Skip to main content

Guidelines for an Effective Network Forensic System

  • Conference paper
  • First Online:
International Conference on Intelligent Computing and Smart Communication 2019

Part of the book series: Algorithms for Intelligent Systems ((AIS))

  • 1654 Accesses

Abstract

Network forensics is a process of investigating cybercrimes to identify source of the attack. Paper discusses guidelines and recommendations to build an effective network forensic system. This helps the organizations to strategically establish their logging infrastructure so that the identified evidences are reliable, protected, and admissible in the court. The guideline also helps the forensic investigator while investigating a cyber attack.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 259.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 329.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 329.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. E.S. Pilli, R.C. Joshi, R. Niyogi, Network forensic frameworks: survey and research challenges. Digit. Investig. 7(1–2), 14–27 (2010) (Elsevier)

    Google Scholar 

  2. S. Garfinkel, Network forensic tapping the internet. http://www.oreillynet.com/lpt/a/1733

  3. B.J. Nikkel, A portable network forensic evidence collector. Digit. Investig. 3(3), 127–135 (2006) (Elsevier)

    Google Scholar 

  4. M.I. Cohen, PyFlag–an advanced network forensic framework. Digit. Investig. 5, S112–S120 (2008) (Elsevier)

    Google Scholar 

  5. E. Casey, Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Digit. Investig. 1(1), 28–43 (2004) (Elsevier)

    Google Scholar 

  6. B.J. Nikkel, Generalizing sources of live network evidence. Digit. Investig. 2(3), 193–200 (2005) (Elsevier)

    Google Scholar 

  7. B.J. Nikkel, Improving evidence acquisition from live network sources. Digit. Investig. 3(2), 89–96 (2006) (Elsevier)

    Google Scholar 

  8. V. Corey, C. Peterman, S. Shearin, M.S. Greenberg, J. Van Bokkelen, Network forensics analysis. IEEE Internet Comput. 6(6), 60–66 (2002)

    Article  Google Scholar 

  9. C. Boyd, P. Forster, Time and date issues in forensic computing—a case study. Digit. Investig. 1(1), 18–23 (2004) (Elsevier)

    Google Scholar 

  10. Ethereal/wireshark.https://www.wireshark.org/

  11. Tcpflow. www.circlemud.org/jelson/software/tcpflow/

  12. NetIntercept. www.securitywizardry.com/index.php/…/niksun-netintercept.html

  13. M. Solon, P. Harper, Preparing evidence for court. Digit. Investig. 1(4), 279–283 (2004) (Elsevier)

    Google Scholar 

  14. F. Buchholz, E. Spafford, On the role of file system metadata in digital forensics. Digit. Investig. 1, 298–309, (2004) (Elsevier Ltd.)

    Google Scholar 

  15. F. Buchholz, E. Spafford, On the role of file system metadata in digital forensics. Digit. Investig. 1(4), 298–309 (2004) (Elsevier)

    Google Scholar 

  16. M. Reith, C. Carr, G. Gunsch, An examination of digital forensic models. Int. J. Digit. Evid. 1(3), 1–12 (2002)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Rajni Ranjan Singh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2020 Springer Nature Singapore Pte Ltd.

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Singh, R.R., Tomar, D.S. (2020). Guidelines for an Effective Network Forensic System. In: Singh Tomar, G., Chaudhari, N.S., Barbosa, J.L.V., Aghwariya, M.K. (eds) International Conference on Intelligent Computing and Smart Communication 2019. Algorithms for Intelligent Systems. Springer, Singapore. https://doi.org/10.1007/978-981-15-0633-8_14

Download citation

Publish with us

Policies and ethics