Network Forensics: A Comprehensive Review of Tools and Techniques

被引:0
作者
Qureshi, Sirajuddin [1 ]
Tunio, Saima [1 ]
Akhtar, Faheem [2 ]
Wajahat, Ahsan [1 ]
Nazir, Ahsan [1 ]
Ullah, Faheem [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Sukkur IBA Univ, Dept Comp Sci, Sukkur, Pakistan
关键词
Network forensics; Tshark; Dumpcap; Wireshark; OSCAR; network security;
D O I
10.14569/IJACSA.2021.01205103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth mentioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly associated with security and data breaches. Each day, cyber-related criminals explore and devise complicated means of infiltrating and exploiting individual and corporate networks' security. This means cyber or network forensic investigators must be equipped with the necessary mechanisms of identifying the nature of security vulnerabilities and the ability to identify and apprehend the respective cyber-related offenders correctly. Therefore, this research's primary focus is to provide a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology. Finally, this research provides an evaluative analysis of the relevant literature review in a network forensics investigation.
引用
收藏
页码:879 / 887
页数:9
相关论文
共 50 条
  • [41] Intrusion detection techniques in network environment: a systematic review
    Maruthi Rohit Ayyagari
    Nishtha Kesswani
    Munish Kumar
    Krishan Kumar
    Wireless Networks, 2021, 27 : 1269 - 1285
  • [42] Intrusion detection techniques in network environment: a systematic review
    Ayyagari, Maruthi Rohit
    Kesswani, Nishtha
    Kumar, Munish
    Kumar, Krishan
    WIRELESS NETWORKS, 2021, 27 (02) : 1269 - 1285
  • [43] Network forensics of SSL/TLS encrypted channels
    Wu, Meng-Da
    Wolthusen, Stephen
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 303 - 312
  • [44] Native Actors: How to Scale Network Forensics
    Vallentin, Matthias
    Charousset, Dominik
    Schmidt, Thomas C.
    Paxson, Vern
    Waehlisch, Matthias
    SIGCOMM'14: PROCEEDINGS OF THE 2014 ACM CONFERENCE ON SPECIAL INTEREST GROUP ON DATA COMMUNICATION, 2014, : 141 - 142
  • [45] Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection
    Pimenta Rodrigues, Gabriel Arquelau
    Albuquerque, Robson de Oliveira
    Gomes de Deus, Flavio Elias
    de Sousa, Rafael Timoteo, Jr.
    de Oliveira Junior, Gildasio Antonio
    Garcia Villalba, Luis Javier
    Kim, Tai-Hoon
    APPLIED SCIENCES-BASEL, 2017, 7 (10):
  • [46] A Secure Storage Model to Preserve Evidence in Network Forensics
    Ibrahim, Mohd Izham
    Jantan, Aman
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
  • [47] Using peer-to-peer technology for network forensics
    Redding, S
    ADVANCES IN DIGITAL FORENSICS, 2006, 194 : 141 - 152
  • [48] Failure Detection in Network Forensics for Volatile Data Acquisition
    Nassif, Lilian Noronha
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 342 - 347
  • [49] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [50] Review on Network Intrusion Detection Techniques using Machine Learning
    Shashank, K.
    Balachandra, Mamatha
    PROCEEDINGS OF 2018 IEEE DISTRIBUTED COMPUTING, VLSI, ELECTRICAL CIRCUITS AND ROBOTICS (DISCOVER), 2018, : 104 - 109