{"id":"https://openalex.org/W4231021644","doi":"https://doi.org/10.23919/icact.2018.8323758","title":"Forensic analysis of network packets from penetration test toolkits","display_name":"Forensic analysis of network packets from penetration test toolkits","publication_year":2018,"publication_date":"2018-02-01","ids":{"openalex":"https://openalex.org/W4231021644","doi":"https://doi.org/10.23919/icact.2018.8323758"},"language":"en","primary_location":{"id":"doi:10.23919/icact.2018.8323758","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323758","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038738213","display_name":"Da\u2010Yu Kao","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":true,"raw_author_name":"Da-Yu Kao","raw_affiliation_strings":["Department of Information Management, Central Police University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5031880226","display_name":"Yu-Siang Wang","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Yu-Siang Wang","raw_affiliation_strings":["Department of Information Management, Central Police University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061987526","display_name":"Fu-Ching Tsai","orcid":null},"institutions":[{"id":"https://openalex.org/I143545923","display_name":"Central Police University","ror":"https://ror.org/03xms6995","country_code":"TW","type":"education","lineage":["https://openalex.org/I143545923"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Fu-Ching Tsai","raw_affiliation_strings":["Department of Information Management, Central Police University, Taiwan"],"affiliations":[{"raw_affiliation_string":"Department of Information Management, Central Police University, Taiwan","institution_ids":["https://openalex.org/I143545923"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100721905","display_name":"Chien\u2010Hung Chen","orcid":"https://orcid.org/0000-0001-5219-3666"},"institutions":[{"id":"https://openalex.org/I2801834177","display_name":"Taipei City Government","ror":"https://ror.org/02eqw3q87","country_code":"TW","type":"government","lineage":["https://openalex.org/I2801834177"]}],"countries":["TW"],"is_corresponding":false,"raw_author_name":"Chien-Hung Chen","raw_affiliation_strings":["Information Management Office, New Taipei City Department, Taiwan"],"affiliations":[{"raw_affiliation_string":"Information Management Office, New Taipei City Department, Taiwan","institution_ids":["https://openalex.org/I2801834177"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5038738213"],"corresponding_institution_ids":["https://openalex.org/I143545923"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.54627249,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"363","last_page":"368"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12034","display_name":"Digital and Cyber Forensics","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9954000115394592,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7210205793380737},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.7077048420906067},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.666671633720398},{"id":"https://openalex.org/keywords/network-forensics","display_name":"Network forensics","score":0.6215646862983704},{"id":"https://openalex.org/keywords/hacker","display_name":"Hacker","score":0.5846739411354065},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5125736594200134},{"id":"https://openalex.org/keywords/marketing-buzz","display_name":"Marketing buzz","score":0.45762595534324646},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.440855473279953},{"id":"https://openalex.org/keywords/law-enforcement","display_name":"Law enforcement","score":0.4333319664001465},{"id":"https://openalex.org/keywords/botnet","display_name":"Botnet","score":0.42982548475265503},{"id":"https://openalex.org/keywords/network-security","display_name":"Network security","score":0.42132115364074707},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.28638342022895813},{"id":"https://openalex.org/keywords/digital-forensics","display_name":"Digital forensics","score":0.2197939157485962},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.18219420313835144}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7210205793380737},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.7077048420906067},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.666671633720398},{"id":"https://openalex.org/C50747538","wikidata":"https://www.wikidata.org/wiki/Q7001032","display_name":"Network forensics","level":3,"score":0.6215646862983704},{"id":"https://openalex.org/C86844869","wikidata":"https://www.wikidata.org/wiki/Q2798820","display_name":"Hacker","level":2,"score":0.5846739411354065},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5125736594200134},{"id":"https://openalex.org/C113993141","wikidata":"https://www.wikidata.org/wiki/Q906759","display_name":"Marketing buzz","level":2,"score":0.45762595534324646},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.440855473279953},{"id":"https://openalex.org/C2780262971","wikidata":"https://www.wikidata.org/wiki/Q44554","display_name":"Law enforcement","level":2,"score":0.4333319664001465},{"id":"https://openalex.org/C22735295","wikidata":"https://www.wikidata.org/wiki/Q317671","display_name":"Botnet","level":3,"score":0.42982548475265503},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.42132115364074707},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.28638342022895813},{"id":"https://openalex.org/C84418412","wikidata":"https://www.wikidata.org/wiki/Q3246940","display_name":"Digital forensics","level":2,"score":0.2197939157485962},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.18219420313835144},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/icact.2018.8323758","is_oa":false,"landing_page_url":"https://doi.org/10.23919/icact.2018.8323758","pdf_url":null,"source":{"id":"https://openalex.org/S4363608106","display_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 20th International Conference on Advanced Communication Technology (ICACT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7900000214576721,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W598294359","https://openalex.org/W985774724","https://openalex.org/W1534992827","https://openalex.org/W2470294914","https://openalex.org/W2618139469","https://openalex.org/W4240442345","https://openalex.org/W4241833957"],"related_works":["https://openalex.org/W396927568","https://openalex.org/W2035643924","https://openalex.org/W1685415006","https://openalex.org/W109647043","https://openalex.org/W2381971806","https://openalex.org/W2347635077","https://openalex.org/W4207048601","https://openalex.org/W2537496145","https://openalex.org/W2359074538","https://openalex.org/W2258115363"],"abstract_inverted_index":{"Cyber-attacks":[0],"are":[1],"likely":[2],"to":[3,5,21,33,76,143,149,164,177],"continue":[4],"increase":[6],"in":[7,116,137,145],"size":[8],"and":[9,70,109,173],"frequency.":[10],"As":[11],"attackers":[12],"get":[13],"smarter":[14],"than":[15],"before,":[16],"so":[17],"do":[18],"efforts":[19],"made":[20],"protect":[22],"against":[23,130],"unwanted":[24],"data":[25,105,107,110],"theft.":[26],"The":[27,53,132],"purpose":[28],"of":[29,45,55,84,92,134,154,180],"this":[30],"paper":[31,121],"is":[32,82],"look":[34],"for":[35],"unusual":[36,135],"patterns":[37,136],"by":[38],"repeatable":[39],"experiments":[40],"among":[41],"the":[42,89,97,101,146],"constant":[43],"buzz":[44],"network":[46,86,93,128,138],"packets":[47,139],"that":[48],"make":[49],"up":[50],"PT":[51,57],"activities.":[52],"utilization":[54],"different":[56],"toolkits,":[58],"like":[59],"Winfingerprint,":[60],"Superscan,":[61],"Nmap,":[62],"SoftPerfect":[63],"Network":[64,112],"Scanner,":[65,69],"NeoTrace,":[66],"Nessus":[67],"Vulnerability":[68],"Path":[71],"Analyzer":[72],"Pro,":[73],"facilitates":[74],"cyber-attackers":[75],"bring":[77],"down":[78],"online":[79],"system.":[80],"It":[81],"capable":[83],"discerning":[85],"traffic":[87],"on":[88],"vast":[90],"streams":[91],"information":[94],"available":[95],"through":[96],"connected":[98],"machines":[99],"from":[100,161],"following":[102],"three":[103],"phases:":[104],"collection,":[106],"reduction,":[108],"analysis.":[111],"forensics":[113],"can":[114,169],"aid":[115],"detecting":[117],"attack":[118],"behavior.":[119],"This":[120,167],"accommodates":[122],"real-time":[123],"evidence":[124],"collection":[125],"as":[126],"a":[127],"feature":[129],"attackers.":[131],"identification":[133],"has":[140],"been":[141],"put":[142],"use":[144],"ongoing":[147],"battle":[148],"stay":[150],"one":[151],"step":[152],"ahead":[153],"malicious":[155],"hackers,":[156],"who":[157],"could":[158],"be":[159,170,175],"anyone":[160],"disgruntled":[162],"customers":[163],"nation":[165],"states.":[166],"approach":[168],"easily":[171],"deployed":[172],"should":[174],"applicable":[176],"any":[178],"type":[179],"network-based":[181],"assessment.":[182]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
