Network Reconnaissance Investigation: A Memory Forensics Approach

被引:0
|
作者
Al-Saleh, Mohammed I. [1 ,2 ]
Al-Sharif, Ziad A. [1 ]
Alawneh, Luay [1 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
[2] Higher Coll Technol, Comp Informat Syst, Abu Dhabi, U Arab Emirates
来源
2019 10TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION SYSTEMS (ICICS) | 2019年
关键词
IMPACT;
D O I
10.1109/iacs.2019.8809084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perpetrators utilize different network reconnaissance techniques in order to discover vulnerabilities and conduct their attacks. Port scanning can be leveraged to conclude open ports, available services, and even running operating systems along with their versions. Even though these techniques are effective, their aggressiveness for information gain could leave an apparent sign of attack, which can be observed by the variety of security controls deployed at the network perimeter of an organization. However, not all such attacks can be stopped nor the corresponding security controls can defend against insiders. In this paper, we tackle the problem of reconnaissance detection using a different approach. We utilize the rich information that is kept in memory (or RAM). We observe that packets sent or received stay in memory for a while. Our results show that inspecting memory for attack signs is beneficial. Furthermore, correlating contents that are obtained from different memories empowers the investigation process and helps reach to conclusions.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [21] Mastering Windows Network Forensics and Investigation, 2nd edition
    Ebert, John C.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2012, 7 (04) : 117 - 124
  • [22] Cloud forensics and digital ledger investigation: a new era of forensics investigation
    Khan, Abdullah Ayub
    Shaikh, Aftab Ahmed
    Laghari, Asif Ali
    Rind, M. Malook
    INTERNATIONAL JOURNAL OF ELECTRONIC SECURITY AND DIGITAL FORENSICS, 2023, 15 (01) : 1 - 23
  • [23] A Multidimensional Network Forensics Investigation of a State-Sanctioned Internet Outage
    Mangino, Antonio
    Bou-Harb, Elias
    IWCMC 2021: 2021 17TH INTERNATIONAL WIRELESS COMMUNICATIONS & MOBILE COMPUTING CONFERENCE (IWCMC), 2021, : 813 - 818
  • [24] Visual Analytics for Improving Efficiency of Network Forensics: Account Theft Investigation
    Chechulin, Andrey
    Kolomeec, Maxim
    Kotenko, Igor
    3RD ANNUAL INTERNATIONAL CONFERENCE ON INFORMATION SYSTEM AND ARTIFICIAL INTELLIGENCE (ISAI2018), 2018, 1069
  • [26] Challenges in Network forensics
    Buric, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386
  • [27] Research and development of memory forensics
    Zhang, Yu
    Liu, Qing-Zhong
    Li, Tao
    Wu, Li-Hua
    Shi, Chun
    Ruan Jian Xue Bao/Journal of Software, 2015, 26 (05): : 1151 - 1172
  • [28] Virtual Machine Memory Forensics
    Huseinovic, Alvin
    Ribic, Samir
    2013 21ST TELECOMMUNICATIONS FORUM (TELFOR), 2013, : 940 - 942
  • [29] The Research on Linux Memory Forensics
    Zhang, Jun
    Che, ShengBing
    2017 INTERNATIONAL SYMPOSIUM ON APPLICATION OF MATERIALS SCIENCE AND ENERGY MATERIALS (SAMSE 2017), 2018, 322
  • [30] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66