Network Forensics: An approach towards detecting Cyber Crime

Amarnath Mishra, Chintan Singh, Ayushi Dwivedi, Debabrata Singh, A. Biswal
{"title":"Network Forensics: An approach towards detecting Cyber Crime","authors":"Amarnath Mishra, Chintan Singh, Ayushi Dwivedi, Debabrata Singh, A. Biswal","doi":"10.1109/APSIT52773.2021.9641399","DOIUrl":null,"url":null,"abstract":"In this era of digitalization, huge amount of traffic is exchanged all over the world. Whether mobile, laptop or any other device, even the smallest of transferred data will leave a trace. This is a very good and enhancing approach towards detecting criminal activities by analyzing the network traffic of the source computer. Network data is however more unpredictable and volatile as compared to the preserved data. Investigators mostly analyze the firewall, packet transfer and other details. Generally, there are two type of systems used to analyze the network traffic like “catch me if you can” in which packets are captured and stored in the system in a batch mode or “stop, look and listen” where the data is analyzed sequentially in memory and only useful data is stored for further. This study can efficiently be done by packet analyzer which is an open source tool built to study the packets and various aspects of their behavior. The sole purpose of this paper is to understand how important network forensic is and how can this packet analyzer can help in finding out the suspicious packets in network and hence providing secure network and also conducting network forensics in various aspects such as port filtering, following up a packet, collecting raw data, tracing up a network threat, converting channels etc.","PeriodicalId":436488,"journal":{"name":"2021 International Conference in Advances in Power, Signal, and Information Technology (APSIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference in Advances in Power, Signal, and Information Technology (APSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSIT52773.2021.9641399","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

Abstract

In this era of digitalization, huge amount of traffic is exchanged all over the world. Whether mobile, laptop or any other device, even the smallest of transferred data will leave a trace. This is a very good and enhancing approach towards detecting criminal activities by analyzing the network traffic of the source computer. Network data is however more unpredictable and volatile as compared to the preserved data. Investigators mostly analyze the firewall, packet transfer and other details. Generally, there are two type of systems used to analyze the network traffic like “catch me if you can” in which packets are captured and stored in the system in a batch mode or “stop, look and listen” where the data is analyzed sequentially in memory and only useful data is stored for further. This study can efficiently be done by packet analyzer which is an open source tool built to study the packets and various aspects of their behavior. The sole purpose of this paper is to understand how important network forensic is and how can this packet analyzer can help in finding out the suspicious packets in network and hence providing secure network and also conducting network forensics in various aspects such as port filtering, following up a packet, collecting raw data, tracing up a network threat, converting channels etc.
网络取证:一种检测网络犯罪的方法
在这个数字化的时代,世界各地都有巨大的流量交换。无论是手机、笔记本电脑还是任何其他设备,即使是最小的传输数据也会留下痕迹。这是通过分析源计算机的网络流量来检测犯罪活动的一种非常好的增强方法。然而,与保存的数据相比,网络数据更具不可预测性和波动性。调查人员主要分析防火墙、数据包传输和其他细节。一般来说,有两种类型的系统用于分析网络流量,如“如果可以,请抓我”,其中数据包被捕获并以批处理模式存储在系统中,或者“停止,查看和侦听”,其中数据在内存中顺序分析,仅存储有用的数据以供进一步使用。数据包分析器是一个开源工具,用于研究数据包及其行为的各个方面,可以有效地完成这项研究。本文的唯一目的是了解网络取证的重要性,以及数据包分析器如何帮助发现网络中的可疑数据包,从而提供安全的网络,并在端口过滤、跟踪数据包、收集原始数据、跟踪网络威胁、转换通道等各个方面进行网络取证。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信