Integrating digital forensics in network infrastructures

被引:0
作者
Shanmugasundaram, K [1 ]
Brönnimann, H [1 ]
Memon, N [1 ]
机构
[1] Polytech Univ, 6 Metrotech Ctr, Brooklyn, NY 11201 USA
来源
ADVANCES IN DIGITAL FORENSICS | 2006年 / 194卷
关键词
network forensics; wide area networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the idea of integrating digital forensic capabilities into network infrastructures. Building a forensic system for wide area networks has generally been considered infeasible due to the large volume of data that potentially has to be processed and stored. However, it is opportune to revisit this problem in the light of recent advances in data streaming algorithms, the abundance of cheap storage and compute power and, more importantly, increased threats faced by networked infrastructures. This paper discusses the challenges involved in building reliable forensic systems for wide area networks, including the Internet itself. Also, it describes a prototype network forensic system that is currently under development.
引用
收藏
页码:127 / +
页数:2
相关论文
共 50 条
  • [1] Guidelines for Procedures of a Harmonised Digital Forensic Process in Network Forensics
    Sibiya, George
    Venter, H. S.
    Ngobeni, Sipho
    Fogwill, Thomas
    2012 INFORMATION SECURITY FOR SOUTH AFRICA (ISSA), 2012,
  • [2] Wi-Fi network signals as a source of digital evidence: Wireless network forensics
    Turnbull, B.
    Slay, J.
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1355 - 1360
  • [3] Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    INTERNET OF THINGS, 2022, 19
  • [4] A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory
    Tian Zhihong
    Jiang Wei
    Li Yang
    Dong Lan
    CHINA COMMUNICATIONS, 2014, 11 (05) : 91 - 97
  • [5] Digital Forensics Research on Cloud Computing: An investigation of Cloud Forensics Solutions
    Morioka, Erni
    Sharbaf, Mehrdad S.
    2016 IEEE SYMPOSIUM ON TECHNOLOGIES FOR HOMELAND SECURITY (HST), 2016,
  • [6] An architecture for SCADA network forensics
    Kilpatrick, T.
    Gonzalez, J.
    Chandia, R.
    Papa, M.
    Shenoi, S.
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 273 - +
  • [7] The application research on network forensics
    Jingfang, H. (jdzhjf@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (05): : 167 - 173
  • [8] Modeling the network forensics behaviors
    Ren, Wei
    Jin, Hai
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10
  • [9] Developing a new digital forensics curriculum
    Lang, Anthony
    Bashir, Masooda
    Campbell, Roy
    DeStefano, Lizanne
    DIGITAL INVESTIGATION, 2014, 11 : S76 - S84
  • [10] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +