Packet analysis for network forensics: A comprehensive survey

被引:42
|
作者
Sikos, Leslie F. [1 ]
机构
[1] Edith Cowan Univ, Joondalup, Australia
关键词
Packet analysis; Deep packet inspection; Network forensics; Packet sniffer; Wireshark; Pcap; Digital evidence; Network monitoring; Intrusion detection; PERFORMANCE; IDENTIFICATION; INSPECTION; MARKING; SCHEMES; TOOL; DPI;
D O I
10.1016/j.fsidi.2019.200892
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Packet analysis is a primary traceback technique in network forensics, which, providing that the packet details captured are sufficiently detailed, can play back even the entire network traffic for a particular point in time. This can be used to find traces of nefarious online behavior, data breaches, unauthorized website access, malware infection, and intrusion attempts, and to reconstruct image files, documents, email attachments, etc. sent over the network. This paper is a comprehensive survey of the utilization of packet analysis, including deep packet inspection, in network forensics, and provides a review of AI-powered packet analysis methods with advanced network traffic classification and pattern identification capabilities. Considering that not all network information can be used in court, the types of digital evidence that might be admissible are detailed. The properties of both hardware appliances and packet analyzer software are reviewed from the perspective of their potential use in network forensics. (C) 2019 The Author. Published by Elsevier Ltd.
引用
收藏
页数:12
相关论文
共 50 条
  • [1] Network forensics on packet fingerprints
    Cho, Chia Yuan
    Lee, Sin Yeung
    Tan, Chung Pheng
    Tan, Yong Tai
    [J]. SECURITY AND PRIVACY IN DYNAMIC ENVIRONMENTS, 2006, 201 : 401 - +
  • [2] Artificial Intelligence in Social Media Forensics: A Comprehensive Survey and Analysis
    Bokolo, Biodoumoye George
    Liu, Qingzhong
    [J]. ELECTRONICS, 2024, 13 (09)
  • [3] A SURVEY OF SOCIAL NETWORK FORENSICS
    Karabiyik, Umit
    Canbaz, Muhammed Abdullah
    Aksoy, Ahmet
    Tuna, Tayfun
    Akbas, Esra
    Gonen, Bilal
    Aygun, Ramazan S.
    [J]. JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2016, 11 (04) : 55 - 128
  • [4] Cybersecurity and Network Forensics: Analysis of Malicious Traffic towards a Honeynet with Deep Packet Inspection
    Pimenta Rodrigues, Gabriel Arquelau
    Albuquerque, Robson de Oliveira
    Gomes de Deus, Flavio Elias
    de Sousa, Rafael Timoteo, Jr.
    de Oliveira Junior, Gildasio Antonio
    Garcia Villalba, Luis Javier
    Kim, Tai-Hoon
    [J]. APPLIED SCIENCES-BASEL, 2017, 7 (10):
  • [5] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    [J]. IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [6] Network Forensics: A Comprehensive Review of Tools and Techniques
    Qureshi, Sirajuddin
    Tunio, Saima
    Akhtar, Faheem
    Wajahat, Ahsan
    Nazir, Ahsan
    Ullah, Faheem
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2021, 12 (05) : 879 - 887
  • [7] The Cognitive Packet Network: A Survey
    Sakellari, Georgia
    [J]. COMPUTER JOURNAL, 2010, 53 (03): : 268 - 279
  • [8] SDNForensics: A Comprehensive Forensics Framework for Software Defined Network
    Zhang, Shu-hui
    Meng, Xiang-xu
    Wang, Lian-hai
    [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER NETWORKS AND COMMUNICATION TECHNOLOGY (CNCT 2016), 2016, 54 : 92 - 99
  • [9] A Comprehensive Survey on Deep Learning Techniques for Digital Video Forensics
    Vigneshwaran, T.
    Velammal, B. L.
    [J]. JOURNAL OF INFORMATION & KNOWLEDGE MANAGEMENT, 2024, 23 (03)
  • [10] A COMPREHENSIVE SURVEY ON ANONYMOUS NETWORK TOPOLOGY ANALYSIS APPROACHES
    Gong, Ji
    [J]. MATERIAL ENGINEERING AND MECHANICAL ENGINEERING (MEME2015), 2016, : 220 - 227