Title:
Network Forensics Analysis Using Piecewise Polynomials
Network Forensics Analysis Using Piecewise Polynomials
dc.contributor.author | Sanders, Sean Marcus | |
dc.date.accessioned | 2011-06-28T19:25:14Z | |
dc.date.available | 2011-06-28T19:25:14Z | |
dc.date.issued | 2010 | |
dc.description | The Tower is an official publication of the Georgia Tech Board of Student Publications and is sponsored by the Undergraduate Research Opportunities Program and the Price Gilbert Memorial Library System. This article is from Volume 2. | en_US |
dc.description.abstract | The information transferred over computer networks is vulnerable to attackers. Network forensics deals with the capture, recording, and analysis of network events to determine the source of security attacks and other network-related problems. Electronic devices send communications across networks by sending network data in the form of packets. Networks are typically represented using discrete statistical models. Discrete statistical models are computationally expensive and utilize a significant amount of memory. A continuous piecewise polynomial model is proposed to address the shortcomings of discrete models and to further aid forensic investigators. Piecewise polynomial approximations are beneficial because sophisticated statistics are easier to perform on smooth continuous data , rather than on unpredictable discrete data. Polynomials, moreover, utilize roughly six times less memory than a collection of individual data points, making this approach storage-friendly. A variety of networks have been modeled, and it is possible to distinguish network traffic using a piecewise polynomial approach. These preliminary results show that representing network traffic as piecewise polynomials can be applied to the area of network forensics for the purpose of intrusion analysis. This type of analysis will consist of not only identifying an attack, but also discovering details about the attacks and other suspicious network activity by comparing and distinguishing archived piecewise polynomials. | en_US |
dc.description.advisor | Henry L. Owen, School of Electrical and Computer Engineering, Georgia Institute of Technology | |
dc.description.sponsorship | Undergraduate Research Opportunities Program ; Price Gilbert Memorial Library System. | en_US |
dc.identifier.uri | http://hdl.handle.net/1853/39399 | |
dc.language.iso | en | en_US |
dc.publisher | Georgia Institute of Technology | en_US |
dc.relation.ispartofseries | The Tower. Volume 2. | en_US |
dc.subject | Computer networks | en_US |
dc.subject | Network forensics | en_US |
dc.subject | Network traffic | en_US |
dc.title | Network Forensics Analysis Using Piecewise Polynomials | en_US |
dc.type | Text | |
dc.type.genre | Article | |
dspace.entity.type | Publication | |
local.contributor.corporatename | Undergraduate Research Opportunities Program | |
relation.isOrgUnitOfPublication | 0db885f5-939b-4de1-807b-f2ec73714200 |