Network Forensics: A Comprehensive Review of Tools and Techniques

被引:0
作者
Qureshi, Sirajuddin [1 ]
Tunio, Saima [1 ]
Akhtar, Faheem [2 ]
Wajahat, Ahsan [1 ]
Nazir, Ahsan [1 ]
Ullah, Faheem [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Sukkur IBA Univ, Dept Comp Sci, Sukkur, Pakistan
关键词
Network forensics; Tshark; Dumpcap; Wireshark; OSCAR; network security;
D O I
10.14569/IJACSA.2021.01205103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth mentioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly associated with security and data breaches. Each day, cyber-related criminals explore and devise complicated means of infiltrating and exploiting individual and corporate networks' security. This means cyber or network forensic investigators must be equipped with the necessary mechanisms of identifying the nature of security vulnerabilities and the ability to identify and apprehend the respective cyber-related offenders correctly. Therefore, this research's primary focus is to provide a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology. Finally, this research provides an evaluative analysis of the relevant literature review in a network forensics investigation.
引用
收藏
页码:879 / 887
页数:9
相关论文
共 50 条
  • [1] Packet analysis for network forensics: A comprehensive survey
    Sikos, Leslie F.
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
  • [2] Highly Efficient Techniques for Network Forensics
    Ponec, Miroslav
    Giura, Paul
    Bronnimann, Herve
    Wein, Joel
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 150 - 160
  • [3] Tools, Techniques, and Methodologies: A Survey of Digital Forensics for SCADA Systems
    Awad, Rima Asmar
    Beztchi, Saeed
    Smith, Jared M.
    Lyles, Bryan
    Prowell, Stacy
    4TH ANNUAL INDUSTRIAL CONTROL SYSTEM SECURITY WORKSHOP (ICSS 2018), 2018, : 1 - 8
  • [4] Network Forensics: Methodical Literature Review
    Shrivastava, Ciushan
    PROCEEDINGS OF THE 10TH INDIACOM - 2016 3RD INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT, 2016, : 2203 - 2208
  • [5] Leveraging Digital Forensics in the Age of Smart Grids: A Survey of Tools and Techniques for Securing Electrical Power Systems
    Raja, S. Daniel Madan
    Susanna, Vipparthi
    Srinitya, G.
    Ramesh, C.
    Lawrence, Thomas Samraj
    Dharmalingam, Ganapathy
    JOURNAL OF ELECTRICAL SYSTEMS, 2024, 20 (02) : 2511 - 2522
  • [6] Modeling the network forensics behaviors
    Ren, Wei
    Jin, Hai
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 3 - 10
  • [7] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [8] Network Forensics: Notions and Challenges
    Almulhem, Ahmad
    2009 IEEE INTERNATIONAL SYMPOSIUM ON SIGNAL PROCESSING AND INFORMATION TECHNOLOGY (ISSPIT 2009), 2009, : 463 - 466
  • [9] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
    Liu X.-H.
    Ding L.-P.
    Zheng T.
    Wu J.-Z.
    Li Y.-F.
    Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
  • [10] Network Security in Big Data: Tools and Techniques
    Verma, Pushpak
    Chandra, Tej Bahadur
    Dwivedi, A. K.
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, INDIA 2016, 2016, 433 : 255 - 262