Back to Results
First PageMeta Content
Digital forensics / Data management / Computer networking / Network forensics / Transmission Control Protocol / Data center / IP address / HOLMES 2 / Windows / Computing / Concurrent computing / Distributed computing


Holmes: A Data Theft Forensic Framework Ramya Jayaram Masti #1 , Vincent Lenders ∗2 , Mario Strasser #3 , Stefan Engel ∗4 , Bernhard Plattner #5 # 1 ETH Zurich, Switzerland
Add to Reading List

Document Date: 2011-10-06 10:35:58


Open Document

File Size: 179,31 KB

Share Result on Facebook

City

Iguaçu / /

Company

Distributed Computing Systems / C ONCLUSIONS FTP Client 1 Attacker / HTTP Client 1 FTP Client 2 Attacker / /

Country

Brazil / /

Currency

USD / /

/

Facility

Host A's port / /

IndustryTerm

software vulnerability / compact network / communications security / host data collection tools / live analysis using such tools / enough network / on-line collection / in-line device / Internet Mathematics / heterogeneous network / gigabit networks / simpler solution / forensic tools / average networks / transfer network / Internet Measurement / search threads / heterogeneous networks / ne search granularities / data processing efficiency / guidance software / 1Gbps network / search space / application layer protocol / search granularity / passive tab device / forensics network / internal network / /

OperatingSystem

Windows Vista / Windows XP Professional / Microsoft Windows / /

Organization

IMC / /

Person

Fig / S. Kornexl / V / Bernhard Plattner / Mario Strasser / Stefan Engel / /

Position

investigator / NetWitness Investigator / /

Product

Holmes / Memoryze / /

ProgrammingLanguage

XML / /

PublishedMedium

LECTURE NOTES IN COMPUTER SCIENCE / /

Technology

LAN / XML / RAM / MAC address / gigabit / operating system / UDP / operating systems / application layer protocol / mobile devices / /

URL

http /

SocialTag