Network Forensics: A Comprehensive Review of Tools and Techniques

被引:0
作者
Qureshi, Sirajuddin [1 ]
Tunio, Saima [1 ]
Akhtar, Faheem [2 ]
Wajahat, Ahsan [1 ]
Nazir, Ahsan [1 ]
Ullah, Faheem [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Sukkur IBA Univ, Dept Comp Sci, Sukkur, Pakistan
关键词
Network forensics; Tshark; Dumpcap; Wireshark; OSCAR; network security;
D O I
10.14569/IJACSA.2021.01205103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth mentioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly associated with security and data breaches. Each day, cyber-related criminals explore and devise complicated means of infiltrating and exploiting individual and corporate networks' security. This means cyber or network forensic investigators must be equipped with the necessary mechanisms of identifying the nature of security vulnerabilities and the ability to identify and apprehend the respective cyber-related offenders correctly. Therefore, this research's primary focus is to provide a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology. Finally, this research provides an evaluative analysis of the relevant literature review in a network forensics investigation.
引用
收藏
页码:879 / 887
页数:9
相关论文
共 50 条
  • [31] GRANEF: Utilization of a Graph Database for Network Forensics
    Cermak, Milan
    Sramkova, Denisa
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 785 - 790
  • [32] Mobile Botnet Detection Using Network Forensics
    Vural, Ickin
    Venter, Hein
    FUTURE INTERNET-FIS 2010, 2010, 6369 : 57 - 67
  • [33] CREATING INTEGRATED EVIDENCE GRAPHS FOR NETWORK FORENSICS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 227 - 241
  • [34] Native Actors: How to Scale Network Forensics
    Vallentin, Matthias
    Charousset, Dominik
    Schmidt, Thomas C.
    Paxson, Vern
    Waehlisch, Matthias
    ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2014, 44 (04) : 141 - 142
  • [35] Artificial Intelligence in Social Media Forensics: A Comprehensive Survey and Analysis
    Bokolo, Biodoumoye George
    Liu, Qingzhong
    ELECTRONICS, 2024, 13 (09)
  • [36] CAS: Content Attribution System for Network Forensics
    Chen, Yan
    Pu, Yiguo
    Chen, Xiaojun
    Shi, Jinqiao
    Yu, Xiaojie
    TRUSTWORTHY COMPUTING AND SERVICES (ISCTCS 2014), 2015, 520 : 129 - 136
  • [37] A Graded Approach to Network Forensics with Privacy Concerns
    Brockelsby, William
    Dutta, Rudra
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 292 - 297
  • [38] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
  • [39] Honeypots aiding network forensics: Challenges and notions
    Nasir, Qassim
    Al-Mousa, Zahraa A.
    Journal of Communications, 2013, 8 (11): : 700 - 707
  • [40] Understanding Network Forensics Analysis in an Operational Environment
    Raftopoulos, Elias
    Dimitropoulos, Xenofontas
    IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118