1. RASHMI MALVANKAR - Department of Information Technology, Shah & Anchor Kutchhi Engineering College, Mumbai, India.
2. Dr. AMIT JAIN - Department of computer Science and Engineering, Sir Padampat Singhania University, Udaipur, India.
As the use of digital technology increases day by day with the use of digital technology the digital crime is increasing each day with technology. Network security devices have some limitations like they can protect systems against an attack that bypasses them. The precluding process like examination and track back the origin of the attack and prosecuting the skilful assaulter is delivered by network forensics. The collection, analysis, and backtracking of network packets are key components of network forensics. The packet capture files of the network can be used to extract forensics evidence. Attackers might try to hide attackers by forging packets. This paper mentioned how to achieve the integrity of packet data using ECC encryption and canonical Huffman compression techniques.
Network forensics, Digital evidence, Packet data, Encryption, Compression, ECC, Canonical Huffman, Encryption then compression.