New Developments In Network Forensics - Tools and Techniques

被引:0
|
作者
Hunt, Ray [1 ,2 ,3 ,4 ]
机构
[1] Univ Canterbury, Dept Comp Sci, Christchurch, New Zealand
[2] Univ South Australia, Adelaide, SA, Australia
[3] Deakin Univ, Melbourne, Vic, Australia
[4] Edith Cowan Univ, Perth, WA, Australia
来源
2012 18th IEEE International Conference on Networks (ICON) | 2012年
关键词
network and digital forensics; intrusion detection; network forensic tools; malware; IP traceback; honeypot; critical infrastructure and botnet forensics;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic - particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas such as malware and network attack detection; IP traceback and honeypots; and intrusion detection. Further, the paper addresses new and emerging areas of network forensic development which include critical infrastructure forensics, wireless network forensics, as well as its application to social networking.
引用
收藏
页码:376 / 381
页数:6
相关论文
共 50 条
  • [1] Network Forensics: An Analysis of Techniques, Tools, and Trends
    Hunt, Ray
    Zeadally, Sherali
    COMPUTER, 2012, 45 (12) : 36 - 43
  • [2] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
    Liu X.-H.
    Ding L.-P.
    Zheng T.
    Wu J.-Z.
    Li Y.-F.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
  • [3] A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions
    Javed, Abdul Rehman
    Ahmed, Waqas
    Alazab, Mamoun
    Jalil, Zunera
    Kifayat, Kashif
    Gadekallu, Thippa Reddy
    IEEE ACCESS, 2022, 10 : 11065 - 11089
  • [4] Network forensics: Review, taxonomy, and open challenges
    Khan, Suleman
    Gani, Abdullah
    Wahab, Ainuddin Wahid Abdul
    Shiraz, Muhammad
    Ahmad, Iftikhar
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2016, 66 : 214 - 235
  • [5] Modeling the network forensics behaviors
    Ren, Wei
    Jin, Hai
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10
  • [6] Network Forensics Investigation for Botnet Attack
    Sembiring, Irwan
    Nugroho, Yonathan Satrio
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
  • [7] Application Virtualization Techniques for Malware Forensics in Social Engineering
    Joe-Uzuegbu, C. K.
    Iwuchukwu, U. C.
    Ezema, L. C.
    2015 INTERNATIONAL CONFERENCE ON CYBERSPACE (CYBER-ABUJA), 2015, : 45 - 56
  • [8] Mobile Botnet Detection Using Network Forensics
    Vural, Ickin
    Venter, Hein
    FUTURE INTERNET-FIS 2010, 2010, 6369 : 57 - 67
  • [9] Packet analysis for network forensics: A comprehensive survey
    Sikos, Leslie F.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
  • [10] Understanding Network Forensics Analysis in an Operational Environment
    Raftopoulos, Elias
    Dimitropoulos, Xenofontas
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118