An Empirical Study of Network Forensics Analysis Tools

被引:0
|
作者
Ghafarian, Ahmad [1 ]
机构
[1] Univ North Georgia, Dept Comp Sci, Dahlonega, GA 30597 USA
关键词
NFAT; log files; firewall; IDS; open source; and proprietary;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network traffic monitoring tools allow network administrators to view network traffic in real-time. Since real-time monitoring requires human and hardware resources, it is more practical to archive all network traffic and analyze parts of captured data for specific purposes such as, forensics evidence, intrusion detection, or incident response. This process is known as network forensics. Commonly, network forensics analysis is done by manually examining log files which is a time-consuming and error prone process. Instead, network administrators use network forensics analysis tools (NFATs) to capture segments of traffic, to inspect the traffic and to analyze data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Moreover, NFATs support the notion of defence in depth. As such, they have the ability to correlate data from other security tools such as intrusion detection system or firewall. In this paper, we present the result of our experiment with several popular open source network forensics analysis tools. We evaluate the strengths and weaknesses of them, interface user friendliness, visualization, filtering, reporting, data collection, data analysis, extraction, and correlation with other log files such as firewall and IDSs.
引用
收藏
页码:366 / 370
页数:5
相关论文
共 50 条
  • [31] Introduction to a Network Forensics System for Cyber Incidents Analysis
    Choi, Yangseo
    Lee, Joo-Young
    Choi, Sunoh
    Kim, Jong-Hyum
    Kim, Ikkyun
    2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55
  • [32] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [33] An Evidential Network Forensics Analysis with Metrics for Conviction Evidence
    Amran, Ahmad Roshidi
    Sand, Amna
    Abd Razak, Mohd Raziff
    2014 4TH INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND TECHNOPRENEURSHIP (ICE2T), 2014, : 73 - 78
  • [34] A Graph Based Approach Toward Network Forensics Analysis
    Wang, Wei
    Daniels, Thomas E.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
  • [35] Use of Neuromarketing Tools: An Empirical Study
    Zuniga, Marcos
    Zepeda, Constanza
    EDUCATION EXCELLENCE AND INNOVATION MANAGEMENT THROUGH VISION 2020, 2019, : 9075 - 9088
  • [36] An Empirical Study in Software Verification Tools
    Jiang, Mengmeng
    Li, Xiaohong
    Xie, Xiaofei
    Zhang, Yao
    2020 INTERNATIONAL SYMPOSIUM ON THEORETICAL ASPECTS OF SOFTWARE ENGINEERING (TASE 2020), 2020, : 201 - 208
  • [37] A Review of Mobile and SIM Forensics Tools
    AlShehri, Mohammed Abdul Rahman
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2018, 18 (03): : 150 - 154
  • [38] An Insight into Digital Forensics Branches and Tools
    Kumari, Noble
    Mohapatra, A. K.
    2016 INTERNATIONAL CONFERENCE ON COMPUTATIONAL TECHNIQUES IN INFORMATION AND COMMUNICATION TECHNOLOGIES (ICCTICT), 2016,
  • [39] Utilizing data lifetime of TCP buffers in digital forensics: Empirical study
    Al-Saleh, Mohammed I.
    Al-Sharif, Ziad A.
    DIGITAL INVESTIGATION, 2012, 9 (02) : 119 - 124
  • [40] Lawyers get tools for email forensics
    Hilley, S.
    DIGITAL INVESTIGATION, 2007, 4 (02) : 52 - 52