Integrating digital forensics in network infrastructures

被引:0
作者
Shanmugasundaram, K [1 ]
Brönnimann, H [1 ]
Memon, N [1 ]
机构
[1] Polytech Univ, 6 Metrotech Ctr, Brooklyn, NY 11201 USA
来源
ADVANCES IN DIGITAL FORENSICS | 2006年 / 194卷
关键词
network forensics; wide area networks;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper explores the idea of integrating digital forensic capabilities into network infrastructures. Building a forensic system for wide area networks has generally been considered infeasible due to the large volume of data that potentially has to be processed and stored. However, it is opportune to revisit this problem in the light of recent advances in data streaming algorithms, the abundance of cheap storage and compute power and, more importantly, increased threats faced by networked infrastructures. This paper discusses the challenges involved in building reliable forensic systems for wide area networks, including the Internet itself. Also, it describes a prototype network forensic system that is currently under development.
引用
收藏
页码:127 / +
页数:2
相关论文
共 50 条
  • [31] CAS: Content Attribution System for Network Forensics
    Chen, Yan
    Pu, Yiguo
    Chen, Xiaojun
    Shi, Jinqiao
    Yu, Xiaojie
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 129 - 136
  • [32] Packet analysis for network forensics: A comprehensive survey
    Sikos, Leslie F.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
  • [33] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
  • [34] A Graded Approach to Network Forensics with Privacy Concerns
    Brockelsby, William
    Dutta, Rudra
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 292 - 297
  • [35] Using peer-to-peer technology for network forensics
    Redding, S
    ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
  • [36] Failure Detection in Network Forensics for Volatile Data Acquisition
    Nassif, Lilian Noronha
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 342 - 347
  • [37] A Secure Storage Model to Preserve Evidence in Network Forensics
    Ibrahim, Mohd Izham
    Jantan, Aman
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
  • [38] Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
    Awad, Rima Asmar
    Beztchi, Saeed
    Smith, Jared M.
    Lyles, Bryan
    Prowell, Stacy
    4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018), 2018, : 1 - 8
  • [39] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [40] Introduction to a Network Forensics System for Cyber Incidents Analysis
    Choi, Yangseo
    Lee, Joo-Young
    Choi, Sunoh
    Kim, Jong-Hyum
    Kim, Ikkyun
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55