Network Forensic Investigation of HTTPS Protocol
Journal Title: International Journal of Modern Engineering Research (IJMER) - Year 2013, Vol 3, Issue 5
Abstract
Nowadays a large amount of personal and business transactions are done electronically through secured internet communication with HTTPS Protocol. The internet offers computer users access to a wealth of information and reaches in to the heart of many organizations. In this context, there are many possibilities for having different malicious activities or attacks that may occur through the HTTPS protocol. Usually it is very difficult to see or recreate HTTPS network sessions to verify its content as part of the forensic analysis. Network analysts must be able to see and test the packet data when a malicious network usage is identified and produce actual session by recreating the original data between users as part of forensic analysis. So we need an efficient forensic system to perform this kind of content analysis. The proposed novel technique can be used for content level observation of HTTPS protocol and regenerate original malicious HTTPS session between users for network forensic investigations.
Authors and Affiliations
Manesh T , Brijith B , Bhraguram T M , R Rajaram, Bhadran V K
Harmonic Analysis of 6-Pulse and 12-Pulse Converter Models
This paper discusses the impact of using 6-pulse and 12-pulse rectifier circuit commonly found in HVDC systems. The 12-pulse rectifier circuit commonly found in HVDC systems. The 12
Authenticated and unrestricted auditing of big data space on cloud through valid and efficient granular updates
The high speed digital circuits became more prominent with incorporating information processing and computing. Arithmetic circuits play a very critical role in both general-purpose and application specific computat...
An Optimal Cooperative Provable Data Possession Scheme for Distributed Cloud Storage
In recent years, cloud storage services has become a faster growth and makes large profits by providing the services to the customer for their needs on the internet and data sharing. Cloud environment provides the...
SEGMENTATION AND COUNTING OF PEOPLE THROUGH COLLABORATIVE AUGMENTED
In this System counting of people is done with the help of computer vision. The reason behind this is that computer vision is the field which is concerned with the automated processing of images from the real...
Theoretical heat conduction model development of a Cold storage using Taguchi Methodology
In this project work a mathematical heat conduction model of a cold storage (with the help of computer program; and multiple regression analysis) has been proposed which can be used for further development of c...