官术网_书友最值得收藏!

Introducing Network Forensics

Network forensics is one of the sub-branches of digital forensics where the data being analyzed is the network traffic going to and from the system under observation. The purposes of this type of observation are collecting information, obtaining legal evidence, establishing a root-cause analysis of an event, analyzing malware behavior, and so on. Professionals familiar with digital forensics and incident response (DFIR) know that even the most careful suspects leave traces and artifacts behind. But forensics generally also includes imaging the systems for memory and hard drives, which can be analyzed later. So, how do network forensics come into the picture? Why do we need to perform network forensics at all? Well, the answer to this question is relatively simple.

Let's consider a scenario where you are hunting for some unknown attackers in a massive corporate infrastructure containing thousands of systems. In such a case, it would be practically impossible to image and analyze every system. The following two scenarios would also be problematic:

  • Instances where the disk drives may not be available
  • Cases where the attack is in progress, and you may not want to tip off the attackers

Whenever an intrusion or a digital crime happens over the wire, whether it was successful or not, the artifacts left behind can help us understand and recreate not only the intent of the attack, but also the actions performed by the attackers.

If the attack was successful, what activities were conducted by the attackers on the system? What happened next? Generally, most severe attacks, such as Advanced Package Tool (APT), ransomware, espionage, and others, start from a single instance of an unauthorized entry into a network and then evolve into a long-term project for the attackers until the day their goals are met; however, throughout this period the information flowing in and out of the network goes through many different devices, such as routers, firewalls, hubs, switches, web proxies, and others. Our goal is to identify and analyze all these different artifacts. Throughout this chapter, we will discuss the following:

  • Network forensics methodology
  • Sources of evidence
  • A few necessary case studies demonstrating hands-on network forensics
主站蜘蛛池模板: 汤阴县| 吉隆县| 黎城县| 开原市| 台州市| 穆棱市| 永新县| 厦门市| 南汇区| 沧州市| 安泽县| 阳新县| 海林市| 海口市| 洛阳市| 阿尔山市| 安岳县| 石城县| 东光县| 肥城市| 屯昌县| 桃园县| 大悟县| 伊吾县| 梨树县| 五莲县| 康平县| 湘潭市| 清涧县| 襄汾县| 盘山县| 肥乡县| 永康市| 安福县| 闽侯县| 巨野县| 祁门县| 通许县| 安庆市| 遂昌县| 平遥县|