The Design of Network Forensics Based on Jpcap

Article Preview

Abstract:

The massive data must be captured and transferred in network forensics, Jpcap has provided convenient method for capturing and transferring network data. After capturing and filtering the network data packet, network forensics based on Jpcap analyzes protocol to primary data, and the current user behavior is judged legal or not through match results of user behavior and the crime characteristic. In order to guarantee evidence primitiveness, integrity and legal efficiency, the primary data is transferred by encryption. Simulation results show that the system can reappear the criminality completely, such as SYN flood and ARP deception, and can distinguish some new crimes.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

3356-3359

Citation:

Online since:

August 2013

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] S. Bruecknera, D. Guasparia, F. Adelsteina, J. Weeksb,Automated computer forensics training in a virtualized environment. Digital investigation. Vol. 10(2008), p.105–111.

Google Scholar

[2] N. Meghanathan, International Journal of Network Security & Its Applications, Vol . 1(2009), p.35–41.

Google Scholar

[3] E.J. Palomoa, Application of growing hierarchical SOM for visualisation of network forensics traffic data, Neural Networks, Vol. 32(2012), p.275–284.

DOI: 10.1016/j.neunet.2012.02.021

Google Scholar

[4] E. S. Pilli , Network forensic frameworks: Survey and research challenges, digital investigation, Vol. 7(2010), p.14–27.

Google Scholar

[5] C. Shields, O. Frieder, M. Maloof, A system for the proactive, continuous, and efficient collection of digital forensic evidence, Digital investigation, Vol. 8(2011), pp.3-13.

DOI: 10.1016/j.diin.2011.05.002

Google Scholar

[6] R. Beverly, S. Garfinkel, G. Cardwell, Forensic carving of network packets and associated data Structures, Digital investigation, Vol. 8(2011), pp.78-89.

DOI: 10.1016/j.diin.2011.05.010

Google Scholar

[7] B. Shebaro, J. R. Crandall , Privacy-preserving network flow recording, digital investigation, Vol. 8(2011), pp.90-100.

DOI: 10.1016/j.diin.2011.05.011

Google Scholar

[8] S. Garfinkel, A. J. Nelson, J. Young, A general strategy for differential forensic analysis, Digital Investigation, Vol. 9(2012), pp.50-59.

Google Scholar