Review Article
A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
Table 6
Analysis of network forensics frameworks in context of adaptability to MCC.
| Frameworks | Scalability | Overhead | Accuracy | Complexity | Privacy | Adaptability | ā | ā | Computational | Storage |
| Traceback | NFEA [71] | N/A | H | H | L | IM | L | N/A | LWIP [9] | HT | H | M | M | AL | M | D | Scalable NF [16] | VT | L | L | H | IV | L | M | HB-SST [85] | HT | M | N/A | N/A | IM | N/A | D | ITP [8] | N/A | H | H | M | IM | M | D |
| Converge networks | PBNF [87] | N/A | H | L | L | IM, AL | L | D | VoIP-NFDE [88] | N/A | M | M | N/A | IM, CL, AL | L | D | VoIPEM [62] | HT | M | M | N/A | IM, AL | L | N/A |
| Intrusion detection system | AIDF [91] | HT | M | M | N/A | IM, AL | N/A | D | DFITM [92] | HT | H | L | N/A | IM, AL | N/A | D | IIFDH [93] | N/A | H | L | N/A | AL | L | D | NFIDA [94] | N/A | L | L | L | IM, AL | L | D |
| Attack graph | SA [95] | HT | M | L | N/A | AL | L | L | MLL-AT [96] | N/A | M | L | N/A | IM, CL, AL | M | L | AGFE [97] | N/A | H | M | L | IM, AL | M | D | FCM [98] | HT | M | M | H | AL | M | M | CSBH [17] | HT | L | L | M | AL | M | H | AGVI [99] | HT | L | N/A | N/A | AL | H | M |
| Distribution | ForNet [100] | VT | M | M | N/A | CL, AL | L | M | DRNIFS [101] | BT | M | M | N/A | AL | L | L | DCNFM [102] | HT | M | M | L | CL, AL | L | L | DNF-IA [18] | HT | L | L | L | IM, CL, AL | L | M |
|
|
Scalability: HT: horizontal; VT: vertical; BT: both; N/A: not applicable. Overhead: H: high; M: moderate; L: low; N/A: not applicable. Accuracy: H: high; M: moderate; L: low; N/A: not applicable. Complexity: IM: implementation; AL: analysis; CL: collection; IV: investigation. Privacy: H: high; M: moderate; L: low; N/A: not applicable. Adaptability: D: difficult; H: high; M: moderate; L: low; N/A: not applicable.
|