New Developments In Network Forensics - Tools and Techniques

被引:0
|
作者
Hunt, Ray [1 ,2 ,3 ,4 ]
机构
[1] Univ Canterbury, Dept Comp Sci, Christchurch, New Zealand
[2] Univ South Australia, Adelaide, SA, Australia
[3] Deakin Univ, Melbourne, Vic, Australia
[4] Edith Cowan Univ, Perth, WA, Australia
关键词
network and digital forensics; intrusion detection; network forensic tools; malware; IP traceback; honeypot; critical infrastructure and botnet forensics;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Network forensics is a branch of digital forensics which has evolved recently as a very important discipline used in monitoring and analysing network traffic - particularly for the purposes of tracing intrusions and attacks. This paper presents an analysis of the tools and techniques used in network forensic analysis. It further examines the application of network forensics to vital areas such as malware and network attack detection; IP traceback and honeypots; and intrusion detection. Further, the paper addresses new and emerging areas of network forensic development which include critical infrastructure forensics, wireless network forensics, as well as its application to social networking.
引用
收藏
页码:376 / 381
页数:6
相关论文
共 50 条
  • [1] Network Forensics: A Comprehensive Review of Tools and Techniques
    Qureshi, Sirajuddin
    Tunio, Saima
    Akhtar, Faheem
    Wajahat, Ahsan
    Nazir, Ahsan
    Ullah, Faheem
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 879 - 887
  • [2] Network Forensics: An Analysis of Techniques, Tools, and Trends
    Hunt, Ray
    Zeadally, Sherali
    COMPUTER, 2012, 45 (12) : 36 - 43
  • [3] Network Forensics with Neurofuzzy Techniques
    Aguirre Anaya, Eleazar
    Nakano-Miyatake, Mariko
    Perez Meana, Hector Manuel
    2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 848 - 852
  • [4] New developments in digital & multimedia forensics
    Casey, Eoghan
    DIGITAL INVESTIGATION, 2013, 10 (03) : 205 - 206
  • [5] Highly Efficient Techniques for Network Forensics
    Ponec, Miroslav
    Giura, Paul
    Bronnimann, Herve
    Wein, Joel
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 150 - 160
  • [6] An Empirical Study of Network Forensics Analysis Tools
    Ghafarian, Ahmad
    PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 366 - 370
  • [7] Cloud Digital Forensics: Beyond Tools, Techniques, and Challenges
    Malik, Annas Wasim
    Bhatti, David Samuel
    Park, Tae-Jin
    Ishtiaq, Hafiz Usama
    Ryou, Jae-Cheol
    Kim, Ki-Il
    SENSORS, 2024, 24 (02)
  • [8] RECENT DEVELOPMENTS IN PUMPDOWN TOOLS AND TECHNIQUES
    LOTH WD
    1970 offshore technol conf, Housron, Tex, 1970, 65-72
  • [9] File system anti-forensics – types, techniques and tools
    Wani M.A.
    AlZahrani A.
    Bhat W.A.
    Computer Fraud and Security, 2020, 2020 (03): : 14 - 19
  • [10] Mobile phone forensics - a systematic approach, tools, techniques and challenges
    Kumar, Manish
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2021, 13 (01) : 64 - 87