Network Reconnaissance Investigation: A Memory Forensics Approach

被引:0
|
作者
Al-Saleh, Mohammed I. [1 ,2 ]
Al-Sharif, Ziad A. [1 ]
Alawneh, Luay [1 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
[2] Higher Coll Technol, Comp Informat Syst, Abu Dhabi, U Arab Emirates
关键词
IMPACT;
D O I
10.1109/iacs.2019.8809084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perpetrators utilize different network reconnaissance techniques in order to discover vulnerabilities and conduct their attacks. Port scanning can be leveraged to conclude open ports, available services, and even running operating systems along with their versions. Even though these techniques are effective, their aggressiveness for information gain could leave an apparent sign of attack, which can be observed by the variety of security controls deployed at the network perimeter of an organization. However, not all such attacks can be stopped nor the corresponding security controls can defend against insiders. In this paper, we tackle the problem of reconnaissance detection using a different approach. We utilize the rich information that is kept in memory (or RAM). We observe that packets sent or received stay in memory for a while. Our results show that inspecting memory for attack signs is beneficial. Furthermore, correlating contents that are obtained from different memories empowers the investigation process and helps reach to conclusions.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [31] Foundation of Network Forensics
    Dobrynin, Andrey V.
    Jacobs, Michael
    Tian, Yuan
    MACROMOLECULES, 2023, 56 (22) : 9289 - 9296
  • [32] Specifying digital forensics: A forensics policy approach
    Taylor, Carol
    Endicott-Popovsky, Barbara
    Frincke, Deborah A.
    DIGITAL INVESTIGATION, 2007, 4 : S101 - S104
  • [33] Advances in volatile memory forensics
    Schatz, Bradley
    Cohen, Michael
    DIGITAL INVESTIGATION, 2017, 20 : 1 - 1
  • [34] Memory forensics: The path forward
    Case, Andrew
    Richard, Golden G., III
    DIGITAL INVESTIGATION, 2017, 20 : 23 - 33
  • [35] WHERE ARE THEY? MISSING, FORENSICS, AND MEMORY
    Baraybar, Jose Pablo
    Blackwell, Rebecca
    ANNALS OF ANTHROPOLOGICAL PRACTICE, 2014, 38 (01) : 22 - 42
  • [36] Trusted Internet Forensics: design of a network forensics appliance
    Bruschi, D.
    Monga, M.
    Rosti, E.
    2005 WORKSHOP OF THE 1ST INTL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATION NETWORKS - SECURECOMM, 2005, : 35 - 37
  • [37] Hiding and Trapping: A Deceptive Approach for Defending against Network Reconnaissance with Software-Defined Network
    Xing, Junchi
    Yang, Mingliang
    Zhou, Haifeng
    Wu, Chunming
    Ruan, Wei
    2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC), 2019,
  • [38] The Remote Wifi Investigation of Network and Forensics System for Police Based on Raspberry Pi
    Liu, Yang
    Lu, Dian-Jie
    Li, Xing-Yue
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATION AND SENSOR NETWORKS (WCSN 2016), 2016, 44 : 26 - 30
  • [39] Investigation of a layered network as an associative memory
    Richards, Gareth D.
    Neural Networks, 1988, 1 (1 SUPPL)
  • [40] Digital Forensics Random Access Memory Using Live Technique Based On Network Attacked
    Periyadi
    Mutiara, Giva Andriana
    Wijaya, Roni
    2017 5TH INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGY (ICOIC7), 2017,