DocumentCode :
1053890
Title :
Network forensics analysis
Author :
Corey, Vicka ; Peterman, Charles ; Shearin, Sybil ; Greenberg, Michael S. ; Van Bokkelen, James
Volume :
6
Issue :
6
fYear :
2002
Firstpage :
60
Lastpage :
66
Abstract :
Many tools let you view traffic in real time, but real-time monitoring at any level requires significant human and hardware resources, and doesn´t scale to networks larger than a single workgroup. It is generally more practical to archive all traffic and analyze subsets as necessary. This process is known as reconstructive traffic analysis, or network forensics. In practice, it is often limited to data collection and packet-level inspection; however, a network forensics analysis tool can provide a richer view of the data collected, allowing you to inspect the traffic from further up the protocol stack? The IT industry´s ever-growing concern with security is the primary motivation for network forensics. A network that has been prepared for forensic analysis is easy to monitor, and security vulnerabilities and configuration problems can be conveniently identified. It also allows the best possible analysis of security violations. Most importantly, analyzing a complete record of your network traffic with the appropriate reconstructive tools provides context for other breach-related events.
Keywords :
computer networks; security of data; telecommunication security; breach-related events; configuration problems; data collection; network forensics analysis tool; packet-level inspection; protocol stack; reconstructive traffic analysis; security; security violations; security vulnerabilities; Data security; Electronic mail; Forensics; Information security; Intrusion detection; Law; Monitoring; Physical layer; Protocols; Telecommunication traffic;
fLanguage :
English
Journal_Title :
Internet Computing, IEEE
Publisher :
ieee
ISSN :
1089-7801
Type :
jour
DOI :
10.1109/MIC.2002.1067738
Filename :
1067738
Link To Document :
بازگشت