Network Forensics: A Comprehensive Review of Tools and Techniques

被引:0
作者
Qureshi, Sirajuddin [1 ]
Tunio, Saima [1 ]
Akhtar, Faheem [2 ]
Wajahat, Ahsan [1 ]
Nazir, Ahsan [1 ]
Ullah, Faheem [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Sukkur IBA Univ, Dept Comp Sci, Sukkur, Pakistan
关键词
Network forensics; Tshark; Dumpcap; Wireshark; OSCAR; network security;
D O I
10.14569/IJACSA.2021.01205103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth mentioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly associated with security and data breaches. Each day, cyber-related criminals explore and devise complicated means of infiltrating and exploiting individual and corporate networks' security. This means cyber or network forensic investigators must be equipped with the necessary mechanisms of identifying the nature of security vulnerabilities and the ability to identify and apprehend the respective cyber-related offenders correctly. Therefore, this research's primary focus is to provide a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology. Finally, this research provides an evaluative analysis of the relevant literature review in a network forensics investigation.
引用
收藏
页码:879 / 887
页数:9
相关论文
共 50 条
  • [21] Challenges to Network Forensics in Cloud Computing
    Raza, Nasir
    2015 CONFERENCE ON INFORMATION ASSURANCE AND CYBER SECURITY (CIACS), 2015, : 22 - 29
  • [22] Network Forensics Investigation for Botnet Attack
    Sembiring, Irwan
    Nugroho, Yonathan Satrio
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
  • [23] Active traffic capture for network forensics
    Slaviero, Marco
    Granova, Anna
    Olivier, Martin
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 215 - +
  • [24] Integrating digital forensics in network infrastructures
    Shanmugasundaram, K
    Brönnimann, H
    Memon, N
    ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 127 - +
  • [25] Application of the Spectra of Graphs in Network Forensics
    Easttom, Chuck
    Adda, Mo
    2021 IEEE 11TH ANNUAL COMPUTING AND COMMUNICATION WORKSHOP AND CONFERENCE (CCWC), 2021, : 846 - 852
  • [26] Network Traffic Analysis, Importance, Techniques: A Review
    Thakare, Sheetal
    Pund, Anshuman
    Pund, M. A.
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON COMMUNICATION AND ELECTRONICS SYSTEMS (ICCES 2018), 2018, : 376 - 381
  • [27] NETWORK TRAFFIC CLASSIFICATION TECHNIQUES-A REVIEW
    Goli, Yoga Durgadevi
    Ambika, R.
    PROCEEDINGS OF THE 2018 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES, ELECTRONICS AND MECHANICAL SYSTEMS (CTEMS), 2018, : 219 - 222
  • [28] On the novel network forensics perspective of enhanced e-business security
    Ren, W
    SHAPING BUSINESS STRATEGY IN A NETWORKED WORLD, VOLS 1 AND 2, PROCEEDINGS, 2004, : 1355 - 1360
  • [29] Advanced digital forensics and anti-digital forensics for IoT systems: Techniques, limitations and recommendations
    Yaacoub, Jean-Paul A.
    Noura, Hassan N.
    Salman, Ola
    Chehab, Ali
    INTERNET OF THINGS, 2022, 19
  • [30] A review of network vulnerabilities scanning tools: types, capabilities and functioning
    Tundis, Andrea
    Mazurczyk, Wojciech
    Muehlhaeuser, Max
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,