Network Reconnaissance Investigation: A Memory Forensics Approach

被引:0
|
作者
Al-Saleh, Mohammed I. [1 ,2 ]
Al-Sharif, Ziad A. [1 ]
Alawneh, Luay [1 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
[2] Higher Coll Technol, Comp Informat Syst, Abu Dhabi, U Arab Emirates
关键词
IMPACT;
D O I
10.1109/iacs.2019.8809084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perpetrators utilize different network reconnaissance techniques in order to discover vulnerabilities and conduct their attacks. Port scanning can be leveraged to conclude open ports, available services, and even running operating systems along with their versions. Even though these techniques are effective, their aggressiveness for information gain could leave an apparent sign of attack, which can be observed by the variety of security controls deployed at the network perimeter of an organization. However, not all such attacks can be stopped nor the corresponding security controls can defend against insiders. In this paper, we tackle the problem of reconnaissance detection using a different approach. We utilize the rich information that is kept in memory (or RAM). We observe that packets sent or received stay in memory for a while. Our results show that inspecting memory for attack signs is beneficial. Furthermore, correlating contents that are obtained from different memories empowers the investigation process and helps reach to conclusions.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [1] Network Forensics Investigation for Botnet Attack
    Sembiring, Irwan
    Nugroho, Yonathan Satrio
    IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
  • [2] An Approach to Detect Network Attacks Applied for Network Forensics
    Nguyen, Khoa
    Tran, Dat
    Ma, Wanli
    Sharma, Dharmendra
    2014 11TH INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY (FSKD), 2014, : 655 - 660
  • [3] Memory Forensics Analysis for Investigation of Online Crime - A Review
    Chetry, Arjun
    Sharma, Uzzal
    PROCEEDINGS OF THE 2019 6TH INTERNATIONAL CONFERENCE ON COMPUTING FOR SUSTAINABLE GLOBAL DEVELOPMENT (INDIACOM), 2019, : 40 - 45
  • [4] Linux Memory Forensics: Expanding Rekall for Userland Investigation
    Stadlinger, Johannes
    Block, Frank
    Dewald, Andreas
    2018 11TH INTERNATIONAL CONFERENCE ON IT SECURITY INCIDENT MANAGEMENT & IT FORENSICS (IMF 2018), 2018, : 27 - 46
  • [5] A New Approach in Digital Forensics Investigation Process
    Ahmadi, Hamid Reza
    Mourad, Ayman
    Tawil, Rami
    Awada, Mohammad Baker
    2018 INTERNATIONAL CONFERENCE ON COMPUTER AND APPLICATIONS (ICCA), 2018, : 270 - 275
  • [6] A Unified Forensics Analysis Approach to Digital Investigation
    Alshumrani, Ali
    Clark, Nathan
    Ghita, Bogdan
    PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY ICCWS, 2023, : 466 - 475
  • [7] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [8] A Graded Approach to Network Forensics with Privacy Concerns
    Brockelsby, William
    Dutta, Rudra
    2019 INTERNATIONAL CONFERENCE ON COMPUTING, NETWORKING AND COMMUNICATIONS (ICNC), 2019, : 292 - 297
  • [9] Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
    Thing, Vrizlynn L. L.
    Chua, Zheng-Leong
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 217 - 230
  • [10] Disk Memory Forensics Analysis of Memory Forensics Frameworks Flow
    Prem, T.
    Selwin, V. Paul
    Mohan, Ashok Kumar
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,