A network forensics system for information leak events

Tao Zou, Mansoor Alam, Min Song

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The events of information leak and illegal content propagation often occur on the network. The existing techniques cannot collect sufficient evidences about users' contents to support forensics for these events. A new approach and a system are proposed which apply Chinese word segment and bloom filter to store the digest of users' contents. With this system, investigators can trace back the events that happened months or even years ago without extra cost of hardware storage.

Original languageEnglish
Title of host publicationWireless Algorithms, Systems, and Applications - 8th International Conference, WASA 2013, Proceedings
Pages54-63
Number of pages10
DOIs
StatePublished - 2013
Event8th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013 - Zhangjiajie, China
Duration: 7 Aug 201310 Aug 2013

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7992 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference8th International Conference on Wireless Algorithms, Systems, and Applications, WASA 2013
Country/TerritoryChina
CityZhangjiajie
Period7/08/1310/08/13

Keywords

  • data processing
  • network forensics
  • users' contents

Fingerprint

Dive into the research topics of 'A network forensics system for information leak events'. Together they form a unique fingerprint.

Cite this