Abstract
Various security weaknesses have been identified in mobile ad-hoc networks (MANET). The paper focuses on MANET forensics whereby a third party can prove there was attack by collecting and analyzing evidence about it. The paper describes such a MANET forensics analysis method using a Bloom filter.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Jones, R.: The Internet forensics – Gathering and analysis of electronic evidence to solve crime. O’Reilly, Japan (2006)
Otaka, A., Takahashi, O., Takagi, T.: Reliable Method for Collecting and Evaluating Transmission Records for MANET Forensics. In: Proc. of International Workshop on Infomatics (IWIN 2008), pp. 24–27 (2008)
Otaka, A., Takagi, T., Takahashi, O.: Network Forensics on Mobile Ad-hoc Networks. In: Lovrek, I., Howlett, R.J., Jain, L.C. (eds.) KES 2008, Part III. LNCS (LNAI), vol. 5179, pp. 175–182. Springer, Heidelberg (2008)
Bloom, B.H.: Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13(7), 422–426 (1970)
Tsujii, S. (editorial supervisor): Digital forensics dictionary, Digital forensics society (2006)
Itou, T.N.M.: Trend of forensics technology that uses network information. NTT Journal, 36–40 (2004)
Abdullah, K., Lee, C., Conti, G.J., Copeland, J.A., Stasko, J.T.: IDS RainStorm: Visualizing IDS Alarms. In: Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 2005), pp. 1–10. IEEE Computer Society, Los Alamitos (2005)
Koike, H., Ohno, K., Koizumi, K.: Visualizing Cyber Attacks using IP Matrix. In: Proc. IEEE Workshop on Visualization for Computer Security (VizSEC 2005), pp. 91–98. IEEE Computer Society, Los Alamitos (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Mishina, T., Shiraishi, Y., Takahashi, O. (2010). Evidence Analysis Method Using Bloom Filter for MANET Forensics. In: Setchi, R., Jordanov, I., Howlett, R.J., Jain, L.C. (eds) Knowledge-Based and Intelligent Information and Engineering Systems. KES 2010. Lecture Notes in Computer Science(), vol 6278. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15393-8_55
Download citation
DOI: https://doi.org/10.1007/978-3-642-15393-8_55
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15392-1
Online ISBN: 978-3-642-15393-8
eBook Packages: Computer ScienceComputer Science (R0)