Network Forensics: A Comprehensive Review of Tools and Techniques

被引:0
|
作者
Qureshi, Sirajuddin [1 ]
Tunio, Saima [1 ]
Akhtar, Faheem [2 ]
Wajahat, Ahsan [1 ]
Nazir, Ahsan [1 ]
Ullah, Faheem [1 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Sukkur IBA Univ, Dept Comp Sci, Sukkur, Pakistan
关键词
Network forensics; Tshark; Dumpcap; Wireshark; OSCAR; network security;
D O I
10.14569/IJACSA.2021.01205103
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth mentioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly associated with security and data breaches. Each day, cyber-related criminals explore and devise complicated means of infiltrating and exploiting individual and corporate networks' security. This means cyber or network forensic investigators must be equipped with the necessary mechanisms of identifying the nature of security vulnerabilities and the ability to identify and apprehend the respective cyber-related offenders correctly. Therefore, this research's primary focus is to provide a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology. Finally, this research provides an evaluative analysis of the relevant literature review in a network forensics investigation.
引用
收藏
页码:879 / 887
页数:9
相关论文
共 50 条
  • [1] New Developments In Network Forensics - Tools and Techniques
    Hunt, Ray
    2012 18th IEEE International Conference on Networks (ICON), 2012, : 376 - 381
  • [2] Network Forensics: An Analysis of Techniques, Tools, and Trends
    Hunt, Ray
    Zeadally, Sherali
    COMPUTER, 2012, 45 (12) : 36 - 43
  • [3] Network Forensics with Neurofuzzy Techniques
    Aguirre Anaya, Eleazar
    Nakano-Miyatake, Mariko
    Perez Meana, Hector Manuel
    2009 52ND IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1 AND 2, 2009, : 848 - 852
  • [4] A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions
    Javed, Abdul Rehman
    Ahmed, Waqas
    Alazab, Mamoun
    Jalil, Zunera
    Kifayat, Kashif
    Gadekallu, Thippa Reddy
    IEEE ACCESS, 2022, 10 : 11065 - 11089
  • [5] A Comprehensive Survey on Computer Forensics: State-of-the-Art, Tools, Techniques, Challenges, and Future Directions
    Javed, Abdul Rehman
    Ahmed, Waqas
    Alazab, Mamoun
    Jalil, Zunera
    Kifayat, Kashif
    Gadekallu, Thippa Reddy
    IEEE Access, 2022, 10 : 11065 - 11089
  • [6] A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing
    Khan, Suleman
    Shiraz, Muhammad
    Wahab, Ainuddin Wahid Abdul
    Gani, Abdullah
    Han, Qi
    Rahman, Zulkanain Bin Abdul
    SCIENTIFIC WORLD JOURNAL, 2014,
  • [7] Genomic Variant Annotation: A Comprehensive Review of Tools and Techniques
    Hebbar, Prajna
    Sowmya, S. Kamath
    INTELLIGENT SYSTEMS DESIGN AND APPLICATIONS, ISDA 2021, 2022, 418 : 1057 - 1067
  • [8] Evaluating urban walkability: a comprehensive review of tools and techniques
    Huang, Xiaoran
    Liang, Hanxiong
    Zeng, Li
    White, Marcus
    ARCHITECTURAL SCIENCE REVIEW, 2024,
  • [9] A Review of Mobile and SIM Forensics Tools
    AlShehri, Mohammed Abdul Rahman
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (03): : 150 - 154
  • [10] Highly Efficient Techniques for Network Forensics
    Ponec, Miroslav
    Giura, Paul
    Bronnimann, Herve
    Wein, Joel
    CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 150 - 160