SlideShare a Scribd company logo
PRESENTATION
NETWORK FORENSICS
SUJEET KUMAR
31703218
October 29, 2017
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 1 / 34
Table of Contents Table
Table of Contents
Motivation
Introduction
Network Forensics
Issues
Network forensics Analysis Tools
Conclusion and future directions
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 2 / 34
Table of Contents Motivation
Motivation
Nowadays network grow explosively and crime related to the network
is increasing.
Network Forensics is a sub-division of digital forensics and it mainly
focus on the analysis of network traffic and monitors the intrusion.
Network Forensics can focus on volatile and dynamic data but digital
forensics is focus on stored and static data. Whenever intrusions are
detected on network,then network forensics capture and record that
activity for investigation process after the collection of intrusion
activity analysis, perform on the network traffic
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 3 / 34
Introduction Basics
Forensics?
The art of gathering evidence during or after a crime
Reconstructing the criminals actions
Providing evidence for prosecution
Digital Forensics
The scientific examination and analysis of digital evidence in such a
way that the information can be used as evidence in a court of law.
Network Forensic
Network forensics is a sub-branch of digital forensics relating to the
monitoring and analysis of computer network traffic for the purposes of
information gathering, legal evidence, or intrusion detection. Unlike
other areas of digital forensics, network investigations deal with volatile
and dynamic information.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 4 / 34
Introduction Basics
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 5 / 34
Introduction Fundamental
Basics of Network Forensic
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 6 / 34
Introduction Fundamental
Fundamental
Catch-it-as-you-can
All packets are sends through a traffic point and all these packets are
stored into database.
Analysis is performed on stored data analysis data are also stored into
database so it required larger storage and these data are saved for
future analysis.
Stop-look-and-listen
This system is very different from first system, in this system only
those data are saved into database that required for future analysis.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 7 / 34
Network Forensics Model
Model
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 8 / 34
Network Forensics Network Forensics Methods
Network Forensics Methods
Ethernet
TCP/IP
Internets
Wireless Forensics
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 9 / 34
Network Forensics Ethernet
Ethernet
Methods are achieved with eavesdropping bit streams (on the
Ethernet layer)
Uses monitoring tools or sniffers
Wireshark
Then protocols can be consulted, such as the Address Resolution
Protocol (ARP)
Network Interface Card (NIC), but can be averted with encryption
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 10 / 34
Network Forensics TCP/IP
TCP/IP
Methods are achieved with router information investigations (on the
Network layer).
Each router includes routing tables to pass along packets
These are some of the best information sources for data tracking
Follow compromised packets, reverse route, ID the source
Network layer also provides authentication log evidence
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 11 / 34
Network Forensics Internet
Internet
Methods are achieved by identifying server logs (on the Internet).
Includes web-browsing, email, chat, and other types of traffic
communication
Server logs collect information
Email accounts have useful information except when email headers are
faked
User account information associated with a particular user
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 12 / 34
Network Forensics Wireless Forensics
Wireless Forensics
Methods are achieved by collecting & analyzing wireless traffic
(Wireless Networks).
A sub-discipline of the field
To get that which is considered valid digital evidence
This can be normal data OR voice communications via VoIP
Analysis is similar to wired network situations, with different security
issues
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 13 / 34
Network Forensics Monitor
Network Monitor
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 14 / 34
Issues
Basic Issues
Internet worm
Phishing
Spam
Bots
Distributed Denial of Service (DDoS) and Denial of service (DoS)
ZERO-Day Attack
Random-UDP Flooding Attack
Stealth Port Scanning Attack
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 15 / 34
Network forensics analysis tools
Network forensics analysis tools
Network forensics analysis tools are used to analyze the collected
data, aggregated data from multiple security tools.
Network forensics analysis tools functions are provide
IP security,
Detect inside and outside attack in the system, risk analysis,
Data recovery,
Anomaly detection,
Prediction of future attacks,
Detect attack pattern ,
Data aggregation from IDS and firewall logs etc.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 16 / 34
Network forensics analysis tools NetIntercept
NetIntercept
It collects network traffic and analyzed bundle of traffic.
It detects spoofing and generates a variety of report from their result.
It store large amount of data at a time.
We can also say it is an example of catchit-as-you-can system.
Netintercept tool allow to its log files are analyzed and inspected by
different tools
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 17 / 34
Network forensics analysis tools NetIntercept
NetIntercept Continued
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 18 / 34
Network forensics analysis tools Iris
Iris
It collects data packets from the internet, then reassembles it, and
reconstructs the actual text from the session.
Replay the network traffic for audit trail of suspicious activity.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 19 / 34
Network forensics analysis tools Iris
Iris Continued
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 20 / 34
Network forensics analysis tools NetworkMiner
NetworkMiner
By using the live sniffer it, capture the network traffic that discover
host name, reassemble the network data.
It detects how much an attacker leaks data.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 21 / 34
Network forensics analysis tools NetworkMiner
NetworkMiner Continued
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 22 / 34
Network forensics analysis tools Other Tools
Other Tools
NetDetector
It captures the attack, integrate all signature based anomaly detection,
and reconstruct the session.
This tool performs import and export of data through HTTP, FTP and
SCP.
It support network interfaces like T1, FDDI and support protocol like
TCP/IP.
NetDetctor tool capture, analyzed and report on the network traffic.
SilentRunner
This tools is focus on inside threats, it capture analyzed and visualized
in 3-dimension on the network to monitor every packets passing
through network.
If any abnormally occurred on the internet then it alerts.
It also reconstruct security incident in their exact sequence.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 23 / 34
Network forensics analysis tools Network security and monitor network traffic onlin tool
Network security and monitor network traffic online
TCPDump
It run in command line, it analyzed, capture, display, and store the
network data. Main function of this tool is filter and collects the data.
Wireshark and savant
This tool is used for analyzed the network packet. It perform live
capturing the data, offline analysis, it read and write data in different
formats by using other tools.
Ngrep
It is used for debugging the low level network traffic in UNIX. Function
of this tool is filter and collects the data.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 24 / 34
Network forensics challenges Network forensics challenges
Network forensics challenges
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 25 / 34
Network forensics challenges High speed data transmission
High speed data transmission
High data rate of network traffic creates difficulties for network
forensics in capturing and preserving all network packets . Millions of
packets are transmitted over the network in no time, which passes
through thousands of interconnected network devices
To overcome the aforementioned problems, three different solution
are proposed including hardware based ,software based and
distributive based solution.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 26 / 34
Network forensics challenges Data storage on the network devices
Data storage on the network devices
A huge amount of data is transmitted over the network which is
captured and analyzed for investigation. However, such data
complicates the situation for network forensics to retrieve evidence
from the network. For instance, the captured data needs to be stored
on devices with large storage capacity; whereas the storage capacity
of the network interconnectivity devices is limited
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 27 / 34
Network forensics challenges Data integrity
Data integrity
Data integrity plays a vital role in the process of network forensics
which has to be tackled. Data integrity in the network is an ability to
keep accurate, complete, and consistent data in the network.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 28 / 34
Network forensics challenges Data privacy
Data privacy
Data privacy is an important factor in the investigation process of
network forensics. A forensic attribution solution is proposed to solve
the aforementioned problem related to user privacy . A forensic
investigator can view the data of interest by verifying the packet
signature to enforce forensic attribution in the network
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 29 / 34
Network forensics challenges Access to IP addresses
Access to IP addresses
The access of source IP address of an intruder is an important step in
network forensics. Source IP address indicates origin of the attack
that assists in the identification of the intruder and stopping the
attacks
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 30 / 34
Network forensics challenges Data extraction location
Data extraction location
Distributive nature and virtualized characteristics of networks
complicate network forensics in identifying appropriate location and
device for extracting the data. A network with thousands of devices
connected with each other through high speed data links, which
transmit millions of packets per second is difficult to be handled for
its each link and device.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 31 / 34
Network forensics challenges Intelligent network forensic tools
Intelligent network forensic tools
Current network forensic analysis tools capture and record network
traffic by targeting complete packets.
Such tools incorporate problems regarding storing huge volume of
data with more time delays.
An intelligent and smart network forensic tool is required to capture
network traffic of choice depending on the investigational situation.
For instance, capturing specific session data with a domain of
interest, which further records, analyzes, and visualizes the data. This
will reduce problem of storage, computational resources for
investigation, bandwidth utilization, time delays, and result in quick
incident response in real-time situation.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 32 / 34
Conclusion and future directions
Conclusion and future directions
The development of intelligent network forensic tools to focus on
specific type of network traffic analysis is a challenge in terms of
future perspective. This will reduce time delays, less computational
resources requirement; minimize attacks, providing reliable and
secured evidences, and efficient investigation with minimum efforts.
Moreover, network forensics at distributed networks of the cloud
computing and mobile cloud computing needs to be explored.
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 33 / 34
References
References
Suleman Khan,A Gani, A W A Wahab: Network forensics:
Review,taxonomy,and open challenge [2016]
Gulshan Shrivastava :Network Forensics: Methodical Literature
Review [IEEE-2016]
Sherri Davido & Jonathan Ham: Network Forensics Tracking Hackers
through Cyberspace [BOOK]
SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 34 / 34

More Related Content

PPT
Network forensics1
PPTX
Network Forensics
PPTX
Network forensics and investigating logs
PPT
Digital Forensic
PPTX
Introduction To Exploitation & Metasploit
PDF
A Case Study of the Capital One Data Breach
PDF
Cyber Security Governance
Network forensics1
Network Forensics
Network forensics and investigating logs
Digital Forensic
Introduction To Exploitation & Metasploit
A Case Study of the Capital One Data Breach
Cyber Security Governance

What's hot (20)

PPTX
Network Forensics Intro
PPTX
Mobile Forensics
PPTX
Computer forensics toolkit
PDF
01 Computer Forensics Fundamentals - Notes
PPTX
Digital Forensics
PDF
Network forensics
PPTX
Network forensic
PPTX
Anti forensic
PPTX
Computer forensic ppt
PDF
Social Media Forensics
PPTX
Digital forensic tools
PPTX
E-mail Investigation
PPTX
Browser forensics
PPTX
Computer forensics
PPT
Introduction to computer forensic
PPT
Computer forensics
PPTX
Open source network forensics and advanced pcap analysis
PPTX
Network packet analysis -capture and Analysis
PPTX
Intrusion prevention system(ips)
PDF
Incident response methodology
Network Forensics Intro
Mobile Forensics
Computer forensics toolkit
01 Computer Forensics Fundamentals - Notes
Digital Forensics
Network forensics
Network forensic
Anti forensic
Computer forensic ppt
Social Media Forensics
Digital forensic tools
E-mail Investigation
Browser forensics
Computer forensics
Introduction to computer forensic
Computer forensics
Open source network forensics and advanced pcap analysis
Network packet analysis -capture and Analysis
Intrusion prevention system(ips)
Incident response methodology
Ad

Similar to Network Forensic (20)

PDF
Collecting and analyzing network-based evidence
PDF
DESIGN AND EFFICIENT DEPLOYMENT OF HONEYPOT AND DYNAMIC RULE BASED LIVE NETWO...
DOCX
4777.team c.final
PDF
Study of computer network issues and
PDF
A secure network forensics system for cyber incidents analysis
PDF
Network Forensic Investigation of HTTPS Protocol
PDF
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
PPTX
Lecture 2_IoT.pptx
PDF
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
PDF
Comparative Analysis: Network Forensic Systems
PDF
Emerging Trends In Cryptography And Digital Forensics
PDF
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
PDF
Improving Cloud Security Using Multi Level Encryption and Authentication
PDF
Multipath Dynamic Source Routing Protocol using Portfolio Selection
PPTX
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...
PDF
Peripheral Review and Analysis of Internet Network Security
PDF
IRJET- Multimedia Content Security with Random Key Generation Approach in...
PDF
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
PDF
IRJET - Digital Forensics Analysis for Network Related Data
PPTX
ZONeSEC in ERNCIP
Collecting and analyzing network-based evidence
DESIGN AND EFFICIENT DEPLOYMENT OF HONEYPOT AND DYNAMIC RULE BASED LIVE NETWO...
4777.team c.final
Study of computer network issues and
A secure network forensics system for cyber incidents analysis
Network Forensic Investigation of HTTPS Protocol
Confidential Log-In To Real User using Visual Cryptography and Upload Encrypt...
Lecture 2_IoT.pptx
Analysis of IT Monitoring Using Open Source Software Techniques: A Review
Comparative Analysis: Network Forensic Systems
Emerging Trends In Cryptography And Digital Forensics
ANALYZING NETWORK PERFORMANCE PARAMETERS USING WIRESHARK
Improving Cloud Security Using Multi Level Encryption and Authentication
Multipath Dynamic Source Routing Protocol using Portfolio Selection
Low-Cost Approximate and Adaptive Monitoring Techniques for the Internet of T...
Peripheral Review and Analysis of Internet Network Security
IRJET- Multimedia Content Security with Random Key Generation Approach in...
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET - Digital Forensics Analysis for Network Related Data
ZONeSEC in ERNCIP
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
cuic standard and advanced reporting.pdf
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
KodekX | Application Modernization Development
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Big Data Technologies - Introduction.pptx
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Review of recent advances in non-invasive hemoglobin estimation
“AI and Expert System Decision Support & Business Intelligence Systems”
Modernizing your data center with Dell and AMD
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
Network Security Unit 5.pdf for BCA BBA.
MYSQL Presentation for SQL database connectivity
Advanced methodologies resolving dimensionality complications for autism neur...
cuic standard and advanced reporting.pdf
Building Integrated photovoltaic BIPV_UPV.pdf
KodekX | Application Modernization Development
Digital-Transformation-Roadmap-for-Companies.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Big Data Technologies - Introduction.pptx
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...

Network Forensic

  • 1. PRESENTATION NETWORK FORENSICS SUJEET KUMAR 31703218 October 29, 2017 SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 1 / 34
  • 2. Table of Contents Table Table of Contents Motivation Introduction Network Forensics Issues Network forensics Analysis Tools Conclusion and future directions SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 2 / 34
  • 3. Table of Contents Motivation Motivation Nowadays network grow explosively and crime related to the network is increasing. Network Forensics is a sub-division of digital forensics and it mainly focus on the analysis of network traffic and monitors the intrusion. Network Forensics can focus on volatile and dynamic data but digital forensics is focus on stored and static data. Whenever intrusions are detected on network,then network forensics capture and record that activity for investigation process after the collection of intrusion activity analysis, perform on the network traffic SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 3 / 34
  • 4. Introduction Basics Forensics? The art of gathering evidence during or after a crime Reconstructing the criminals actions Providing evidence for prosecution Digital Forensics The scientific examination and analysis of digital evidence in such a way that the information can be used as evidence in a court of law. Network Forensic Network forensics is a sub-branch of digital forensics relating to the monitoring and analysis of computer network traffic for the purposes of information gathering, legal evidence, or intrusion detection. Unlike other areas of digital forensics, network investigations deal with volatile and dynamic information. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 4 / 34
  • 5. Introduction Basics SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 5 / 34
  • 6. Introduction Fundamental Basics of Network Forensic SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 6 / 34
  • 7. Introduction Fundamental Fundamental Catch-it-as-you-can All packets are sends through a traffic point and all these packets are stored into database. Analysis is performed on stored data analysis data are also stored into database so it required larger storage and these data are saved for future analysis. Stop-look-and-listen This system is very different from first system, in this system only those data are saved into database that required for future analysis. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 7 / 34
  • 8. Network Forensics Model Model SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 8 / 34
  • 9. Network Forensics Network Forensics Methods Network Forensics Methods Ethernet TCP/IP Internets Wireless Forensics SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 9 / 34
  • 10. Network Forensics Ethernet Ethernet Methods are achieved with eavesdropping bit streams (on the Ethernet layer) Uses monitoring tools or sniffers Wireshark Then protocols can be consulted, such as the Address Resolution Protocol (ARP) Network Interface Card (NIC), but can be averted with encryption SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 10 / 34
  • 11. Network Forensics TCP/IP TCP/IP Methods are achieved with router information investigations (on the Network layer). Each router includes routing tables to pass along packets These are some of the best information sources for data tracking Follow compromised packets, reverse route, ID the source Network layer also provides authentication log evidence SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 11 / 34
  • 12. Network Forensics Internet Internet Methods are achieved by identifying server logs (on the Internet). Includes web-browsing, email, chat, and other types of traffic communication Server logs collect information Email accounts have useful information except when email headers are faked User account information associated with a particular user SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 12 / 34
  • 13. Network Forensics Wireless Forensics Wireless Forensics Methods are achieved by collecting & analyzing wireless traffic (Wireless Networks). A sub-discipline of the field To get that which is considered valid digital evidence This can be normal data OR voice communications via VoIP Analysis is similar to wired network situations, with different security issues SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 13 / 34
  • 14. Network Forensics Monitor Network Monitor SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 14 / 34
  • 15. Issues Basic Issues Internet worm Phishing Spam Bots Distributed Denial of Service (DDoS) and Denial of service (DoS) ZERO-Day Attack Random-UDP Flooding Attack Stealth Port Scanning Attack SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 15 / 34
  • 16. Network forensics analysis tools Network forensics analysis tools Network forensics analysis tools are used to analyze the collected data, aggregated data from multiple security tools. Network forensics analysis tools functions are provide IP security, Detect inside and outside attack in the system, risk analysis, Data recovery, Anomaly detection, Prediction of future attacks, Detect attack pattern , Data aggregation from IDS and firewall logs etc. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 16 / 34
  • 17. Network forensics analysis tools NetIntercept NetIntercept It collects network traffic and analyzed bundle of traffic. It detects spoofing and generates a variety of report from their result. It store large amount of data at a time. We can also say it is an example of catchit-as-you-can system. Netintercept tool allow to its log files are analyzed and inspected by different tools SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 17 / 34
  • 18. Network forensics analysis tools NetIntercept NetIntercept Continued SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 18 / 34
  • 19. Network forensics analysis tools Iris Iris It collects data packets from the internet, then reassembles it, and reconstructs the actual text from the session. Replay the network traffic for audit trail of suspicious activity. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 19 / 34
  • 20. Network forensics analysis tools Iris Iris Continued SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 20 / 34
  • 21. Network forensics analysis tools NetworkMiner NetworkMiner By using the live sniffer it, capture the network traffic that discover host name, reassemble the network data. It detects how much an attacker leaks data. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 21 / 34
  • 22. Network forensics analysis tools NetworkMiner NetworkMiner Continued SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 22 / 34
  • 23. Network forensics analysis tools Other Tools Other Tools NetDetector It captures the attack, integrate all signature based anomaly detection, and reconstruct the session. This tool performs import and export of data through HTTP, FTP and SCP. It support network interfaces like T1, FDDI and support protocol like TCP/IP. NetDetctor tool capture, analyzed and report on the network traffic. SilentRunner This tools is focus on inside threats, it capture analyzed and visualized in 3-dimension on the network to monitor every packets passing through network. If any abnormally occurred on the internet then it alerts. It also reconstruct security incident in their exact sequence. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 23 / 34
  • 24. Network forensics analysis tools Network security and monitor network traffic onlin tool Network security and monitor network traffic online TCPDump It run in command line, it analyzed, capture, display, and store the network data. Main function of this tool is filter and collects the data. Wireshark and savant This tool is used for analyzed the network packet. It perform live capturing the data, offline analysis, it read and write data in different formats by using other tools. Ngrep It is used for debugging the low level network traffic in UNIX. Function of this tool is filter and collects the data. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 24 / 34
  • 25. Network forensics challenges Network forensics challenges Network forensics challenges SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 25 / 34
  • 26. Network forensics challenges High speed data transmission High speed data transmission High data rate of network traffic creates difficulties for network forensics in capturing and preserving all network packets . Millions of packets are transmitted over the network in no time, which passes through thousands of interconnected network devices To overcome the aforementioned problems, three different solution are proposed including hardware based ,software based and distributive based solution. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 26 / 34
  • 27. Network forensics challenges Data storage on the network devices Data storage on the network devices A huge amount of data is transmitted over the network which is captured and analyzed for investigation. However, such data complicates the situation for network forensics to retrieve evidence from the network. For instance, the captured data needs to be stored on devices with large storage capacity; whereas the storage capacity of the network interconnectivity devices is limited SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 27 / 34
  • 28. Network forensics challenges Data integrity Data integrity Data integrity plays a vital role in the process of network forensics which has to be tackled. Data integrity in the network is an ability to keep accurate, complete, and consistent data in the network. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 28 / 34
  • 29. Network forensics challenges Data privacy Data privacy Data privacy is an important factor in the investigation process of network forensics. A forensic attribution solution is proposed to solve the aforementioned problem related to user privacy . A forensic investigator can view the data of interest by verifying the packet signature to enforce forensic attribution in the network SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 29 / 34
  • 30. Network forensics challenges Access to IP addresses Access to IP addresses The access of source IP address of an intruder is an important step in network forensics. Source IP address indicates origin of the attack that assists in the identification of the intruder and stopping the attacks SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 30 / 34
  • 31. Network forensics challenges Data extraction location Data extraction location Distributive nature and virtualized characteristics of networks complicate network forensics in identifying appropriate location and device for extracting the data. A network with thousands of devices connected with each other through high speed data links, which transmit millions of packets per second is difficult to be handled for its each link and device. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 31 / 34
  • 32. Network forensics challenges Intelligent network forensic tools Intelligent network forensic tools Current network forensic analysis tools capture and record network traffic by targeting complete packets. Such tools incorporate problems regarding storing huge volume of data with more time delays. An intelligent and smart network forensic tool is required to capture network traffic of choice depending on the investigational situation. For instance, capturing specific session data with a domain of interest, which further records, analyzes, and visualizes the data. This will reduce problem of storage, computational resources for investigation, bandwidth utilization, time delays, and result in quick incident response in real-time situation. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 32 / 34
  • 33. Conclusion and future directions Conclusion and future directions The development of intelligent network forensic tools to focus on specific type of network traffic analysis is a challenge in terms of future perspective. This will reduce time delays, less computational resources requirement; minimize attacks, providing reliable and secured evidences, and efficient investigation with minimum efforts. Moreover, network forensics at distributed networks of the cloud computing and mobile cloud computing needs to be explored. SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 33 / 34
  • 34. References References Suleman Khan,A Gani, A W A Wahab: Network forensics: Review,taxonomy,and open challenge [2016] Gulshan Shrivastava :Network Forensics: Methodical Literature Review [IEEE-2016] Sherri Davido & Jonathan Ham: Network Forensics Tracking Hackers through Cyberspace [BOOK] SUJEET KUMAR (31703218) PRESENTATION October 29, 2017 34 / 34