Practical Digital Forensics: A Guide for Windows and Linux Users

Network Forensics

Author(s): Akashdeep Bhardwaj*, Pradeep Singh* and Ajay Prasad *

Pp: 147-180 (34)

DOI: 10.2174/9789815305579124010008

* (Excluding Mailing and Handling)

Abstract

In the ever-expanding digital landscape, network security breaches pose a significant threat. Network forensics emerges as a vital weapon in the cybersecurity arsenal, enabling the investigation and analysis of network traffic to uncover evidence of malicious activity. This chapter delves into the core principles of network forensics, outlining the four-stage process: acquisition, preservation, analysis, and reporting. It equips readers with the knowledge to identify and collect various types of network evidence, including packet headers, network logs, and flow data. The chapter explores a range of open-source tools readily available on platforms like GitHub, empowering readers with the ability to capture and analyze network traffic using Wireshark and Bro. Furthermore, it acknowledges the inherent challenges faced in network forensics, such as the fleeting nature of network data and the growing use of encryption. To ensure the legality and effectiveness of investigations, the chapter emphasizes the importance of adhering to relevant laws and regulations. By understanding these essential concepts, readers gain valuable insights into how network forensics empowers cybersecurity professionals to combat digital crimes and safeguard network security.


Keywords: Digital forensics, Network forensics, Network traffic analysis, Opensource tools, Security onion, Wireshark.

Related Journals
Related Books
© 2024 Bentham Science Publishers | Privacy Policy