Research Article
Analysis of Challenges in Modern Network Forensic Framework
Table 3
Network position within the MCC.
| | NFF techniques | Scalability | Overhead computational | Data storage | Data accuracy | Complexity | Privacy | Adaptability |
| | Traceback | N/A | H | H | L | IM | L | N/A | | HT | H | M | M | AL | M | D | | VT | L | L | H | IV | L | M | | HT | M | N/A | N/A | IM | N/A | D | | N/A | H | H | M | IM | M | D |
| | Converge network | N/A | H | L | L | IM, AL | L | D | | N/A | M | M | N/A | IM, CL, AL | L | D | | HT | M | M | N/A | IM, AL | L | N/A |
| | Intrusion | HT | M | M | N/A | IM, AL | N/A | D | | HT | H | L | N/A | IM, AL | N/A | D | | N/A | H | L | N/A | AL | L | D | | N/A | L | L | L | IM, AL | L | D |
| | Attack-based graph | HT | M | L | N/A | AL | L | L | | N/A | M | L | N/A | IM, CL, AL | M | L | | N/A | H | M | L | IM, AL | M | D | | HT | M | M | H | AL | M | M | | HT | L | L | M | AL | M | H | | HT | L | N/A | N/A | AL | H | M |
| | Distributive | VT | M | M | N/A | CL, AL | L | M | | BT | M | M | N/A | AL | L | L | | HT | M | M | L | CL, AL | L | L | | HT | L | L | L | IM, CL, AL | L | M |
|
|