Research Article
Analysis of Challenges in Modern Network Forensic Framework
Table 3
Network position within the MCC.
| NFF techniques | Scalability | Overhead computational | Data storage | Data accuracy | Complexity | Privacy | Adaptability |
| Traceback | N/A | H | H | L | IM | L | N/A | HT | H | M | M | AL | M | D | VT | L | L | H | IV | L | M | HT | M | N/A | N/A | IM | N/A | D | N/A | H | H | M | IM | M | D |
| Converge network | N/A | H | L | L | IM, AL | L | D | N/A | M | M | N/A | IM, CL, AL | L | D | HT | M | M | N/A | IM, AL | L | N/A |
| Intrusion | HT | M | M | N/A | IM, AL | N/A | D | HT | H | L | N/A | IM, AL | N/A | D | N/A | H | L | N/A | AL | L | D | N/A | L | L | L | IM, AL | L | D |
| Attack-based graph | HT | M | L | N/A | AL | L | L | N/A | M | L | N/A | IM, CL, AL | M | L | N/A | H | M | L | IM, AL | M | D | HT | M | M | H | AL | M | M | HT | L | L | M | AL | M | H | HT | L | N/A | N/A | AL | H | M |
| Distributive | VT | M | M | N/A | CL, AL | L | M | BT | M | M | N/A | AL | L | L | HT | M | M | L | CL, AL | L | L | HT | L | L | L | IM, CL, AL | L | M |
|
|