Abstract

By focusing on intrinsic network weaknesses and communication processes, network forensics techniques aid in the tracking of internal and external network attacks. However, when cyber criminals remove traces in order to evade detection, the investigation of cybercrime becomes more difficult. As a result, network forensics approaches use mechanisms to make inquiry easier by recording every packet and event that passes over the network. As a result, it is possible to determine the source of the assault by reconstructing the captured data. The purpose of this paper is to outline effectives way of carrying out network autopsy. Keywords: Network Autopsy, Network Forensics, Network Security, Packets, Data Capture. BOOK Chapter ǀ Research Nexus in IT, Law, Cyber Security & Forensics. Open Access. Distributed Free Citation: Louis Opoku Gyamfi (2022): Effective ways of Carrying Out Network Autopsy Book Chapter Series on Research Nexus in IT, Law, Cyber Security & Forensics. Pp 329-334 www.isteams.net/ITlawbookchapter2022. dx.doi.org/10.22624/AIMS/CRP-BK3-P52

Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call