Introduction
•Network forensics is capture, recording, and analysis of network packets in order to
determine the source of network security attacks.
•The major goal of network forensics is to collect evidence.
• It tries to analyse network traffic data, which is collected from different sites and different
network equipments, such as firewalls and IDS.
•A generic network forensic examination includes the following steps:
1. Identification
2.Preservation
3.Collection
4.Examination
5.Analysis
6.Presentation
7.Incident response
Intrusion Detection System
●The network intruder or attacker has traditionally been able
to boast of a certain amount of skill, unlike the cyber scam
artist who needs to know only enough about computers to
send mass email or the child pornographer whose technical
knowhow is limited to uploading and downloading files.
●Intrusion detection systems (IDSs) help information systems
prepare for and deal with attacks. They accomplish this by
collecting information from a variety of systems and network
sources, and then analysing the information for possible
security problems.
Analyzing Network Traffic
•Network forensics analysis, like any other forensic investigation, presents many challenges
•The first challenge is related to traffic data sniffing.
• Depending on the network configuration and security measures where the sniffer is deployed,
the tool may not capture all desired traffic data.
• To solve this issue, the network administrator should use a span port on network devices in
multiple places of the network.
•One tedious task in the network forensic is the data correlation.
• Data correlation can be either causal or temporal.
• For the latter case, timestamps should be logged as well.
•
Network-Based Evidence
Capturing network communications is a serious and essential step when examining
suspected crimes or exploitations.
1.What is Network-Based Evidence?
Collecting network-based evidence involves setting up a computer system to carry out
network monitoring, setting up the network monitor, and assessing the efficiency of the
network monitor.
•
2.What are the Goals of Network Monitoring?
Network monitoring is not planned to prevent attacks. Instead, it permits investigators to
complete a number of tasks:
• Confirm or dismiss suspicions surrounding an alleged computer security incident.
•Collect additional evidence and information.
•Verify the scope of a settlement.
•Identify additional parties involved.
•Determine a timeline of events occurring on the network.
•Make sure of the compliance with a desired activity.
3.Types of Network Monitoring
Network monitoring consists of several different types of data collection:
•Event monitoring:
Event monitoring is based on rules or thresholds working on the network monitoring
platform.
•Trap and trace monitoring:
Noncontent observing records the session or transaction data briefing the network
activity. Law enforcement refers to such noncontent observing as a pen register or a trap
and trace.
• Full content monitoring:
Full content observing produces data that contains the raw packets collected from the
wire. It offers the highest fidelity, because it represents the actual communication passed
between computers on a network.
Evidence Handling
•There should be some rules and regulations for performing forensic investigation.
• Rule 1: An examination should never be performed on the original media.
• Rule 2: A copy is made onto forensically sterile media. New media should always be used if
available.
• Rule 3: The copy of the evidence must be an exact, bit-by-bit copy (Sometimes referred to as
a bit-stream copy).
• Rule 4: The computer and the data on it must be protected during the acquisition of the
media to ensure that the data is not modified (Use a write blocking device when
possible).
• Rule 5: The examination must be conducted in such a way as to prevent any modification of
the evidence.
• Rule 6: The chain of the custody of all evidence must be clearly maintained to provide an
audit log of whom might have accessed the evidence and at what time.
Investigating Routers
•Routers can be tools used by investigators as they can be targets of attack, stepping stones for
attackers.
•To allow investigators to resolve complex network incidents, routers can provide valuable
information and evidence.
•Routers lack the data storage and functionality of many of the other technologies we have
examined in previous chapters, and thus they are less likely to be the ultimate target of
attacks.
•During network penetrations, routers are more likely to be springboards for attackers
•The information stored on routers, such as passwords, routing tables, and network block
information, makes routers a valuable first step for attackers bent on penetrating internal
networks.