Network Reconnaissance Investigation: A Memory Forensics Approach

被引:0
|
作者
Al-Saleh, Mohammed I. [1 ,2 ]
Al-Sharif, Ziad A. [1 ]
Alawneh, Luay [1 ]
机构
[1] Jordan Univ Sci & Technol, Irbid, Jordan
[2] Higher Coll Technol, Comp Informat Syst, Abu Dhabi, U Arab Emirates
关键词
IMPACT;
D O I
10.1109/iacs.2019.8809084
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Perpetrators utilize different network reconnaissance techniques in order to discover vulnerabilities and conduct their attacks. Port scanning can be leveraged to conclude open ports, available services, and even running operating systems along with their versions. Even though these techniques are effective, their aggressiveness for information gain could leave an apparent sign of attack, which can be observed by the variety of security controls deployed at the network perimeter of an organization. However, not all such attacks can be stopped nor the corresponding security controls can defend against insiders. In this paper, we tackle the problem of reconnaissance detection using a different approach. We utilize the rich information that is kept in memory (or RAM). We observe that packets sent or received stay in memory for a while. Our results show that inspecting memory for attack signs is beneficial. Furthermore, correlating contents that are obtained from different memories empowers the investigation process and helps reach to conclusions.
引用
收藏
页码:36 / 40
页数:5
相关论文
共 50 条
  • [41] Organizing historical memory in the Maritimes: A reconnaissance
    Muise, DA
    ACADIENSIS, 2000, 30 (01): : 50 - 60
  • [42] Airborne information and reconnaissance network
    Ayyagari, A
    Harrang, JP
    Ray, S
    MILCOM 96, CONFERENCE PROCEEDINGS, VOLS 1-3, 1996, : 230 - 234
  • [43] Database memory forensics: A machine learning approach to reverse- engineer query activity
    Nissan, Mahfuzul I.
    Wagner, James
    Aktar, Sharmin
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 44
  • [44] System Forensics, Investigation, and Response
    Keith, Nate
    Vacca, J. R.
    Rudolph, K.
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2012, 7 (02) : 143 - 147
  • [45] MRm-DLDet: a memory-resident malware detection framework based on memory forensics and deep neural network
    Liu, Jiaxi
    Feng, Yun
    Liu, Xinyu
    Zhao, Jianjun
    Liu, Qixu
    CYBERSECURITY, 2023, 6 (01)
  • [46] Database memory forensics: A machine learning approach to reverse-engineer query activity
    Nissan, Mahfuzul I.
    Wagner, James
    Aktar, Sharmin
    FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2023, 44
  • [47] The application research on network forensics
    Jingfang, H. (jdzhjf@163.com), 1600, Bentham Science Publishers B.V., P.O. Box 294, Bussum, 1400 AG, Netherlands (05):
  • [48] Network forensics and challenges for cybersecurity
    Wojciech Mazurczyk
    Krzysztof Szczypiorski
    Hui Tian
    annals of telecommunications - annales des télécommunications, 2014, 69 : 345 - 346
  • [49] An architecture for SCADA network forensics
    Kilpatrick, T.
    Gonzalez, J.
    Chandia, R.
    Papa, M.
    Shenoi, S.
    ADVANCES IN DIGITAL FORENSICS II, 2006, 222 : 273 - +
  • [50] Network forensics on packet fingerprints
    Cho, Chia Yuan
    Lee, Sin Yeung
    Tan, Chung Pheng
    Tan, Yong Tai
    SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 401 - +