An Empirical Study of Network Forensics Analysis Tools

被引:0
|
作者
Ghafarian, Ahmad [1 ]
机构
[1] Univ North Georgia, Dept Comp Sci, Dahlonega, GA 30597 USA
关键词
NFAT; log files; firewall; IDS; open source; and proprietary;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network traffic monitoring tools allow network administrators to view network traffic in real-time. Since real-time monitoring requires human and hardware resources, it is more practical to archive all network traffic and analyze parts of captured data for specific purposes such as, forensics evidence, intrusion detection, or incident response. This process is known as network forensics. Commonly, network forensics analysis is done by manually examining log files which is a time-consuming and error prone process. Instead, network administrators use network forensics analysis tools (NFATs) to capture segments of traffic, to inspect the traffic and to analyze data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Moreover, NFATs support the notion of defence in depth. As such, they have the ability to correlate data from other security tools such as intrusion detection system or firewall. In this paper, we present the result of our experiment with several popular open source network forensics analysis tools. We evaluate the strengths and weaknesses of them, interface user friendliness, visualization, filtering, reporting, data collection, data analysis, extraction, and correlation with other log files such as firewall and IDSs.
引用
收藏
页码:366 / 370
页数:5
相关论文
共 50 条
  • [21] Tools and methods of computer forensics
    Strumenti e metodi della computer forensics
    Bassetti, Nanni, 1600, Associazione Italiana per l'Informatica e il Calcolo Automatico, Piazzale Rodolfo Morandi, 2, Milano, 20121, Italy (13):
  • [22] Comparative Study and Analysis of Network Intrusion Detection Tools
    Bhosale, Dhanashri Ashok
    Mane, Vanita Manikrao
    PROCEEDINGS OF THE 2015 INTERNATIONAL CONFERENCE ON APPLIED AND THEORETICAL COMPUTING AND COMMUNICATION TECHNOLOGY (ICATCCT), 2015, : 312 - 315
  • [23] An Email Forensics Analysis Method Based on Social Network Analysis
    Liu, YanHua
    Chen, GuoLong
    Xie, Lili
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 563 - 569
  • [24] On Combining Diverse Static Analysis Tools for Web Security: An Empirical Study
    Nunes, Paulo
    Medeiros, Iberia
    Fonseca, Jose
    Neves, Nuno
    Correia, Miguel
    Vieira, Marco
    2017 13TH EUROPEAN DEPENDABLE COMPUTING CONFERENCE (EDCC 2017), 2017, : 121 - 128
  • [25] ON THE APPLICATION OF STATIC CODE ANALYSIS TOOLS IN THE SERBIAN IT INDUSTRY: AN EMPIRICAL STUDY
    Komosar, Aleksa
    Kijanovic, Sara
    Mandic, Vladimir
    Nikolic, Danilo
    Vuckovic, Teodora
    Proceedings of the 17th IADIS International Conference Information Systems 2024, IS 2024, 2024, : 53 - 60
  • [26] An Empirical Study of the Effectiveness of using Sentiment Analysis Tools for Opinion Mining
    Ding, Tao
    Pan, Shimei
    PROCEEDINGS OF THE 12TH INTERNATIONAL CONFERENCE ON WEB INFORMATION SYSTEMS AND TECHNOLOGIES, VOL 2 (WEBIST), 2016, : 53 - 62
  • [27] Social Network Forensics Analysis Model Based on Network Representation Learning
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    ENTROPY, 2024, 26 (07)
  • [28] Simulation tools for improvement of the fission track analysis method for nuclear forensics
    Babayew, Rami
    Yehuda-Zada, Yaacov
    Elgad, Noam
    Lorincik, Jan
    Orion, Itzhak
    Weiss, Aryeh
    Katarivas Levy, Galit
    Halevy, Itzhak
    JOURNAL OF RADIOANALYTICAL AND NUCLEAR CHEMISTRY, 2024, 333 (07) : 3359 - 3375
  • [29] Evaluating and Comparing Tools for Mobile Device Forensics Using Quantitative Analysis
    Saleem, Shahzad
    Popov, Oliver
    Appiah-Kubi, Oheneba Kwame
    DIGITAL FORENSICS AND CYBER CRIME, ICDF2C 2012, 2013, 114 : 264 - 282
  • [30] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50