Přístupnostní navigace
E-application
Search Search Close
Publication detail
PLUSKAL, J. RYŠAVÝ, O. MATOUŠEK, P.
Original Title
On the Identification of Applications from Captured Network Traffic
Type
presentation, poster
Language
English
Original Abstract
Digital forensics uses hashingas a tool to ensure data integrity and detecting known objects. Detecting know communication is more complicated as eachdata transfer contains specific and temporary characteristic, e.g., IPaddresses, sequence numbers, andchecksums. In network security, the anomaly or dangerous communication isidentified by applying methods of traffic classification. In this presentation, werevisit the methods for traffic classification todetermine an approach that can apply tothe problem of distinguishing the traffic to known and suspect. Suchclassification can reduce the amount ofinformation that needs to be analyzed by the forensic specialist during the investigation.
Keywords
cyber forensics, cyber security, intrusion detection system,metadata, traffic classification
Authors
PLUSKAL, J.; RYŠAVÝ, O.; MATOUŠEK, P.
Released
30. 9. 2016
Location
New York
Pages count
15
URL
https://prezi.com/wnxlghgkocti
BibTex
@misc{BUT133042, author="Jan {Pluskal} and Ondřej {Ryšavý} and Petr {Matoušek}", title="On the Identification of Applications from Captured Network Traffic", year="2016", pages="15", address="New York", url="https://prezi.com/wnxlghgkocti", note="presentation, poster" }