Integrating digital forensics in network infrastructures

被引:0
作者
Shanmugasundaram, K [1 ]
Brönnimann, H [1 ]
Memon, N [1 ]
机构
[1] Polytech Univ, 6 Metrotech Ctr, Brooklyn, NY 11201 USA
来源
ADVANCES IN DIGITAL FORENSICS | 2006年 / 194卷
关键词
network forensics; wide area networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the idea of integrating digital forensic capabilities into network infrastructures. Building a forensic system for wide area networks has generally been considered infeasible due to the large volume of data that potentially has to be processed and stored. However, it is opportune to revisit this problem in the light of recent advances in data streaming algorithms, the abundance of cheap storage and compute power and, more importantly, increased threats faced by networked infrastructures. This paper discusses the challenges involved in building reliable forensic systems for wide area networks, including the Internet itself. Also, it describes a prototype network forensic system that is currently under development.
引用
收藏
页码:127 / +
页数:2
相关论文
共 50 条
  • [21] GRANEF: Utilization of a Graph Database for Network Forensics
    Cermak, Milan
    Sramkova, Denisa
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 785 - 790
  • [22] Mobile Botnet Detection Using Network Forensics
    Vural, Ickin
    Venter, Hein
    FUTURE INTERNET-FIS 2010, 2010, 6369 : 57 - 67
  • [23] Digital Forensics Subdomains: The State of the Art and Future Directions
    Al-Dhaqm, Arafat
    Ikuesan, Richard Adeyemi
    Kebande, Victor R.
    Abd Razak, Shukor
    Grispos, George
    Choo, Kim-Kwang Raymond
    Al-Rimy, Bander Ali Saleh
    Alsewari, Abdulrahman A.
    IEEE ACCESS, 2021, 9 : 152476 - 152502
  • [24] CREATING INTEGRATED EVIDENCE GRAPHS FOR NETWORK FORENSICS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 227 - 241
  • [25] Native Actors: How to Scale Network Forensics
    Vallentin, Matthias
    Charousset, Dominik
    Schmidt, Thomas C.
    Paxson, Vern
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (04) : 141 - 142
  • [26] Packet analysis for network forensics: A comprehensive survey
    Sikos, Leslie F.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
  • [27] CAS: Content Attribution System for Network Forensics
    Chen, Yan
    Pu, Yiguo
    Chen, Xiaojun
    Shi, Jinqiao
    Yu, Xiaojie
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 129 - 136
  • [28] A Graded Approach to Network Forensics with Privacy Concerns
    Brockelsby, William
    Dutta, Rudra
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 292 - 297
  • [29] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
  • [30] Honeypots aiding network forensics: Challenges and notions
    Nasir, Qassim
    Al-Mousa, Zahraa A.
    Journal of Communications, 2013, 8 (11): : 700 - 707