An Empirical Study of Network Forensics Analysis Tools

被引:0
|
作者
Ghafarian, Ahmad [1 ]
机构
[1] Univ North Georgia, Dept Comp Sci, Dahlonega, GA 30597 USA
关键词
NFAT; log files; firewall; IDS; open source; and proprietary;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network traffic monitoring tools allow network administrators to view network traffic in real-time. Since real-time monitoring requires human and hardware resources, it is more practical to archive all network traffic and analyze parts of captured data for specific purposes such as, forensics evidence, intrusion detection, or incident response. This process is known as network forensics. Commonly, network forensics analysis is done by manually examining log files which is a time-consuming and error prone process. Instead, network administrators use network forensics analysis tools (NFATs) to capture segments of traffic, to inspect the traffic and to analyze data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Moreover, NFATs support the notion of defence in depth. As such, they have the ability to correlate data from other security tools such as intrusion detection system or firewall. In this paper, we present the result of our experiment with several popular open source network forensics analysis tools. We evaluate the strengths and weaknesses of them, interface user friendliness, visualization, filtering, reporting, data collection, data analysis, extraction, and correlation with other log files such as firewall and IDSs.
引用
收藏
页码:366 / 370
页数:5
相关论文
共 50 条
  • [1] Network Forensics: An Analysis of Techniques, Tools, and Trends
    Hunt, Ray
    Zeadally, Sherali
    COMPUTER, 2012, 45 (12) : 36 - 43
  • [2] New Developments In Network Forensics - Tools and Techniques
    Hunt, Ray
    2012 18th IEEE International Conference on Networks (ICON), 2012, : 376 - 381
  • [3] Network Forensics: A Comprehensive Review of Tools and Techniques
    Qureshi, Sirajuddin
    Tunio, Saima
    Akhtar, Faheem
    Wajahat, Ahsan
    Nazir, Ahsan
    Ullah, Faheem
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 879 - 887
  • [4] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [5] A comparative study of WhatsApp forensics tools
    Khalid Alissa
    Norah A. Almubairik
    Lamyaa Alsaleem
    Deema Alotaibi
    Malak Aldakheel
    Sarah Alqhtani
    Nazar Saqib
    Samiha Brahimi
    Mubarak Alshahrani
    SN Applied Sciences, 2019, 1
  • [6] A comparative study of WhatsApp forensics tools
    Alissa, Khalid
    Almubairik, Norah A.
    Alsaleem, Lamyaa
    Alotaibi, Deema
    Aldakheel, Malak
    Alqhtani, Sarah
    Saqib, Nazar
    Brahimi, Samiha
    Alshahrani, Mubarak
    SN APPLIED SCIENCES, 2019, 1 (11):
  • [7] Study of Blockchain Forensics and Analytics tools
    Srivasthav, Dinesh P.
    Maddali, Lakshmi Padmaja
    Vigneswaran, R.
    2021 3RD CONFERENCE ON BLOCKCHAIN RESEARCH & APPLICATIONS FOR INNOVATIVE NETWORKS AND SERVICES (BRAINS), 2021, : 39 - 40
  • [8] A Case Study for Mobile Device Forensics Tools
    Wilson, Rodney
    Chi, Hongmei
    PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17, 2017, : 154 - 157
  • [9] Empirical study of sentiment analysis tools and techniques on societal topics
    Loitongbam Gyanendro Singh
    Sanasam Ranbir Singh
    Journal of Intelligent Information Systems, 2021, 56 : 379 - 407
  • [10] An Empirical Study of Static Analysis Tools for Secure Code Review
    Charoenwet, Wachiraphan
    Thongtanunam, Patanamon
    Pham, Van-Thuan
    Treude, Christoph
    PROCEEDINGS OF THE 33RD ACM SIGSOFT INTERNATIONAL SYMPOSIUM ON SOFTWARE TESTING AND ANALYSIS, ISSTA 2024, 2024, : 691 - 703