Prof Bill Buchanan B.Buchanan@napier.ac.uk
Professor
Advanced security and network forensics: network forensics.
Buchanan, William J
Authors
Abstract
3 NETWORK FORENSICS
3.1 Objectives
3.2 Introduction
3.3 The key protocols
3.4 Ethernet, IP and TCP headers
3.5 TCP connection
3.6 ARP
3.7 SYN
3.8 Application Layer Analysis - FTP
3.9 ICMP
3.10 DNS
3.11 Port scan
3.12 SYN flood
3.13 Spoofed addresses
3.14 Application Layer Analysis - HTTP
HTTP messages
3.15 Network logs on hosts
3.16 Tripwire
3.17 Tutorial
Citation
Buchanan, W. J. (2011). Advanced security and network forensics: network forensics. [Educational toolkit]. Edinburgh Napier University
Other Type | Teaching Resource |
---|---|
Publication Date | Jan 25, 2011 |
Deposit Date | Jan 25, 2011 |
Publicly Available Date | Jan 25, 2011 |
Peer Reviewed | Not Peer Reviewed |
Keywords | Network forensics; network protocols; application protocols; file transfer; tripwire; host trace; |
Public URL | http://researchrepository.napier.ac.uk/id/eprint/4148 |
Contract Date | Jan 25, 2011 |
Files
unit03.pdf
(4.5 Mb)
PDF
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
asnf_unit03.html
(497 bytes)
Other
Publisher Licence URL
http://creativecommons.org/licenses/by-nc/4.0/
You might also like
Securing IoT: Mitigating Sybil Flood Attacks with Bloom Filters and Hash Chains
(2024)
Journal Article
Detection of Ransomware
(2024)
Patent
Downloadable Citations
About Edinburgh Napier Research Repository
Administrator e-mail: repository@napier.ac.uk
This application uses the following open-source libraries:
SheetJS Community Edition
Apache License Version 2.0 (http://www.apache.org/licenses/)
PDF.js
Apache License Version 2.0 (http://www.apache.org/licenses/)
Font Awesome
SIL OFL 1.1 (http://scripts.sil.org/OFL)
MIT License (http://opensource.org/licenses/mit-license.html)
CC BY 3.0 ( http://creativecommons.org/licenses/by/3.0/)
Powered by Worktribe © 2025
Advanced Search