Research Article

Analysis of Challenges in Modern Network Forensic Framework

Table 3

Network position within the MCC.

NFF techniquesScalabilityOverhead computationalData storageData accuracyComplexityPrivacyAdaptability

TracebackN/AHHLIMLN/A
HTHMMALMD
VTLLHIVLM
HTMN/AN/AIMN/AD
N/AHHMIMMD

Converge networkN/AHLLIM, ALLD
N/AMMN/AIM, CL, ALLD
HTMMN/AIM, ALLN/A

IntrusionHTMMN/AIM, ALN/AD
HTHLN/AIM, ALN/AD
N/AHLN/AALLD
N/ALLLIM, ALLD

Attack-based graphHTMLN/AALLL
N/AMLN/AIM, CL, ALML
N/AHMLIM, ALMD
HTMMHALMM
HTLLMALMH
HTLN/AN/AALHM

DistributiveVTMMN/ACL, ALLM
BTMMN/AALLL
HTMMLCL, ALLL
HTLLLIM, CL, ALLM