SlideShare a Scribd company logo
1 of 4
Download to read offline
IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 1860
Abstract—Network Forensics is scientifically proven
technique to accumulate, perceive, identify, examine,
associate, analyse and document digital evidence from
multiple systems for the purpose of uncovering the fact of
attacks and other problem incident as well as performing the
action to recover from the attack. Many systems are
proposed for designing the network forensic systems. In this
paper we have prepared comparative analysis of various
models based on different techniques.
I. INTRODUCTION
The firewall and IDS are used to handle the network attacks,
but they acquire many limitations like they can’t protect
systems against attacks that bypass them, they can’t protect
the systems against internal threats, and they are not capable
of perceiving new attacks. The a) Analysis b) Examination
and c) Reconstruction of an attack cannot be based on the
firewall logs and IDS alerts.
The preventing mechanism performs investigation
and also traces back the source of attack and prosecutes the
skilful attackers. Such preventing mechanism is provided by
Network forensic.
Network forensics is the science that requires the
network setup i.e. network with security mechanisms and
policies that deals with perceiving, accumulating, storage
and analysis of network traffic, if there is an anomaly in the
traffic and if the anomaly can be an attack, if it is an attack,
then rule information and investigation is performed. At the
end action is performed to implement the rule and restrict
the future attacks.
Network forensics is not another term for network
security [1]. It is an extended phase of network security as
the data for forensic analysis are accumulated from security
products like firewalls and IDS. The outcomes of this data
analysis are utilized for the further investigation of attacks.
Network security protects system against attack while
network forensic focuses on recording evidences of the
attacks. Network security products are generalized and look
for possible harmful behaviours. This monitoring is a
continuous process and is performed all through the day.
But, network forensics involves post-mortem investigation
of the attack.
Network forensics is a natural extension of
computer forensics [2]. Computer forensics involves
preservation, identification, extraction, documentation, and
interpretation of computer data. Network forensics evolved
as a response to the hacker community and involves capture,
recording, and analysis of network events in order to
discover the source of attacks.
II. BACKGROUND
A. Network protection approaches
Networked computers are playing very important roles in
our daily life as well as in our business. As nodes of the vast
network, the networked computers are more vulnerable than
ever before. Network protection approaches are required to
protect the networked computer. These approaches can be
classified in two categories: Defensive Mechanism and
Preventive Mechanism.
1) Defensive Mechanism
Defensive mechanisms are used to prevent the network from
attacks. These types of approaches typically find out
network vulnerabilities and then block any malicious
communication from outside.
Current solutions for defensive approach include
Firewall and Intrusion Detection System (IDS); former is
used for protection and the later for recognition. Firewalls
control traffic that enters a network and leaves a network
based on source and destination address and port numbers. It
filters malicious network traffic according to the firewall
rules. But, it is difficult to find update the signatures of all
vulnerabilities as new vulnerabilities will always keep
occurring. Firewalls are also limited on the amount of state
available and their knowledge of the hosts receiving the
content. The other shortcomings of firewalls are:
1) It cannot protect against attacks that bypass it, such as a
dial–in capability.
2) It is at the network interface and does not protect
against internal threats.
3) It cannot protect against the transfer of virus–laden files
and programs.
Intrusion Detection System (IDS) [3] are primarily for
learning, perceiving and reporting attacks as they happen in
real time and have no evidence gathering feature. IDSs are
of two types – signature based (misuse) recognition and
statistical based (anomaly) recognition. Pattern matching is
done in signature based IDS to perceive intrusion signatures.
It cannot perceive new attacks but has a low false positive
rate. Anomaly based IDS does activity monitoring and is
able to perceive new attacks but has higher false positive
rate. The other shortcomings of IDS are:
1) They increase the complexity of network security
management.
2) They must know a priori the signature or anomaly
pattern.
B. Preventive Mechanism
As the defensive approaches have limitations, the other
approach of network protection becomes more important
[4]. This approach does not block the network crimes but
accumulate enough evidence of these crimes. Network
criminals will be punished for their illegal actions thereby
Comparative Analysis: Network Forensic Systems
Vishvendu M. Bhatt1
Prof. R. K. Somani2
Prof. Pankaj Singh Parihar3
1, 2, 3
Department of Computer Science & Engineering
1, 2, 3
Institute of Technology & Management, Bhilwara (RTU), Rajasthan, India,
Comparative Analysis: Network Forensic Systems
(IJSRD/Vol. 1/Issue 9/2013/0043)
All rights reserved by www.ijsrd.com 1861
providing a deterrent to online crime. These methods are
called network forensics.
C. Network forensics
Network forensics deals with the capture and analysis of the
trace and log data of network intrusions from the current
network security products and provides information to
characterize intrusion or misbehaviour features. The power
of various network forensic analysis tools available as open
source can be integrated so that the investigator can have an
edge over the attacker. The storage to handle large volumes
of data and computing power to analyse the same is now
available at cheaper rate. An effective network forensic
system will increase the cost of the network crimes for the
attacker and thus reduce network crime rates.
As it was concerned before, there are two major
purposes for network forensics: one is to enhance network
security; the other is to get evidence for legal issues.
Therefore, there are two types of network forensics. In some
circumstances, the focus of network forensics is only for
security enhancement. The analysis of data is to discover
some characters of the network attacking and to utilize them
guiding the strategies and managements of firewall or
intrusion detection system. Thus, they can be captured and
obtained in the process without rigid legal principles. We
call it GNF - General Network Forensics. The other is SNF–
Strict Network Forensics, which is the intersection between
the computer science and forensics science [5]. It has strict
forensics purpose and its result can be used as evidence. It
has more rigid criteria in the requirement of the legal
validation than the GNF. In SNF processes include many
steps that must satisfy the legal principles. For ensuring
these legal requirements in the process, some computer and
network techniques need be utilized.
We describe the conceptual model of NF as a set of
processes, that is:
NF {Pi [Tj, Lk] | i, j, k 1, 2}
NF: Network Forensics;
Pi: Processes;
Tj: Techniques/Method/Approaches/Systems/Tools;
Lk: Legal principles
This model means network forensics is not a single
product, system, or tool set, but a process involving many
products, systems and tools. The more rigid legal principles
satisfied, the more rigid evidence obtained. Different
purpose of network forensics needs different requirement of
legal principles. If there are more satisfactions of the legal
principles, the GNF will become to SNF. SNF always need
the tools and manual behaviour with the authority, which are
provided by the official authority originations. In current
conditions, with no general agreements in the cyber law and
the delay of the respective rules, the GNF may maintain a
long time, not only in law enforcement communities but
also in the civil or enterprise communities.
In other words, GNF may have more non-law
enforcement applications than SNF, especially if the
attackers are from the different countries or in the conditions
that there is no law to punish the attacker even if you get the
evidence. In this circumstance, perusing the rigid evidence
seems to be wasteful, and then perusing security intelligence
or knowledge from the attacking data seems to be more
useful.
There are two ways of developing a network
forensic process. One way is to reactively use traditional
security products like firewalls & intrusion detection
systems, analyse the data and investigate. The other way is
to proactively lure the attacker by means of honeynets [6] or
greynets [7] to observe the attack patterns and create
behavioural profiles of attackers and their exploitation
mechanisms.
Honeynet is a highly controlled network of
computers, designed in such a way that they will be attacked
and all activity is captured.
A variant of a network, consisting of a region of IP
address space that is sparsely populated with 'dark net'
addresses interspersed with active (or 'lit') IP addresses.
D. Network forensics systems can be of two kinds [8]:
1) “Catch-it-as-you-can” systems, in which all packets
passing through certain traffic point are captured and
written to storage with analysis being done
subsequently in batch mode. This approach requires
large amounts of storage.
2) “Stop, look and listen” systems, in which each packet is
analysed in a rudimentary way in memory and only
certain information saved for future analysis. This
approach requires a faster processor to keep up with
incoming traffic.
E. Network forensic analysis tools
Network Forensic Analysis Tools (NFATs) [9] allow
administrators to monitor the networks, gather all
information about anomalous traffic, and help in network
forensics. NFATs synergizes with IDSs and firewalls
making preserving long term record of network traffic
possible and allowing quick analysis of trouble spots
identified by IDSs and firewalls.
A few functions of an NFAT
 Network traffic recording and analysis
 Network performance evaluation
 Data aggregation from multiple sources
 Anomaly recognition
 Determination of network protocols in use
 Recognition of employee misuse of resources
 Security investigations and incident response
 Intellectual property protection
1) The commercial NFATs available in the market are –
Net Intercept, NetPerceiveor, Net Flow, Silent Runner,
EnCase, and Visual Route.
2) The open source / freeware NFATs are – TCPDump /
Libpcap / WinDump, Wireshark , Snort , Nmap , P0f ,
Tcpstat , Tcptrace, Tcpflow
3) The following commands are inbuilt in many modern
operating systems and are useful for Network Forensics
– Nslookup, Traceroute, Netstat, Nbtstat, Whois, Ping,
Wget, Dig.
III. NETWORK FORENSICS SYSTEM
Generic Network forensic System includes the following
steps [10]:
1) Identification
2) Preservation
3) Accumulation
Comparative Analysis: Network Forensic Systems
(IJSRD/Vol. 1/Issue 9/2013/0043)
All rights reserved by www.ijsrd.com 1862
4) Examination
5) Analysis
6) Presentation
7) Incident Response.
A. Identification
Recognizing an incident from indicators and determining its
type. This is not explicitly within the field of forensics, but
significant because it impacts other steps [11].
Preservation – isolate, secure and preserve the state
of physical and digital evidence. This includes preventing
people from using the digital device or allowing other
electromagnetic devices to be used within an affected radius.
Accumulation – record the physical scene and duplicate
digital evidence using standardized and accepted
procedures.
B. Examination
In-depth systematic search of evidence relating to the
suspected crime. This focuses on identifying and locating
evidence which can be potential, possibly within locations
which are unconventional. Construct detailed documentation
for analysis.
C. Analysis
Determine significance, reconstruct fragments of data and
draw conclusions based on evidence found. It may take
several iterations of examination and analysis to support a
crime theory. The distinction of analysis is that it may not
require high technical skills to perform and thus more
people can work on this case.
D. Presentation
Summarize and provide explanation of conclusions. This
should be written in a layperson’s terms using abstracted
terminology. All abstracted terminology should reference
the specific details.
Incident Response – The response to crime or
intrusion perceived is initiated based on the information
gathered to validate and assess the incident.
This work analyses a process model for Network Forensic
that meets the following requirements:
1) The model must be based on existing theory for
physical crime investigations.
2) The model must be practical and follow the same steps
that an actual investigation would take.
3) The model must be general with respect to technology
and not be constrained to current products and
procedures.
4) The model must be specific enough that general
technology requirements for each phase can be
developed.
5) The model has to be abstract that can apply to law
enforcement investigations, corporate investigations,
and incident response.
A. Distributed systems based Network Forensic System
Internet and LANs are distributed in nature and networks
attack events are logged in clients at various locations.
There is a need to these logs, fuse them and analyse on a
central server. A general scheme for the frameworks is
shown in Figure 1 [5].
Fig. 1: A general schema for Distributed Network Forensic
Systems [5]
B. Soft computing based Network forensic System
The soft computing implementations are used to analyse
captured data and classify the attack data. Neural network
and Fuzzy tools are used for validation of attack occurrence.
A general scheme for the fuzzy logic based system is shown
in Figure 2[4].
Fig. 2: A general scheme for soft computing based network
forensics system [4]
Comparative Analysis: Network Forensic Systems
(IJSRD/Vol. 1/Issue 9/2013/0043)
All rights reserved by www.ijsrd.com 1863
C. Honeypot based Network forensic system
Honeypot based system is used to attract the attackers so
that their process methodology can be observed and
analysed to improve defence mechanisms.
IV. COMPARATIVE ANALYSIS
In distributed model the capturing of packet is on multiple
hosts while in Soft computing model it is on the single host.
Distributed model decision making is based on statistical
data while in it is based on non-statistical data. Time and
cost involve in forensic analysis is less in soft computing
model compare to distributed model. In soft computing
model, if the rules are such that we can differentiate between
an attack and legitimate traffic then we get desirable results.
In distributed model it is very hard to differentiate between
an attack and legitimate traffic, so desirable results are not
possible every time. All network traffic is captured in
distributed model; while in soft computing approach some
data may be lost due to centralize capturing system. Incident
response can be easily handled in soft computing model
compare to distributed model.
Honeypot based model is generally used to
improve the defensive mechanisms because they attract the
attackers so that the process methodology can be observed
and analysed. While distributed model and soft computing
based model are mainly used for the preventive
mechanisms.
Honeypot based model cannot be used for
investigation purpose, while distributed based model and
soft computing model can be used for investigation because
the evidence gathering facility is available in these models.
V. CONCLUSION
Network forensics ensures investigation of the attacks by
tracing the attack back to the source and attributing the
crime to a person, host or a network. It has the ability to
predict future attacks by constructing attack patterns from
existing traces of intrusion data. The incident response to an
attack is much faster. The preparation of authentic evidence
can be admissible into a legal system is going to be
facilitated.
We have analysed and compared different
approaches used for network forensic system. We found that
no one covers all characteristic of network forensic system.
Distributed model is efficient in capturing the complete
network traffic. Soft computing model is efficient in
differentiating the attack and legitimate traffic. Honey pot
model is helpful in improving the defensive mechanism.
REFERENCES
[1] V. Broucek and P. Turner, “Forensic computing:
Developing a conceptual approach for an emerging
academic discipline,” 5th Australian Security
Research Symposium, July, 2001.
[2] H. Berghel, “The discipline of Internet forensics,”
Communications of the ACM, vol. 46, no. 8, Aug.,
2003, pp. 15–20.
[3] S. Axelsson, “Intrusion Detection Systems: A Survey
and Taxonomy,” Dept. of Computer Engineering,
Chalmers University of Technology, Mar., 2000.
[4] Z. Liu and D. Feng, “Incremental Fuzzy Decision
Tree-Based Network Forensic System,” Proc. Int’l
Conf. Computational Intelligence and Security (CIS
2005), LNAI 3802, Springer, 2005, pp. 995-1002.
[5] W. Ren and H. Jin, “Distributed Agent-based Real
Time Network Intrusion Forensics System
Architecture Design,” Proc. IEEE 19th Int’l. Conf.
Advanced Information Networking Applications
(AINA 2005), pp. 177–182.
[6] L. Spitzner, “Honeypots: Definitions and Value of
Honeypots”, http://www.trackinghackers.com/papers/
honeypots.html
[7] L. Spitzner, “Know Your Enemy: Defining Virtual
Honeynets”, http://www.honeynet.org
[8] S. Garfinkel, “Network Forensics: Tapping the
Internet” http://www.oreillynet.com/pub/a/network/
2002/04/26/ nettap.html
[9] V. Broucek and P. Turner, “Forensic computing:
Developing a conceptual approach for an emerging
academic disciple Australian Security Research
Symposium, July, 2001.
[10] Emmanuel S. Pilli “Network forensic frameworks:
Survey and research challenges” Journal of Elsevier
Ltd. 2010.
[11] Bura.brunel.ac.uk/bitstream/2438/7651/1/Full text
Thesis.pdf by K Shanmugam - 2011

More Related Content

What's hot

Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining conceptsJaideep Ghosh
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...ijsptm
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningeSAT Publishing House
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsEditor IJCATR
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...IJNSA Journal
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...ijceronline
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013ijcsbi
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemAM Publications
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningPritesh Ranjan
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...IJNSA Journal
 

What's hot (18)

Network security using data mining concepts
Network security using data mining conceptsNetwork security using data mining concepts
Network security using data mining concepts
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
NETWORK INTRUSION DETECTION AND COUNTERMEASURE SELECTION IN VIRTUAL NETWORK (...
 
Defense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learningDefense mechanism for d do s attack through machine learning
Defense mechanism for d do s attack through machine learning
 
Network forensics1
Network forensics1Network forensics1
Network forensics1
 
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention SystemsLayered Approach for Preprocessing of Data in Intrusion Prevention Systems
Layered Approach for Preprocessing of Data in Intrusion Prevention Systems
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
EFFICACY OF ATTACK DETECTION CAPABILITY OF IDPS BASED ON ITS DEPLOYMENT IN WI...
 
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...IJCER (www.ijceronline.com) International Journal of computational Engineerin...
IJCER (www.ijceronline.com) International Journal of computational Engineerin...
 
180 184
180 184180 184
180 184
 
Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013Vol 6 No 1 - October 2013
Vol 6 No 1 - October 2013
 
Ak03402100217
Ak03402100217Ak03402100217
Ak03402100217
 
A Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection SystemA Study on Data Mining Based Intrusion Detection System
A Study on Data Mining Based Intrusion Detection System
 
Analysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data MiningAnalysis and Design for Intrusion Detection System Based on Data Mining
Analysis and Design for Intrusion Detection System Based on Data Mining
 
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
HIERARCHICAL DESIGN BASED INTRUSION DETECTION SYSTEM FOR WIRELESS AD HOC SENS...
 
06686259 20140405 205404
06686259 20140405 20540406686259 20140405 205404
06686259 20140405 205404
 

Similar to Comparative Analysis: Network Forensic Systems

INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTIJMIT JOURNAL
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...IJNSA Journal
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...ClaraZara1
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkIOSR Journals
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IJNSA Journal
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemEswar Publications
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYJournal For Research
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithmijtsrd
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical HackingJennifer Wood
 
D03302030036
D03302030036D03302030036
D03302030036theijes
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkIOSR Journals
 
A Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkA Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkAudrey Britton
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMIJNSA Journal
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 

Similar to Comparative Analysis: Network Forensic Systems (20)

INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORTINTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
INTRUSION DETECTION SYSTEM USING CUSTOMIZED RULES FOR SNORT
 
1776 1779
1776 17791776 1779
1776 1779
 
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
HYBRID ARCHITECTURE FOR DISTRIBUTED INTRUSION DETECTION SYSTEM IN WIRELESS NE...
 
Es34887891
Es34887891Es34887891
Es34887891
 
Kx3419591964
Kx3419591964Kx3419591964
Kx3419591964
 
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
Network Intrusion Detection And Countermeasure Selection In Virtual Network (...
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless NetworkA Modular Approach To Intrusion Detection in Homogenous Wireless Network
A Modular Approach To Intrusion Detection in Homogenous Wireless Network
 
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
IMPROVED IDS USING LAYERED CRFS WITH LOGON RESTRICTIONS AND MOBILE ALERTS BAS...
 
Bt33430435
Bt33430435Bt33430435
Bt33430435
 
Survey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection SystemSurvey on Host and Network Based Intrusion Detection System
Survey on Host and Network Based Intrusion Detection System
 
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEYSECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
SECURITY THREATS IN SENSOR NETWORK IN IOT: A SURVEY
 
Optimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning AlgorithmOptimized Intrusion Detection System using Deep Learning Algorithm
Optimized Intrusion Detection System using Deep Learning Algorithm
 
Certified Ethical Hacking
Certified Ethical HackingCertified Ethical Hacking
Certified Ethical Hacking
 
D03302030036
D03302030036D03302030036
D03302030036
 
Detecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian NetworkDetecting Anomaly IDS in Network using Bayesian Network
Detecting Anomaly IDS in Network using Bayesian Network
 
A Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer NetworkA Review Of Intrusion Detection System In Computer Network
A Review Of Intrusion Detection System In Computer Network
 
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHMAN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
AN IMPLEMENTATION OF INTRUSION DETECTION SYSTEM USING GENETIC ALGORITHM
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Ijnsa050214
Ijnsa050214Ijnsa050214
Ijnsa050214
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Gridijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Thingsijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Lifeijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Lifeijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learningijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation Systemijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigeratorijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logsijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Trackingijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparatorsijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...Call Girls in Nagpur High Profile
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxupamatechverse
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Christo Ananth
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlysanyuktamishra911
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingrknatarajan
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)Suman Mia
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).pptssuser5c9d4b1
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performancesivaprakash250
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduitsrknatarajan
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 

Recently uploaded (20)

Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...Booking open Available Pune Call Girls Koregaon Park  6297143586 Call Hot Ind...
Booking open Available Pune Call Girls Koregaon Park 6297143586 Call Hot Ind...
 
Introduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptxIntroduction to IEEE STANDARDS and its different types.pptx
Introduction to IEEE STANDARDS and its different types.pptx
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Meera Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
KubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghlyKubeKraft presentation @CloudNativeHooghly
KubeKraft presentation @CloudNativeHooghly
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and workingUNIT-V FMM.HYDRAULIC TURBINE - Construction and working
UNIT-V FMM.HYDRAULIC TURBINE - Construction and working
 
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)Software Development Life Cycle By  Team Orange (Dept. of Pharmacy)
Software Development Life Cycle By Team Orange (Dept. of Pharmacy)
 
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
247267395-1-Symmetric-and-distributed-shared-memory-architectures-ppt (1).ppt
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service NashikCall Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
Call Girls Service Nashik Vaishnavi 7001305949 Independent Escort Service Nashik
 
UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 

Comparative Analysis: Network Forensic Systems

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 1, Issue 9, 2013 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 1860 Abstract—Network Forensics is scientifically proven technique to accumulate, perceive, identify, examine, associate, analyse and document digital evidence from multiple systems for the purpose of uncovering the fact of attacks and other problem incident as well as performing the action to recover from the attack. Many systems are proposed for designing the network forensic systems. In this paper we have prepared comparative analysis of various models based on different techniques. I. INTRODUCTION The firewall and IDS are used to handle the network attacks, but they acquire many limitations like they can’t protect systems against attacks that bypass them, they can’t protect the systems against internal threats, and they are not capable of perceiving new attacks. The a) Analysis b) Examination and c) Reconstruction of an attack cannot be based on the firewall logs and IDS alerts. The preventing mechanism performs investigation and also traces back the source of attack and prosecutes the skilful attackers. Such preventing mechanism is provided by Network forensic. Network forensics is the science that requires the network setup i.e. network with security mechanisms and policies that deals with perceiving, accumulating, storage and analysis of network traffic, if there is an anomaly in the traffic and if the anomaly can be an attack, if it is an attack, then rule information and investigation is performed. At the end action is performed to implement the rule and restrict the future attacks. Network forensics is not another term for network security [1]. It is an extended phase of network security as the data for forensic analysis are accumulated from security products like firewalls and IDS. The outcomes of this data analysis are utilized for the further investigation of attacks. Network security protects system against attack while network forensic focuses on recording evidences of the attacks. Network security products are generalized and look for possible harmful behaviours. This monitoring is a continuous process and is performed all through the day. But, network forensics involves post-mortem investigation of the attack. Network forensics is a natural extension of computer forensics [2]. Computer forensics involves preservation, identification, extraction, documentation, and interpretation of computer data. Network forensics evolved as a response to the hacker community and involves capture, recording, and analysis of network events in order to discover the source of attacks. II. BACKGROUND A. Network protection approaches Networked computers are playing very important roles in our daily life as well as in our business. As nodes of the vast network, the networked computers are more vulnerable than ever before. Network protection approaches are required to protect the networked computer. These approaches can be classified in two categories: Defensive Mechanism and Preventive Mechanism. 1) Defensive Mechanism Defensive mechanisms are used to prevent the network from attacks. These types of approaches typically find out network vulnerabilities and then block any malicious communication from outside. Current solutions for defensive approach include Firewall and Intrusion Detection System (IDS); former is used for protection and the later for recognition. Firewalls control traffic that enters a network and leaves a network based on source and destination address and port numbers. It filters malicious network traffic according to the firewall rules. But, it is difficult to find update the signatures of all vulnerabilities as new vulnerabilities will always keep occurring. Firewalls are also limited on the amount of state available and their knowledge of the hosts receiving the content. The other shortcomings of firewalls are: 1) It cannot protect against attacks that bypass it, such as a dial–in capability. 2) It is at the network interface and does not protect against internal threats. 3) It cannot protect against the transfer of virus–laden files and programs. Intrusion Detection System (IDS) [3] are primarily for learning, perceiving and reporting attacks as they happen in real time and have no evidence gathering feature. IDSs are of two types – signature based (misuse) recognition and statistical based (anomaly) recognition. Pattern matching is done in signature based IDS to perceive intrusion signatures. It cannot perceive new attacks but has a low false positive rate. Anomaly based IDS does activity monitoring and is able to perceive new attacks but has higher false positive rate. The other shortcomings of IDS are: 1) They increase the complexity of network security management. 2) They must know a priori the signature or anomaly pattern. B. Preventive Mechanism As the defensive approaches have limitations, the other approach of network protection becomes more important [4]. This approach does not block the network crimes but accumulate enough evidence of these crimes. Network criminals will be punished for their illegal actions thereby Comparative Analysis: Network Forensic Systems Vishvendu M. Bhatt1 Prof. R. K. Somani2 Prof. Pankaj Singh Parihar3 1, 2, 3 Department of Computer Science & Engineering 1, 2, 3 Institute of Technology & Management, Bhilwara (RTU), Rajasthan, India,
  • 2. Comparative Analysis: Network Forensic Systems (IJSRD/Vol. 1/Issue 9/2013/0043) All rights reserved by www.ijsrd.com 1861 providing a deterrent to online crime. These methods are called network forensics. C. Network forensics Network forensics deals with the capture and analysis of the trace and log data of network intrusions from the current network security products and provides information to characterize intrusion or misbehaviour features. The power of various network forensic analysis tools available as open source can be integrated so that the investigator can have an edge over the attacker. The storage to handle large volumes of data and computing power to analyse the same is now available at cheaper rate. An effective network forensic system will increase the cost of the network crimes for the attacker and thus reduce network crime rates. As it was concerned before, there are two major purposes for network forensics: one is to enhance network security; the other is to get evidence for legal issues. Therefore, there are two types of network forensics. In some circumstances, the focus of network forensics is only for security enhancement. The analysis of data is to discover some characters of the network attacking and to utilize them guiding the strategies and managements of firewall or intrusion detection system. Thus, they can be captured and obtained in the process without rigid legal principles. We call it GNF - General Network Forensics. The other is SNF– Strict Network Forensics, which is the intersection between the computer science and forensics science [5]. It has strict forensics purpose and its result can be used as evidence. It has more rigid criteria in the requirement of the legal validation than the GNF. In SNF processes include many steps that must satisfy the legal principles. For ensuring these legal requirements in the process, some computer and network techniques need be utilized. We describe the conceptual model of NF as a set of processes, that is: NF {Pi [Tj, Lk] | i, j, k 1, 2} NF: Network Forensics; Pi: Processes; Tj: Techniques/Method/Approaches/Systems/Tools; Lk: Legal principles This model means network forensics is not a single product, system, or tool set, but a process involving many products, systems and tools. The more rigid legal principles satisfied, the more rigid evidence obtained. Different purpose of network forensics needs different requirement of legal principles. If there are more satisfactions of the legal principles, the GNF will become to SNF. SNF always need the tools and manual behaviour with the authority, which are provided by the official authority originations. In current conditions, with no general agreements in the cyber law and the delay of the respective rules, the GNF may maintain a long time, not only in law enforcement communities but also in the civil or enterprise communities. In other words, GNF may have more non-law enforcement applications than SNF, especially if the attackers are from the different countries or in the conditions that there is no law to punish the attacker even if you get the evidence. In this circumstance, perusing the rigid evidence seems to be wasteful, and then perusing security intelligence or knowledge from the attacking data seems to be more useful. There are two ways of developing a network forensic process. One way is to reactively use traditional security products like firewalls & intrusion detection systems, analyse the data and investigate. The other way is to proactively lure the attacker by means of honeynets [6] or greynets [7] to observe the attack patterns and create behavioural profiles of attackers and their exploitation mechanisms. Honeynet is a highly controlled network of computers, designed in such a way that they will be attacked and all activity is captured. A variant of a network, consisting of a region of IP address space that is sparsely populated with 'dark net' addresses interspersed with active (or 'lit') IP addresses. D. Network forensics systems can be of two kinds [8]: 1) “Catch-it-as-you-can” systems, in which all packets passing through certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage. 2) “Stop, look and listen” systems, in which each packet is analysed in a rudimentary way in memory and only certain information saved for future analysis. This approach requires a faster processor to keep up with incoming traffic. E. Network forensic analysis tools Network Forensic Analysis Tools (NFATs) [9] allow administrators to monitor the networks, gather all information about anomalous traffic, and help in network forensics. NFATs synergizes with IDSs and firewalls making preserving long term record of network traffic possible and allowing quick analysis of trouble spots identified by IDSs and firewalls. A few functions of an NFAT  Network traffic recording and analysis  Network performance evaluation  Data aggregation from multiple sources  Anomaly recognition  Determination of network protocols in use  Recognition of employee misuse of resources  Security investigations and incident response  Intellectual property protection 1) The commercial NFATs available in the market are – Net Intercept, NetPerceiveor, Net Flow, Silent Runner, EnCase, and Visual Route. 2) The open source / freeware NFATs are – TCPDump / Libpcap / WinDump, Wireshark , Snort , Nmap , P0f , Tcpstat , Tcptrace, Tcpflow 3) The following commands are inbuilt in many modern operating systems and are useful for Network Forensics – Nslookup, Traceroute, Netstat, Nbtstat, Whois, Ping, Wget, Dig. III. NETWORK FORENSICS SYSTEM Generic Network forensic System includes the following steps [10]: 1) Identification 2) Preservation 3) Accumulation
  • 3. Comparative Analysis: Network Forensic Systems (IJSRD/Vol. 1/Issue 9/2013/0043) All rights reserved by www.ijsrd.com 1862 4) Examination 5) Analysis 6) Presentation 7) Incident Response. A. Identification Recognizing an incident from indicators and determining its type. This is not explicitly within the field of forensics, but significant because it impacts other steps [11]. Preservation – isolate, secure and preserve the state of physical and digital evidence. This includes preventing people from using the digital device or allowing other electromagnetic devices to be used within an affected radius. Accumulation – record the physical scene and duplicate digital evidence using standardized and accepted procedures. B. Examination In-depth systematic search of evidence relating to the suspected crime. This focuses on identifying and locating evidence which can be potential, possibly within locations which are unconventional. Construct detailed documentation for analysis. C. Analysis Determine significance, reconstruct fragments of data and draw conclusions based on evidence found. It may take several iterations of examination and analysis to support a crime theory. The distinction of analysis is that it may not require high technical skills to perform and thus more people can work on this case. D. Presentation Summarize and provide explanation of conclusions. This should be written in a layperson’s terms using abstracted terminology. All abstracted terminology should reference the specific details. Incident Response – The response to crime or intrusion perceived is initiated based on the information gathered to validate and assess the incident. This work analyses a process model for Network Forensic that meets the following requirements: 1) The model must be based on existing theory for physical crime investigations. 2) The model must be practical and follow the same steps that an actual investigation would take. 3) The model must be general with respect to technology and not be constrained to current products and procedures. 4) The model must be specific enough that general technology requirements for each phase can be developed. 5) The model has to be abstract that can apply to law enforcement investigations, corporate investigations, and incident response. A. Distributed systems based Network Forensic System Internet and LANs are distributed in nature and networks attack events are logged in clients at various locations. There is a need to these logs, fuse them and analyse on a central server. A general scheme for the frameworks is shown in Figure 1 [5]. Fig. 1: A general schema for Distributed Network Forensic Systems [5] B. Soft computing based Network forensic System The soft computing implementations are used to analyse captured data and classify the attack data. Neural network and Fuzzy tools are used for validation of attack occurrence. A general scheme for the fuzzy logic based system is shown in Figure 2[4]. Fig. 2: A general scheme for soft computing based network forensics system [4]
  • 4. Comparative Analysis: Network Forensic Systems (IJSRD/Vol. 1/Issue 9/2013/0043) All rights reserved by www.ijsrd.com 1863 C. Honeypot based Network forensic system Honeypot based system is used to attract the attackers so that their process methodology can be observed and analysed to improve defence mechanisms. IV. COMPARATIVE ANALYSIS In distributed model the capturing of packet is on multiple hosts while in Soft computing model it is on the single host. Distributed model decision making is based on statistical data while in it is based on non-statistical data. Time and cost involve in forensic analysis is less in soft computing model compare to distributed model. In soft computing model, if the rules are such that we can differentiate between an attack and legitimate traffic then we get desirable results. In distributed model it is very hard to differentiate between an attack and legitimate traffic, so desirable results are not possible every time. All network traffic is captured in distributed model; while in soft computing approach some data may be lost due to centralize capturing system. Incident response can be easily handled in soft computing model compare to distributed model. Honeypot based model is generally used to improve the defensive mechanisms because they attract the attackers so that the process methodology can be observed and analysed. While distributed model and soft computing based model are mainly used for the preventive mechanisms. Honeypot based model cannot be used for investigation purpose, while distributed based model and soft computing model can be used for investigation because the evidence gathering facility is available in these models. V. CONCLUSION Network forensics ensures investigation of the attacks by tracing the attack back to the source and attributing the crime to a person, host or a network. It has the ability to predict future attacks by constructing attack patterns from existing traces of intrusion data. The incident response to an attack is much faster. The preparation of authentic evidence can be admissible into a legal system is going to be facilitated. We have analysed and compared different approaches used for network forensic system. We found that no one covers all characteristic of network forensic system. Distributed model is efficient in capturing the complete network traffic. Soft computing model is efficient in differentiating the attack and legitimate traffic. Honey pot model is helpful in improving the defensive mechanism. REFERENCES [1] V. Broucek and P. Turner, “Forensic computing: Developing a conceptual approach for an emerging academic discipline,” 5th Australian Security Research Symposium, July, 2001. [2] H. Berghel, “The discipline of Internet forensics,” Communications of the ACM, vol. 46, no. 8, Aug., 2003, pp. 15–20. [3] S. Axelsson, “Intrusion Detection Systems: A Survey and Taxonomy,” Dept. of Computer Engineering, Chalmers University of Technology, Mar., 2000. [4] Z. Liu and D. Feng, “Incremental Fuzzy Decision Tree-Based Network Forensic System,” Proc. Int’l Conf. Computational Intelligence and Security (CIS 2005), LNAI 3802, Springer, 2005, pp. 995-1002. [5] W. Ren and H. Jin, “Distributed Agent-based Real Time Network Intrusion Forensics System Architecture Design,” Proc. IEEE 19th Int’l. Conf. Advanced Information Networking Applications (AINA 2005), pp. 177–182. [6] L. Spitzner, “Honeypots: Definitions and Value of Honeypots”, http://www.trackinghackers.com/papers/ honeypots.html [7] L. Spitzner, “Know Your Enemy: Defining Virtual Honeynets”, http://www.honeynet.org [8] S. Garfinkel, “Network Forensics: Tapping the Internet” http://www.oreillynet.com/pub/a/network/ 2002/04/26/ nettap.html [9] V. Broucek and P. Turner, “Forensic computing: Developing a conceptual approach for an emerging academic disciple Australian Security Research Symposium, July, 2001. [10] Emmanuel S. Pilli “Network forensic frameworks: Survey and research challenges” Journal of Elsevier Ltd. 2010. [11] Bura.brunel.ac.uk/bitstream/2438/7651/1/Full text Thesis.pdf by K Shanmugam - 2011