Computer Science – Networking and Internet Architecture
Scientific paper
2010-04-05
International Journal of Network Security & Its Applications 1.1 (2009) 14-25
Computer Science
Networking and Internet Architecture
12Pages
Scientific paper
Network forensics deals with the capture, recording and analysis of network events in order to discover evidential information about the source of security attacks in a court of law. This paper discusses the different tools and techniques available to conduct network forensics. Some of the tools discussed include: eMailTrackerPro to identify the physical location of an email sender; Web Historian to find the duration of each visit and the files uploaded and downloaded from the visited website; packet sniffers like Etherea to capture and analyze the data exchanged among the different computers in the network. The second half of the paper presents a survey of different IP traceback techniques like packet marking that help a forensic investigator to identify the true sources of the attacking IP packets. We also discuss the use of Honeypots and Honeynets that gather intelligence about the enemy and the tools and tactics of network intruders.
Allam Sumanth Reddy
Meghanathan Natarajan
Moore Loretta A.
No associations
LandOfFree
Tools and techniques for Network Forensics does not yet have a rating. At this time, there are no reviews or comments for this scientific paper.
If you have personal experience with Tools and techniques for Network Forensics, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Tools and techniques for Network Forensics will most certainly appreciate the feedback.
Profile ID: LFWR-SCP-O-636876