Author:Dlamini, I; Olivier, M; Sibiya, SDate:Aug 2009Network forensics involves capturing, recording and analysing network activity in discovering the source of security policy violations or information assurance. The network forensic system that is described in this paper is called the ...Read more
Author:Mutanga, MB; Mudali, P; Dlamini, IZ; Ndlovu, L; Xulu, SSDate:May 2010Network forensics plays a major role in the investigation of criminal activities involving computer networks. Investigating such crimes is still an open research area due to the fact that technology is always advancing hence investigators ...Read more
Author:Dlamini, I; Olivier, MDate:Jul 2009Currently, network evidence used in a court of law can be lacking and inadequate for prosecution purposes, due to a loss of packets during the network transmission. This packet loss in turn may be caused by the congestion of data transmitted ...Read more
Author:Sibiya, G; Venter, HS; Ngobeni, Sipho J; Fogwill, TDate:Aug 2012Cloud computing is a new computing paradigm that presents fresh research issues in the field of digital forensics. Cloud computing builds upon virtualisation technologies and is distributed in nature. Depending on its implementation, the cloud ...Read more
Author:Dlamini, I; Olivier, M; Sibiya, SDate:Aug 2009The use of design patterns usually changes the approach of software design and makes software development relatively easy. This paper extends work on a forensic model for Logical Traffic Isolation (LTI) based on Differentiated Services ...Read more
Author:Dlamini, I; Olivier, M; Grobler, MDate:Jun 2009This paper extends work on a forensic model for traffic isolation based on Differentiated Services (DiffServ) and measures its performance by using a simulation. The simulated model has four basic components: traffic generators, the DiffServ ...Read more