang Hilbert Transform and Wavelet Transform. ECG signal for an individual human being is different due to unique heart stru...

Relevance Feedback Techniques Implemented in CBIR: Current Trends and Issues

The semantic gap problem and the performance accuracy issues in a Content Based Image Retrieval System (CBIR) can be efficiently overcome by the Relevance Feedback mechanism. Based on this feedback the CBIR system modifi...

 Improved Transformerless Inverter for PV Grid Connected Power System by using ISPWM Technique

 This paper presents an improved transformerless inverter with common mode leakage current elimination for a photovoltaic grid connected power system by using inverse sine carrier pulse width modulation (ISPWM). To...

Optimal Rescheduling of Generators for Congestion Management by using Godlike Algorithm

Congestion charges can be analyzed in both the cases. In a pool market mode, the sellers (competitive generators) may propose their rise and reduce bid prices in a real-time balancing market. Correspondingly, in the crat...

Download PDF file
  • EP ID EP120137
  • DOI -
  • Views 106
  • Downloads 0

How To Cite

BONTHAGORLA VENKATA KOTESWARAO#1, SHAIK SALMA BEGUM#2 (2012).  Application Layer Based Packet Analysis And Intrusion Detection. INTERNATIONAL JOURNAL OF ENGINEERING TRENDS AND TECHNOLOGY, 3(4), 552-556. https://europub.co.uk/articles/-A-120137