Amarnath Mishra, Chintan Singh, Ayushi Dwivedi, Debabrata Singh, A. Biswal
{"title":"Network Forensics: An approach towards detecting Cyber Crime","authors":"Amarnath Mishra, Chintan Singh, Ayushi Dwivedi, Debabrata Singh, A. Biswal","doi":"10.1109/APSIT52773.2021.9641399","DOIUrl":null,"url":null,"abstract":"In this era of digitalization, huge amount of traffic is exchanged all over the world. Whether mobile, laptop or any other device, even the smallest of transferred data will leave a trace. This is a very good and enhancing approach towards detecting criminal activities by analyzing the network traffic of the source computer. Network data is however more unpredictable and volatile as compared to the preserved data. Investigators mostly analyze the firewall, packet transfer and other details. Generally, there are two type of systems used to analyze the network traffic like “catch me if you can” in which packets are captured and stored in the system in a batch mode or “stop, look and listen” where the data is analyzed sequentially in memory and only useful data is stored for further. This study can efficiently be done by packet analyzer which is an open source tool built to study the packets and various aspects of their behavior. The sole purpose of this paper is to understand how important network forensic is and how can this packet analyzer can help in finding out the suspicious packets in network and hence providing secure network and also conducting network forensics in various aspects such as port filtering, following up a packet, collecting raw data, tracing up a network threat, converting channels etc.","PeriodicalId":436488,"journal":{"name":"2021 International Conference in Advances in Power, Signal, and Information Technology (APSIT)","volume":"14 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 International Conference in Advances in Power, Signal, and Information Technology (APSIT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/APSIT52773.2021.9641399","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
Abstract
In this era of digitalization, huge amount of traffic is exchanged all over the world. Whether mobile, laptop or any other device, even the smallest of transferred data will leave a trace. This is a very good and enhancing approach towards detecting criminal activities by analyzing the network traffic of the source computer. Network data is however more unpredictable and volatile as compared to the preserved data. Investigators mostly analyze the firewall, packet transfer and other details. Generally, there are two type of systems used to analyze the network traffic like “catch me if you can” in which packets are captured and stored in the system in a batch mode or “stop, look and listen” where the data is analyzed sequentially in memory and only useful data is stored for further. This study can efficiently be done by packet analyzer which is an open source tool built to study the packets and various aspects of their behavior. The sole purpose of this paper is to understand how important network forensic is and how can this packet analyzer can help in finding out the suspicious packets in network and hence providing secure network and also conducting network forensics in various aspects such as port filtering, following up a packet, collecting raw data, tracing up a network threat, converting channels etc.