官术网_书友最值得收藏!

Introducing Network Forensics

Network forensics is one of the sub-branches of digital forensics where the data being analyzed is the network traffic going to and from the system under observation. The purposes of this type of observation are collecting information, obtaining legal evidence, establishing a root-cause analysis of an event, analyzing malware behavior, and so on. Professionals familiar with digital forensics and incident response (DFIR) know that even the most careful suspects leave traces and artifacts behind. But forensics generally also includes imaging the systems for memory and hard drives, which can be analyzed later. So, how do network forensics come into the picture? Why do we need to perform network forensics at all? Well, the answer to this question is relatively simple.

Let's consider a scenario where you are hunting for some unknown attackers in a massive corporate infrastructure containing thousands of systems. In such a case, it would be practically impossible to image and analyze every system. The following two scenarios would also be problematic:

  • Instances where the disk drives may not be available
  • Cases where the attack is in progress, and you may not want to tip off the attackers

Whenever an intrusion or a digital crime happens over the wire, whether it was successful or not, the artifacts left behind can help us understand and recreate not only the intent of the attack, but also the actions performed by the attackers.

If the attack was successful, what activities were conducted by the attackers on the system? What happened next? Generally, most severe attacks, such as Advanced Package Tool (APT), ransomware, espionage, and others, start from a single instance of an unauthorized entry into a network and then evolve into a long-term project for the attackers until the day their goals are met; however, throughout this period the information flowing in and out of the network goes through many different devices, such as routers, firewalls, hubs, switches, web proxies, and others. Our goal is to identify and analyze all these different artifacts. Throughout this chapter, we will discuss the following:

  • Network forensics methodology
  • Sources of evidence
  • A few necessary case studies demonstrating hands-on network forensics
主站蜘蛛池模板: 吉林省| 大方县| 德阳市| 大邑县| 化德县| 昌乐县| 宜都市| 凌云县| 湘潭县| 鱼台县| 阿坝县| 丹寨县| 莱芜市| 兰溪市| 金沙县| 永福县| 上杭县| 惠安县| 肃南| 汪清县| 吕梁市| 吴旗县| 阳谷县| 卢龙县| 怀化市| 涞水县| 会理县| 梨树县| 黄大仙区| 佛学| 乐昌市| 巴里| 曲周县| 靖安县| 鹿邑县| 泸定县| 汉阴县| 大冶市| 垫江县| 和政县| 晋州市|