Abstract
Network forensics is a process of investigating cybercrimes to identify source of the attack. Paper discusses guidelines and recommendations to build an effective network forensic system. This helps the organizations to strategically establish their logging infrastructure so that the identified evidences are reliable, protected, and admissible in the court. The guideline also helps the forensic investigator while investigating a cyber attack.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
E.S. Pilli, R.C. Joshi, R. Niyogi, Network forensic frameworks: survey and research challenges. Digit. Investig. 7(1–2), 14–27 (2010) (Elsevier)
S. Garfinkel, Network forensic tapping the internet. http://www.oreillynet.com/lpt/a/1733
B.J. Nikkel, A portable network forensic evidence collector. Digit. Investig. 3(3), 127–135 (2006) (Elsevier)
M.I. Cohen, PyFlag–an advanced network forensic framework. Digit. Investig. 5, S112–S120 (2008) (Elsevier)
E. Casey, Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digit. Investig. 1(1), 28–43 (2004) (Elsevier)
B.J. Nikkel, Generalizing sources of live network evidence. Digit. Investig. 2(3), 193–200 (2005) (Elsevier)
B.J. Nikkel, Improving evidence acquisition from live network sources. Digit. Investig. 3(2), 89–96 (2006) (Elsevier)
V. Corey, C. Peterman, S. Shearin, M.S. Greenberg, J. Van Bokkelen, Network forensics analysis. IEEE Internet Comput. 6(6), 60–66 (2002)
C. Boyd, P. Forster, Time and date issues in forensic computing—a case study. Digit. Investig. 1(1), 18–23 (2004) (Elsevier)
Ethereal/wireshark.https://www.wireshark.org/
NetIntercept. www.securitywizardry.com/index.php/…/niksun-netintercept.html
M. Solon, P. Harper, Preparing evidence for court. Digit. Investig. 1(4), 279–283 (2004) (Elsevier)
F. Buchholz, E. Spafford, On the role of file system metadata in digital forensics. Digit. Investig. 1, 298–309, (2004) (Elsevier Ltd.)
F. Buchholz, E. Spafford, On the role of file system metadata in digital forensics. Digit. Investig. 1(4), 298–309 (2004) (Elsevier)
M. Reith, C. Carr, G. Gunsch, An examination of digital forensic models. Int. J. Digit. Evid. 1(3), 1–12 (2002)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Singh, R.R., Tomar, D.S. (2020). Guidelines for an Effective Network Forensic System. In: Singh Tomar, G., Chaudhari, N.S., Barbosa, J.L.V., Aghwariya, M.K. (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0633-8_14
Download citation
DOI: https://doi.org/10.1007/978-981-15-0633-8_14
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-0632-1
Online ISBN: 978-981-15-0633-8
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)