An Empirical Study of Network Forensics Analysis Tools

被引:0
|
作者
Ghafarian, Ahmad [1 ]
机构
[1] Univ North Georgia, Dept Comp Sci, Dahlonega, GA 30597 USA
关键词
NFAT; log files; firewall; IDS; open source; and proprietary;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Network traffic monitoring tools allow network administrators to view network traffic in real-time. Since real-time monitoring requires human and hardware resources, it is more practical to archive all network traffic and analyze parts of captured data for specific purposes such as, forensics evidence, intrusion detection, or incident response. This process is known as network forensics. Commonly, network forensics analysis is done by manually examining log files which is a time-consuming and error prone process. Instead, network administrators use network forensics analysis tools (NFATs) to capture segments of traffic, to inspect the traffic and to analyze data transferred over the networks so that an attack or the malicious intent of the intrusions may be investigated. Moreover, NFATs support the notion of defence in depth. As such, they have the ability to correlate data from other security tools such as intrusion detection system or firewall. In this paper, we present the result of our experiment with several popular open source network forensics analysis tools. We evaluate the strengths and weaknesses of them, interface user friendliness, visualization, filtering, reporting, data collection, data analysis, extraction, and correlation with other log files such as firewall and IDSs.
引用
收藏
页码:366 / 370
页数:5
相关论文
共 50 条
  • [41] Evaluation of Firefox Browser Forensics Tools
    Mahaju, Sweta
    Atkison, Travis
    PROCEEDINGS OF THE SOUTHEAST CONFERENCE ACM SE'17, 2017, : 5 - 12
  • [42] Analytical chemical tools in wildlife forensics
    Stelling, MA
    Van der Peijl, GJQ
    FORENSIC SCIENCE INTERNATIONAL, 2003, 136 : 381 - 382
  • [43] Digital anti forensics: Tools and approaches
    Jahankhani, Hamid
    Anastasios, Bouras
    Revett, Kenneth
    ECIW 2007: PROCEEDINGS OF THE 6TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2007, : 115 - +
  • [44] Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis
    Rasmi, Mohammad
    Al-Qawasmi, Khaled E.
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 297 - 307
  • [45] Challenges in Network forensics
    Buric, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386
  • [46] Foundation of Network Forensics
    Dobrynin, Andrey V.
    Jacobs, Michael
    Tian, Yuan
    MACROMOLECULES, 2023, 56 (22) : 9289 - 9296
  • [47] An Empirical Approach For Digital Currency Forensics
    Yan, Wei Q.
    Chambers, Jarrett
    2013 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2013, : 2988 - 2991
  • [48] Trusted Internet Forensics: design of a network forensics appliance
    Bruschi, D.
    Monga, M.
    Rosti, E.
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 35 - 37
  • [49] A double-compression method for searchable network packets in network forensics and analysis
    Li, Zhenyu
    Ding, Yong
    Yi, Chen
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 119
  • [50] An Empirical Study on Android Malware Characterization by Social Network Analysis
    Zhao, Haojun
    Wu, Yueming
    Zou, Deqing
    Jin, Hai
    IEEE TRANSACTIONS ON RELIABILITY, 2024, 73 (01) : 757 - 770