Network forensic frameworks: Survey and research challenges

被引:106
作者
Pilli, Emmanuel S. [1 ]
Joshi, R. C. [1 ]
Niyogi, Rajdeep [1 ]
机构
[1] Indian Inst Technol Roorkee, Dept Elect & Comp Engn, Roorkee 247667, Uttar Pradesh, India
关键词
Network forensics; NFATs; Distributed systems; Soft computing; Honeypots; Data fusion; Attribution; Traceback; Incident response;
D O I
10.1016/j.diin.2010.02.003
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network forensics is the science that deals with capture, recording, and analysis of network traffic for detecting intrusions and investigating them. This paper makes an exhaustive survey of various network forensic frameworks proposed till date. A generic process model for network forensics is proposed which is built on various existing models of digital forensics. Definition, categorization and motivation for network forensics are clearly stated. The functionality of various Network Forensic Analysis Tools (NFATs) and network security monitoring tools, available for forensics examiners is discussed. The specific research gaps existing in implementation frameworks, process models and analysis tools are identified and major challenges are highlighted. The significance of this work is that it presents an overview on network forensics covering tools, process models and framework implementations, which will be very much useful for security practitioners and researchers in exploring this upcoming and young discipline. (C) 2010 Elsevier Ltd. All rights reserved.
引用
收藏
页码:14 / 27
页数:14
相关论文
共 73 条
[61]   A framework for attack patterns' discovery in honeynet data [J].
Thonnard, Olivier ;
Dacier, Marc .
DIGITAL INVESTIGATION, 2008, 5 (SUPPL.) :S128-S139
[62]  
VANDENBERGHE G, 2008, P 5 INT WORKSH VIS C
[63]   The self-protection problem in wireless sensor networks [J].
Wang, Dan ;
Zhang, Qian ;
Liu, Jiangchuan .
ACM TRANSACTIONS ON SENSOR NETWORKS, 2007, 3 (04)
[64]   A Graph Based Approach Toward Network Forensics Analysis [J].
Wang, Wei ;
Daniels, Thomas E. .
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
[65]  
Yasinsac A., 2001, Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, P289
[66]  
Yasinsac A., 2002, P 6 MULT SYST CYB IN
[67]   Network forensic computing based on ANN-PCA [J].
Zhang, Youdong ;
Ren, Yongjun ;
Wang, Jiangdong ;
Fang, Liming .
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, :942-945
[68]  
NGREP
[69]  
NETWORK FORENSICS DI
[70]  
TWEETS FALL SILENT T