当前位置: X-MOL 学术Secur. Commun. Netw. › 论文详情
Our official English website, www.x-mol.net, welcomes your feedback! (Note: you will need to create a separate account there.)
Analysis of Challenges in Modern Network Forensic Framework
Security and Communication Networks Pub Date : 2021-08-29 , DOI: 10.1155/2021/8871230
Sirajuddin Qureshi 1 , Jianqiang Li 1 , Faheem Akhtar 2 , Saima Tunio 1 , Zahid Hussain Khand 2 , Ahsan Wajahat 1
Affiliation  

Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many cybercrime cases using the methods of network forensics. These methods can extract intruder’s information, the nature of the intrusion, and how it can be prevented in the future. These techniques can also be used to avoid attacks in near future. Modern network forensic techniques face several challenges that must be resolved to improve the forensic methods. Some of the key challenges include high storage speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction. The details concerning these challenges are provided with potential solutions to these challenges. In general, the network forensic tools and techniques cannot be improved without addressing these challenges of the forensic network. This paper proposed a thematic taxonomy of classifications of network forensic techniques based on extensive. The classification has been carried out based on the target datasets and implementation techniques while performing forensic investigations. For this purpose, qualitative methods have been used to develop thematic taxonomy. The distinct objectives of this study include accessibility to the network infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate the information related to network attacks with minimum false-negative results. It will help organizations to investigate external and internal causes of network security attacks.

中文翻译:

现代网络取证框架挑战分析

网络取证可以是与网络安全设计相关的扩展,它通常强调避免和检测社区攻击。它涵盖了专门调查能力的必要性。当您查看设计时,这确实目前允许调查社区中的有害行为。它将帮助组织检查外部和社区,这无疑是周围。这对警察部队的调查也很重要。网络取证技术可用于识别入侵源和入侵者的位置。取证可以使用网络取证的方法解决许多网络犯罪案件。这些方法可以提取入侵者的信息、入侵的性质以及将来如何防止。这些技术还可用于在不久的将来避免攻击。现代网络取证技术面临一些必须解决的挑战,以改进取证方法。一些关键挑战包括高存储速度、充足存储空间的要求、数据完整性、数据隐私、对 IP 地址的访问以及数据提取的位置。提供了有关这些挑战的详细信息以及针对这些挑战的潜在解决方案。一般来说,如果不解决取证网络的这些挑战,就无法改进网络取证工具和技术。本文提出了一种基于广泛性的网络取证技术分类的专题分类法。分类是根据目标数据集和实施技术进行的,同时进行法医调查。以此目的,定性方法已被用于制定专题分类法。本研究的不同目标包括网络基础设施和工件的可访问性,以及使用网络取证技术收集针对入侵者的证据,以最小的假阴性结果传达与网络攻击相关的信息。它将帮助组织调查网络安全攻击的外部和内部原因。
更新日期:2021-08-29
down
wechat
bug