DocumentCode :
144739
Title :
User and Device Tracking in Private Networks by Correlating Logs: A System for Responsive Forensic Analysis
Author :
Chaudhari, Sneha ; Chauhan, Himanshu ; Tomar, S.S. ; Rawat, Anil
Author_Institution :
Dept. of Atomic Energy (DAE), Raja Ramanna Centre for Adv. Technol., Indore, India
fYear :
2014
fDate :
7-9 April 2014
Firstpage :
1142
Lastpage :
1147
Abstract :
IP address of a device, from where an offending activity was performed, is of limited value, because it does not specify a physical device/user, but an endpoint in network. It is useful to have information about where a device/user was at the time the offending activity was performed. It would be desirable to correlate different pieces of evidence to discover information, such as IP addresses used by the same device, physical address and location of the device, connection time of the device, browsing habits and mail access transactions carried out by the user using the device. Log data from various sources are required to be correlated together to create contexts of information, which is not visible from one source alone. In large networks, users/devices accessing a private network repeatedly can be tracked by analyzing and correlating DHCP, Network Access Control, WWW, Email server logs. With huge amount of logs, the common approach of manual browsing, correlating of log events, based on timelines is tedious, unresponsive approach. Flat file based sequential search system is not responsive, hence RDBMS based tracking systems are desirable. To build a responsive system requires identifying, consolidating log files, conversion, transmission and storage into relational databases. An automated system has been developed at our organization for forensic analysis of network accesses, with device and user tracking as its goal. We present, our approach to perform log management, correlation, which assists in performing responsive forensic analysis of real network with more than 2500 nodes, aimed at tracking users/devices.
Keywords :
computer network security; local area networks; relational databases; DHCP; Flat file based sequential search system; IP address; Internet protocol address; RDBMS based tracking systems; browsing habits; device connection time; device location; device physical address; device tracking; electronic mail; email server logs; information context; mail access transactions; network access control; private networks; relational database management system; responsive forensic analysis; user tracking; Correlation; Databases; Electronic mail; Forensics; IP networks; Postal services; Servers; Logs; DHCP; NAC; squid; email; security logs; data monitoring and analysis tool;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Communication Systems and Network Technologies (CSNT), 2014 Fourth International Conference on
Conference_Location :
Bhopal
Print_ISBN :
978-1-4799-3069-2
Type :
conf
DOI :
10.1109/CSNT.2014.253
Filename :
6821578
Link To Document :
بازگشت