Review Article

A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing

Table 6

Analysis of network forensics frameworks in context of adaptability to MCC.

FrameworksScalabilityOverheadAccuracyComplexityPrivacyAdaptability
ā€‰ā€‰ComputationalStorage

TracebackNFEA [71]N/AHHLIMLN/A
LWIP [9]HTHMMALMD
Scalable NF [16]VTLLHIVLM
HB-SST [85]HTMN/AN/AIMN/AD
ITP [8]N/AHHMIMMD

Converge networksPBNF [87]N/AHLLIM, ALLD
VoIP-NFDE [88]N/AMMN/AIM, CL, ALLD
VoIPEM [62]HTMMN/AIM, ALLN/A

Intrusion detection systemAIDF [91]HTMMN/AIM, ALN/AD
DFITM [92]HTHLN/AIM, ALN/AD
IIFDH [93]N/AHLN/AALLD
NFIDA [94]N/ALLLIM, ALLD

Attack graphSA [95]HTMLN/AALLL
MLL-AT [96]N/AMLN/AIM, CL, ALML
AGFE [97]N/AHMLIM, ALMD
FCM [98]HTMMHALMM
CSBH [17]HTLLMALMH
AGVI [99]HTLN/AN/AALHM

Distribution ForNet [100]VTMMN/ACL, ALLM
DRNIFS [101]BTMMN/AALLL
DCNFM [102]HTMMLCL, ALLL
DNF-IA [18]HTLLLIM, CL, ALLM

Scalability: HT: horizontal; VT: vertical; BT: both; N/A: not applicable.
Overhead: H: high; M: moderate; L: low; N/A: not applicable.
Accuracy: H: high; M: moderate; L: low; N/A: not applicable.
Complexity: IM: implementation; AL: analysis; CL: collection; IV: investigation.
Privacy: H: high; M: moderate; L: low; N/A: not applicable.
Adaptability: D: difficult; H: high; M: moderate; L: low; N/A: not applicable.