in network forensics log analysis techniques using clustering · sophisticated digital forensics,...

11
Log Analysis Techniques using Clustering in Network Forensics By Imam Riadi WORD COUNT 5105 T IME SUBMIT T ED 18-JUL-2017 09:41AM PAPER ID 30571450

Upload: others

Post on 16-Aug-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital

Log Analysis Techniques using Clusteringin Network Forensics

By Imam Riadi

WORD COUNT 5105 TIME SUBMITTED 18-JUL-2017 09:41AM

PAPER ID 30571450

Page 2: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 3: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 4: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 5: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 6: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 7: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 8: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 9: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital
Page 10: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital

3%SIMILARITY INDEX

1

2

3

4

5

6

7

8

EXCLUDE QUOTES OFF

EXCLUDE BIBLIOGRAPHY OFF

EXCLUDE MATCHES OFF

Log Analysis Techniques using Clustering in NetworkForensicsORIGINALITY REPORT

PRIMARY SOURCES

issuu.comInternet

akademik.unsoed.ac.idInternet

interscience.inInternet

Zhu, Ying. "Attack Pattern Discovery in ForensicInvestigation of Network Attacks", IEEE Journal onSelected Areas in Communications, 2011.Crossref

www.forensicmag.comInternet

www.computersecuritydirectory.comInternet

www.dronasoft.comInternet

www.sersc.orgInternet

40 words — 1%

24 words — < 1%

21 words — < 1%

21 words — < 1%

10 words — < 1%

10 words — < 1%

10 words — < 1%

9 words — < 1%

Page 11: in Network Forensics Log Analysis Techniques using Clustering · sophisticated Digital forensics, In essence, answer the question: when what, who, where, how and why related to digital