SlideShare a Scribd company logo
1 of 14
Download to read offline
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
DOI : 10.5121/ijcnc.2015.7403 43
A PROPOSED ARCHITECTURE FOR NETWORK
FORENSIC SYSTEM IN LARGE-SCALE
NETWORKS
Tala Tafazzoli1
, Elham Salahi2
and Hossein Gharaee3
1,3
Network Security Technology Group, Iran Telecommunication Research Center,
Tehran, Iran
2
IT Security and Systems Group, Iran Telecommunication Research Center, Tehran,
Iran
ABSTRACT
Cybercrime is increasing at a faster pace and sometimes causes billions of dollars of business- losses so
investigating attackers after commitment is of utmost importance and become one of the main concerns of
network managers. Network forensics as the process of Collecting, identifying, extracting and analyzing
data and systematically monitoring traffic of network is one of the main requirements in detection and
tracking of criminals. In this paper, we propose an architecture for network forensic system. Our proposed
architecture consists of five main components: collection and indexing, database management, analysis
component, SOC communication component and the database.
The main difference between our proposed architecture and other systems is in analysis component. This
component is composed of four parts: Analysis and investigation subsystem, Reporting subsystem, Alert
and visualization subsystem and the malware analysis subsystem. The most important differentiating
factors of the proposed system with existing systems are: clustering and ranking of malware, dynamic
analysis of malware, collecting and analysis of network flows and anomalous behavior analysis.
KEYWORDS
Network forensics, forensic system architecture, forensic analysis system, database management.
1. INTRODUCTION
By continuing to use technology, cyber-attacks occur rapidly and malware spreads across the
globe. Considerable countermeasures have been developed to protect and react to cyber-attacks
and cyber-crime.
Despite the reactive and preventive security measures taken to protect networks, forensic
investigation of critical information infrastructure is still necessary. Security operation centres
(SOC) store security alerts produced by network security appliances. They also store partial
network traffic. On the other hand, network forensic systems must store all network traffic.
Digital forensic process and investigation depends on the information stored in security
operations centre (SOC) communication channel, other network appliances and raw traffic stored
in forensic system. The appliances needed to perform the forensic process on this communication
channel help the investigators to answer the six questions in forensics: why, how, when, what,
where, and who committed the crime.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
44
Digital forensic process for cyber-attack and cyber-crime investigation is an intelligent task. To
perform the investigation successfully, the investigator has to be innovative and intelligent.
Observing the attack and crime evidence, the investigator intelligently extracts the information
from traffic and alerts stored in security appliances. After analysing the evidence, the investigator
either accepts or rejects the hypothesis.
In this paper, we present an architecture for network forensic solution, in which we cover
weaknesses of current commercial products and research frameworks. Commercial products and
solutions establish themselves in analysis capabilities such as session reconstruction, signature
analysis, statistical analysis and searching methods with reasonable speed and storage capabilities
such as supporting of 1G or 10G traffic. Research frameworks focus on different aspects in
network forensics such as distributed storage and searching of evidence, use of soft computing
based methods in forensic analysis, etc. Some key components make up our architecture, bringing
advanced capabilities and nearly unlimited scalability to bear on network traffic monitoring,
analysis problems, anomalous behaviour analysis, online executable filtering, online processing,
clustering and analysis of executable to our proposed architecture. The purpose of this paper is to
present a unique network forensics tool that will allow the network forensics examiner to
participate more effectively in the analysis of a network-crimebased investigation. Using this
network forensics tool, the network forensics examiner can enhance the success of solving the
case attributable to the accurate, timely, and useful analysis of captured network traffic for crime
analysis, investigation, and/or intelligence purposes.
The following chapters are organized as follows. Network forensic architectures and frameworks
are presented in chapter 2. Our proposed architecture of network forensic system for large scale
networks like telecommunication infrastructure network is presented in chapter 3. We compare
our proposed architecture with existing network forensic systems in chapter 4.
The following formatting rules must be followed strictly. This (.doc) document may be used as a
template for papers prepared using Microsoft Word. Papers not conforming to these requirements
may not be published in the conference proceedings.
Every organization or network requires a specific architecture for its forensic system depending
on its characteristics and goals. Various frameworks and architectures for network forensic
systems have been introduced [1]. These frameworks can be classified as follows: distributed
system frameworks [2, 3, 4, and 5], dynamic network frameworks [6], soft computing based
frameworks [7, 8, 9, and 10] and graph based frameworks [11]. Further, we investigate an
example framework of each class in detail [5].
Fornet is a distributed network forensic framework. In 2003, Shanmugasundaram et al.
introduced Fornet which is a distributed network logging mechanism over wide area networks.
This system is developed for digital forensic purposes. The framework is composed of two
components: SynApps and Forensic Server. SynApp integrates to network devices, such as
switches and routers and summarizes and remembers network events for a time interval and is
able to verify these events with certain confidence levels. Although a single SynApp can provide
very useful information to a forensic analyst, a network of such co-operating appliances would
bring powerful new possibilities to the types of information that could be inferred from the
combined SynApps. Networking SynApps would also help to share data and storage and answer
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
45
to the queries accurately. These SynApps can be organized in a peer-to-peer architecture to
collaborate with each other in absence of centralized control, although a hierarchical architecture
is simpler and would work better with the given structure of the Internet.
In the hierarchical architecture all the SynApps within a domain form a network. They are
associated with the Forensic Server of that domain. In fact, Forensic Server is a centralized
administrative control for the domain which manages a group of SynApps in that domain.
Forensic Server receives queries from outside of its domain and processes them with the help of
the SynApps and passes the results back to the sender after authentication and certification.
Network of SynApps form the first level of hierarchy in ForNet hierarchical architecture.
Forensic Servers can also be networked for inter-domain collaboration which forms the second
level of the hierarchy. Queries that need to cross domain boundaries go through appropriate
Forensic Servers. A Forensic Server is the only gateway to queries sent to a domain from outside
the domain boundaries. In other words, a query sent to a domain goes to the Forensic Server of
that domain, is authenticated by the server and passed on to appropriate SynApps in the domain.
Likewise, the SynApps process results are sent to the Forensic Server that is in control of the
domain to be certified and sent back. In practice, queries begin from the leaf nodes of a branch in
the hierarchy, traverse Forensic Servers in higher levels, and end up in leaf nodes in another
branch. Queries usually travel in the opposite direction of the attack or crime.
In 2007, Wang et al. proposed dynamic network forensic model based on the artificial resistance
theory and multi agent theory [6]. The system presents a moment method to collect and store log
data simultaneously. Furthermore, the system has the capability to collect the evidence
automatically and to respond to network crimes rapidly. Agent theory is a new method for
designing, analysing and implementing an open system. A group of agents solve the problems
that cannot be handled by each of the agents. These agents have the same role as the protective
white cells in human body. Therefore, the agent based security system is more flexible and is
similar to a human body immunity system. Dynamic forensic network is used in large scale
networks and stores digital data in a distributed and secure manner, when attacks happen.
Soft computing approaches in network forensic systems deal with analyzing collected data and
classifying related attacks. Neural network and fuzzy tools are used to verify the occurrence of
attacks. In 2007, Zhang et al. proposed a network forensic system based on neural networks and
feature extraction with ANN-PCA [10]. Storing and analyzing large amounts of information
poses important challenges for network forensic experts. ANN-PCA correlates features with
attacks and reduces the amount of stored data. ANN-PCA techniques are used for fraud detection,
feature extraction and signature generation for new attacks. FAAR algorithm is used to classify
and to search for relational rules and to compute PCA values. Feature extraction in ANN-PCA
increases classification accuracy and decreases the data storage amount.
In 2008, Wang and Daniels proposed a graph-based approach for network forensic analysis [3].
The brief description of the main components of this work is as follows:
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
46
• Evidence collection module, which collects digital evidence from heterogeneous sensors
on networks and hosts.
• Evidence preprocessing module, which transforms collected evidence into standardized
format and reduces the redundancy in raw evidence.
• Attack knowledge base, which provides knowledge of attacks, their phases and target
vulnerabilities.
• Assets knowledge base, provides knowledge of the networks and hosts under
investigation, including network topology, system configuration and value of entities.
• Evidence graph manipulation module, generates the evidence graph by retrieving
preprocessed evidence from the depository. Hypotheses and out of band information are
also instantiated into the evidence graph through graph edit operations.
• Attack reasoning module, performs semi-automated reasoning based on the evidence
graph. In the hierarchical reasoning process, results of local reasoning provide instant
updates to the evidence graph.
3. A REVIEW ON NETWORK FORENSIC SYSTEMS
Net Witness Company [17] offers modular hardware and software network forensic solutions.
Considering the modular and scalable architecture of Netwitness products, they can be used in
small sized companies and organizations, large multinational enterprises, datacentres and ISPs.
Net Witness architecture consists of five subsystems: network traffic collection subsystem, data
processing subsystem, data synchronization subsystem, indexing subsystem and analysis
subsystem.
SiLK is an open source analysis software [18] which consists of a set of command-line tools
which processes flow records collected through SiLK Packing System. SiLK tools read and
process flow records gathered in binary format (segmentation, sorting and analysis). Some of the
analysis capabilities of SiLK include: filtering, displaying and sorting, counting and classifying,
processing and storing statistical information, labelling based on port number and IP address.
Silent Runner is a tool used for collecting and visualizing the data. Some of the analysis
capabilities of this tool are: correlating network traffic with log and alert files, analysis of content
and pattern, analysis of requested security incident. This tool has a simple and flexible
architecture. Silent Runner monitors and analyzes network and application layer data.
4. OUR PROPOSED ARCHITECTURE
Our proposed network forensic system architecture for large-scale networks is presented in Figure
1. The main components of this system are as follows:
Network traffic collection and indexing subsystem
• Database management subsystem
• Analysis subsystem
• SOC Communication part
• Database.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
47
Each of these components are described in the following subsections.
Figure 1 The Proposed Architecture for our network forensic system
4.1.Network Traffic Collection and Indexing subsystem
Traffic collection is referred to the set of the following operations: Receiving traffic through the
network interface or importing data from an external file or database, Applying filters or storing
the traffic in the system database for further use in next phases. We use indexing to provide quick
access to the required data among the mass data. Indexing and the method to perform it define an
important part of system speed parameter both in receive and store phase and in analysis phase [5,
6]. Indexing is an important parameter that has implications on network forensic system speed, in
both collection and analysis subsystems [5, 6]. The implementation on indexing component
depends on the file system. Macro architecture of traffic collection and indexing subsystem is
shown in figure 2. We describe it in the following subsections.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
48
Figure 2 Macro Architecture of Traffic Collection and Indexing Subsystem
4.1.1. Network Traffic Collection
Traffic data can be collected with two different technologies. First, span/mirror ports
indicate the ability to copy traffic from all/one port to a single port. Second, Rap devices
monitor the traffic flowing between two points in the network.
Both methods have their own advantages and disadvantages, and each of them can be used in a
forensic system with proper analysis and consideration of the expected level of advantages and
disadvantages. SPAN ports have lower cost and lower reliability compared with TAP devices.
Routers doesn't send received packets with inconsistent CRC to SPAN ports. Another
disadvantage of SPAN port is the possibility of bandwidth overflow of a port and packet loss. The
reason is that the traffic of all the ports are transmitted through one single port. Unlike the SPAN
port, TAP devices send a copy of all packets transmitting on an input line to the network to two
separate lines with the same bandwidth as the original line. Currently, in SOC systems, data is
transmitted to Intrusion Detection Systems using TAP devices. An image of the traffic can also be
stored in the forensic system. The policy for data collection is determined by the company using
this system. Moreover, our forensic system must have the capability to import and index network
traffic data using network packet files. Our system must be compatible with different network
traffic file types.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
49
4.1.2. Network Filters
Network layer filters separate the packets without session reconstruction. In other words, in this
type of filtering, packets are classified based on their headers. Header information of three
TCP/IP layers – network, internet and transport layers- is used to separate the traffic without
session reconstruction. Some of the header information used for traffic filtering is shown in Table
1.
Table 1 Protocol Stack Layers and their Characteristics for filtering
4.1.3. Parsers
Parser is a program that receives continuous string of symbols and parses it to defined units.
Parsers are usually one of the main components of a compiler in programming languages. In this
article, parsers are used to scan the information of a reconstructed session and search for certain
characteristics in that string. For example, a parser specific for MAIL Standard protocol is used to
scan an e-mail session. The parser scans the whole session to find information such as source
account, content, etc. The parser put this information in the memory for application layer
filtering.
4.1.4. Application Layer Filters
After session reconstruction and extraction of application characteristics, the necessary rules for
traffic filtering based on application layer characteristics should be developed. Filtering at this
layer is the same as lower layers and traffic filtering is performed based on application layer
rules. For example, a rule can be defined to store the header information of SSL packets without
payload. The goal of network and application layer filters is to limit input/output traffic storage.
In both filters (network and application layer), the system admin should be able to choose the
possible actions performed on the packet considering the rule i.e. the future of the packet is
determined based on the rule applied to it. Some examples of possible actions on the packet are:
session reconstruction of the packet, storing network metadata in the process of data mining. All
possible actions for the rules should exist in the system.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
50
Network traffic collection and indexing subsystem resides on an isolated hardware and is placed
in network endpoint. It receives a copy of traffic from the Mirror port as input. Scalability and
distribution are basic requirements of the collection subsystem. The subsystem must be able to
receive network traffic from multiple points in the network simultaneously. For example, suppose
that network traffic is received from one 10G Ethernet port and two 1G Ethernet ports. In this
case, three traffic collection subsystems are installed in the network separately. The metadata
collected by each of these collection subsystems, must be integrated and stored in the system.
4.1.5. Indexing
In this phase, indices are generated from network traffic to speed up database access (see figure
2). Indices provide quick access to data. Indexing and the way it is performed, is very important
in determining the speed of system in collection and analysis phases.
4.2.The Analysis System
The analysis system is used to analyze the stored data in database and consists of three parts:
Analysis and Investigation system, Report, Alert and Visualization System and Malware Analysis
System.
4.2.1. The Analysis and Investigation Subsystem
This system provides analysis capabilities for raw traffic stored in database. Analysis in this
system is based on counting (counting the packets, sessions, etc.). Metadata generated in this
system consist of different parts (such as source IP address, destination IP address list). The
analysis and investigation system provides the capability to focus in metadata, part of metadata,
sessions in some part of metadata and to investigate the information related to that particular part
more closely. For example, it should be possible to query for metadata for sessions with certain
source IP address, related services such as TCP/IP/HTTP, session size in KB and to query for
related events and to reconstruct their sessions [7].
Network analyses are performed on layers 2 to 7. Analysis can be done in the following ways:
session analysis, path and content analysis, finding the sources of external threats, mapping IP
addresses to geographic location, storing data in the sessions, displaying data as seen by the user
(web, voice, email, chat, files, etc.), searching and analyzing the contents and sessions (MAC, IP,
keyword, usernames, …), the ability to define parsers and alerts, the ability to define customized
operations.
Some of the results and outputs of this unit are: alerts, Source and destination IP addresses, source
and destination port numbers, IP address, title, email content, session graph display, server
program, service type (HTTP, SSL, DNS, …), sites used, attachments, file types, username,
reconstructed sessions and protocols restored content such as web page and email content,
decrypted and decompressed content.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
51
The following analysis methods are provided by this unit:
Temporal Analysis: storage and display of sessions and operations in chronological order and
limiting the investigation to a particular range of time.
Packet Level Analysis: displaying the number of packets for each metadata.
Session Level Analysis: displaying the number of sessions for each metadata.
File Content Analysis: Specifying the name, type and origin of metadata.
Moreover, the system should provide the capability to perform these analyses:
Temporal Analysis: Displaying the start time and end time of incidents to create incident time
axis, displaying incident duration. For example, displaying how fast the malware spreads and the
life time of an incident. Incident Source Analysis: the source of the attack is determined.
Incident Destination Analysis: The destination of the targeted attack is determined.
Relation Analysis: The relations between attack sources and also the relations between culprit
and victim is determined.
4.2.2. Reporting, Alerting and Visualization Subsystem
This subsystem is connected to various databases. In this subsystem, graphical representations of
volume of traffic and protocols used are created. Files, contents and exchanged information with
different protocols are extracted and displayed in visualization unit. In this subsystem, the
information stored in different databases is investigated and online reports are created.
4.2.3. Malware Analysis system
The system architecture is shown in Figure 4. It consists of four main units: file signature control
unit, network anomalous behaviour detection unit, automatic sandbox, and domain knowledge
unit. Each of these units is described as follows.
Figure 4 Malware Analysis system components File
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
52
File Signature Control Unit: Malware file signatures are created in this unit and are compared
with signatures of executables that are transmitting over the network.
Network Anomalous Behaviour Detection Unit: In this unit, with respect to network traffic
characteristics, network bandwidth and server capacity thresholds are determined to detect
anomalous behaviour in the network. Behavioural profiles are also created. Moreover, traffic is
analyzed online and in real time from the network behavioural perspective. In this method,
network behavioural pattern in a time period is considered as network's normal behaviour and
network normal pattern in time is measured based on it. Using this method, some of network risk
areas which are not addressed in other methods are covered. The other analyses are not addressed
in this system.
Domain knowledge unit: In this unit, if possible, latest malware signatures are received from
other companies inside and outside of the company.
Automated Malware Analysis section: In this unit, executable files transmitting over the
network are first extracted. Unknown executable samples run in sandbox controlled environment
and their behaviour are logged. Malware behaviour profile is extracted from recorded logs,
network traces, registry changes and access to files. This profile is used for different purposes.
Identification and seizure of malwares transmitting over the network are two main applications of
this section. This section is composed of two main units:
• preprocessing and filtering
• Automatic sandbox [11,12]
Figure 5 shows the overall scheme of the unit. Automated malware clustering and analysis have
the following benefits:
• A new executable is analyzed rapidly and is determined whether it belongs to known or
unknown family.
• If malware belongs to a known family, there would be no need for dynamic analysis.
Therefore fewer samples are analyzed in sandbox. The sandbox platform should be
capable of online analysis of malware samples.
Figure 5 Overall Scheme of the Automatic Malware Analysis Unit.
The main responsibilities for each of the units of this section will be explained sequentially.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
53
Preprocessing and Filtering Unit: The purpose of this unit is principally focused on extracting
executable codes, reducing their count and separating unknown samples. There are different
approaches to achieve this goal. We explain one approach here. This approach is shown in figure
6.
Figure 6 A Scheme for Executable Code Preprocessing and Filtering Unit
Here we explain different units of this scheme [8, 9, and 10].
Feature extraction: First, static features of each sample are extracted without executing the
code. They are extracted from the code. Some of these features are as follows: file structure,
antivirus analysis results of the code.
Cluster prediction: Behavioural profiles and static features of the code are used as input to this
unit. Here, we attempt to predict the behavioural cluster of the sample, using a supervised
learning approach.
Cluster scoring: In this phase, a score is assigned to each sample which investigates the
dissimilarity of the sample in the cluster. High score samples are passed to dynamic analysis
phase.
Dynamic analysis: Selected executable samples are executed in the sandbox. The network level
and host level behaviour observed during execution is condensed in a set of behavioural features.
The set of features is fed back to the cluster ranking phase. We cluster malware samples based on
their malicious behavioural features. The behavioural cluster that a sample belongs to, is fed back
to cluster prediction phase. Therefore, high score samples from preprocessing phase are fed as
input to dynamic analysis phase and behavioural characteristics of malware samples are output
from the sandbox. These characteristics are stored in a behavioural profile. The profiles are
expressed by OS objects and OS functions.
4.3. Database Management
Security Operation Center is responsible for receiving network security events from different
security tools, and correlating and analyzing them.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
54
Connection to Security Operation Center occurs in data management section. A general view of
connection to security operation center is shown in figure 7. Network forensic system searches
for patterns. The requests are sent to security operation center and appropriate responses are
received from database management system in an acceptable time.
Figure 7 Communication to the Security Operation Center
APIs should be placed between SOC and analysis system to covert data structures transmitting
between different units. Database management unit should combine raw traffic with alerts
transmitted from security operations center. Considering Telecommunication Infrastructure
policies, the forensic system might be authorized to access and search in alert databases and
correlation logs directly. Searches must be performed with proper speed.
4.4. Database
There are two methods for storing traffic and metadata. The first method is clustered storage [16].
In this storage, all raw traffic and metadata are aggregated and stored in server farm. The
advantages of this technology include: integration of traffic stored in the network to be used by all
security units, reducing setup and maintenance costs, and increasing the system security. In
contrast, implementation complexity and the need for information about system implementation
details are possible disadvantages of clustered storage subsystem.
5. A COMPARISON BETWEEN OUR METHOD AND OTHER
PROPOSED METHOD
Table 2 shows different aspects and components of NetWitness, Silk and Solent Runner system
and compares them to our proposed architecture. It shows strengths and weaknesses of our
architecture in comparison with other products.
6. CONCLUSION
The main purpose of forensic systems is to help the investigators to identify criminals and crime
signs. Strength of a network forensic system depends on its ability to process network traffic with
a speed proportional to data transmission and analysis.
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
55
In this paper, we propose an architecture of a forensic system for security operation center. It is
composed of several units: data collection and indexing, database management system and
analysis system. The proposed architecture tries to use maximum existing potentials to optimize
designed system efficiency. Compared to existing frameworks, our proposed architecture brings
us advanced capabilities for dynamic malware analysis and clustering and analysis and network
behavioural analysis.
Table 2- The proposed architecture compared with existing systems
References
[1] Emmanuel S. Pilli*, R.C. Joshi, Rajdeep Niyogi, Network forensic frameworks: Survey and research
challenges, Digital Investigation 7 ( 2 0 1 0 ) 1 4 – 2 7.
[2] Shanmugasundaram K, Memon N, Savant A, Bronnimann H. ForNet: a distributed forensics network.
In Proceedings of the second international workshop on mathematical methods models and
International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015
56
architectures for computer networks security (MMMACNS 2003), LNCS 2776. Springer; 2003. p. 1–
16.
[3] Wang W, Daniels TE. A graph based approach towards network forensics analysis. ACM
Transactions on Information System Security (TISSEC) Oct. 2008; 12 (1).
[4] Terrence V. Lillard, Clint P. Garrison, Craig A. Schiller and James Steele, Digital Forensics for
Network, Internet, and Cloud Computing, A Forensic Evidence Guide for Moving Targets and Data,
2010.
[5] Cherie Cheung and Jue Wang, "Data Partitioning and Indexing for Network Forensic Analysis".
[6] R. Geambasu, T. Bragin, J. Jung, and M. Balazinska. On-Demand View Materialization and Indexing
for Network Forensic Analysis. In Proceedings of NetDB 2007, April 2007.
[7] http://www.netwitness.com/
[8] Matthias Neugschwandtner1, Paolo Milani Comparetti1, Gregoire Jacob2, and Christopher Kruegel
FORECAST – Skimming off the Malware Cream. In Proceedings of the 2011 Annual Computer
Security Applications Conference (ACSAC). December 2011.
[9] U. Bayer, P. Milani Comparetti, C. Kruegel, and E. Kirda. Scalable, Behaviour-Based Malware
Clustering. In Network and Distributed System Security (NDSS), 2009.
[10] G. Jacob, M. Neugschwandtner, P. Milani Comparetti,C. Kruegel, and G. Vigna. A static,
packeragnostic filter to detect similar malware samples. Technical Report 2010-26, UC Santa
Barbara, 2010.
[11] Anubis. http://anubis.iseclab.org.
[12] Norman Sandbox. http://sandbox.norman.com.
[13] C. Sartori and M. R. Scalas. Partial indexing for nonuniform data distributions in relational DBMS’s.
IEEE Transactions on Knowledge and Data Engineering, 6(3):420–429, 1994.
[14] Stonebraker et. al. C-store: a Column-Oriented DBMS. In Proceedings of the 2005 VLDB, pages
553–564, 2005.
[15] Lukasz Golab, Theodore Johnson, J. Spencer Seidel, and Vladislav Shkapenyyuk, Stream
warehousing with Data Depot, SIGMOD 2009, pages 847-854, New York.
[16] G. A. Gibson, et al. A cost-effective, high-bandwidth storage architecture. Architectural Support for
Programming Languages and Operating Systems. Published as SIGPLAN Notices, 33(11):92–103,
November 1998.
AUTHORS
Tala Tafazzoli received B.S. degree in computer engineering from Sharif University of
Technology and received M.S. degree in computer engineering from Amirkabir University
of Technology. She is a faculty member of network security group of Iran Telecom
Research Center. Her research interest areas include: digital forensics, intrusion detection
system and network security.
Elham Salahi has a BSc degree in Computer Science from Sharif University, and an MSc
degree in Applied Mathematics with a minor in Computer science from Iran University of
Science and Technology. She has more than nine years of experience working as a
researcher in ITRC. Her research interests are: digital forensics, Image Watermarking,
intrusion detection system and network security.
Hossein Gharaee received B.S. degree in electrical engineering from Khaje Nasir Toosi
University, in 1998, M.S. and Ph.D. degree in electrical engineering from Tarbiat Modares
University, Tehran, Iran, in 2000 and 2009 respectively. Since 2009, he has been with the
Department of Network Technology in IRAN Telecom Research Center (ITRC). His
research interests include general area of VLSI with emphasis on basic logic circuits for
low-voltage low-power applications, DSP Algorithm, crypto chip and Intrusion detection
and prevention systems.

More Related Content

What's hot

Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systemsijsrd.com
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionGyan Prakash
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET Journal
 
A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...IJCNCJournal
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...ijcsit
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...Editor IJMTER
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detectingjpstudcorner
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONIJNSA Journal
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET Journal
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensicsIJNSA Journal
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logsanilinvns
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using BacktrackingIRJET Journal
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionIOSR Journals
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectioncsandit
 
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...IDES Editor
 

What's hot (18)

Comparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic SystemsComparative Analysis: Network Forensic Systems
Comparative Analysis: Network Forensic Systems
 
Internet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detectionInternet ttraffic monitering anomalous behiviour detection
Internet ttraffic monitering anomalous behiviour detection
 
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
IRJET- An Intrusion Detection Framework based on Binary Classifiers Optimized...
 
C3602021025
C3602021025C3602021025
C3602021025
 
A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...A novel signature based traffic classification engine to reduce false alarms ...
A novel signature based traffic classification engine to reduce false alarms ...
 
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
INTRUSION DETECTION USING FEATURE SELECTION AND MACHINE LEARNING ALGORITHM WI...
 
An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...An Intrusion Detection based on Data mining technique and its intended import...
An Intrusion Detection based on Data mining technique and its intended import...
 
A lightweight secure scheme for detecting
A lightweight secure scheme for detectingA lightweight secure scheme for detecting
A lightweight secure scheme for detecting
 
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTIONCOMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
COMBINING NAIVE BAYES AND DECISION TREE FOR ADAPTIVE INTRUSION DETECTION
 
Network Forensic
Network ForensicNetwork Forensic
Network Forensic
 
IRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related DataIRJET - Digital Forensics Analysis for Network Related Data
IRJET - Digital Forensics Analysis for Network Related Data
 
Optimised malware detection in digital forensics
Optimised malware detection in digital forensicsOptimised malware detection in digital forensics
Optimised malware detection in digital forensics
 
Network forensics and investigating logs
Network forensics and investigating logsNetwork forensics and investigating logs
Network forensics and investigating logs
 
IRJET - A Secure Approach for Intruder Detection using Backtracking
IRJET -  	  A Secure Approach for Intruder Detection using BacktrackingIRJET -  	  A Secure Approach for Intruder Detection using Backtracking
IRJET - A Secure Approach for Intruder Detection using Backtracking
 
Application of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion RecognitionApplication of Data Mining Technique in Invasion Recognition
Application of Data Mining Technique in Invasion Recognition
 
Network forensic
Network forensicNetwork forensic
Network forensic
 
Survey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detectionSurvey on classification techniques for intrusion detection
Survey on classification techniques for intrusion detection
 
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...
Utilizing Data Mining Approches in the Detection of Intrusion in IPv6 Network...
 

Viewers also liked

Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamicIJCNCJournal
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)IJCNCJournal
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcastIJCNCJournal
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server forIJCNCJournal
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesIJCNCJournal
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSIJCNCJournal
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination inIJCNCJournal
 
Attack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withAttack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withIJCNCJournal
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security onIJCNCJournal
 
Server congestion control
Server congestion controlServer congestion control
Server congestion controlIJCNCJournal
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGIJCNCJournal
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based onIJCNCJournal
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wirelessIJCNCJournal
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...IJCNCJournal
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemIJCNCJournal
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshIJCNCJournal
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsIJCNCJournal
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of theIJCNCJournal
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoringIJCNCJournal
 

Viewers also liked (19)

Analyzing the performance of the dynamic
Analyzing the performance of the dynamicAnalyzing the performance of the dynamic
Analyzing the performance of the dynamic
 
Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)Section based hex cell routing algorithm (sbhcr)
Section based hex cell routing algorithm (sbhcr)
 
Three dimension hamiltonian broadcast
Three dimension hamiltonian broadcastThree dimension hamiltonian broadcast
Three dimension hamiltonian broadcast
 
Video contents prior storing server for
Video contents prior storing server forVideo contents prior storing server for
Video contents prior storing server for
 
Data gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodesData gathering in wireless sensor networks using intermediate nodes
Data gathering in wireless sensor networks using intermediate nodes
 
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKSPLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
PLANNING AND MANAGING VIRTUALIZED NEXT GENERATION NETWORKS
 
Multi hop distributed coordination in
Multi hop distributed coordination inMulti hop distributed coordination in
Multi hop distributed coordination in
 
Attack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets withAttack countermeasure tree (act) meets with
Attack countermeasure tree (act) meets with
 
The influence of information security on
The influence of information security onThe influence of information security on
The influence of information security on
 
Server congestion control
Server congestion controlServer congestion control
Server congestion control
 
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADINGCONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
CONTEXT-AWARE DECISION MAKING SYSTEM FOR MOBILE CLOUD OFFLOADING
 
Fault tolerant routing scheme based on
Fault tolerant routing scheme based onFault tolerant routing scheme based on
Fault tolerant routing scheme based on
 
Radio propagation models in wireless
Radio propagation models in wirelessRadio propagation models in wireless
Radio propagation models in wireless
 
Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...Multi user performance on mc cdma single relay cooperative system by distribu...
Multi user performance on mc cdma single relay cooperative system by distribu...
 
Performance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor systemPerformance evaluation of zigbee transceiver for wireless body sensor system
Performance evaluation of zigbee transceiver for wireless body sensor system
 
Broadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d meshBroadcast wormhole routed 3-d mesh
Broadcast wormhole routed 3-d mesh
 
A new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumnsA new dna based approach of generating keydependentmixcolumns
A new dna based approach of generating keydependentmixcolumns
 
Distribution of maximal clique size of the
Distribution of maximal clique size of theDistribution of maximal clique size of the
Distribution of maximal clique size of the
 
Real time wireless health monitoring
Real time wireless health monitoringReal time wireless health monitoring
Real time wireless health monitoring
 

Similar to A proposed architecture for network

The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...Konstantinos Demertzis
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIOSR Journals
 
Evaluating Network Forensics Applying Advanced Tools
Evaluating Network Forensics Applying Advanced ToolsEvaluating Network Forensics Applying Advanced Tools
Evaluating Network Forensics Applying Advanced ToolsIJAEMSJORNAL
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCSITiaesprime
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessDavid Sweigert
 
Topic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxTopic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxjuliennehar
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics IJNSA Journal
 
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCANADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCANIJNSA Journal
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...IJNSA Journal
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.IRJET Journal
 
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...Shakas Technologies
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSIJNSA Journal
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysisijceronline
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYIJMIT JOURNAL
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityIJMIT JOURNAL
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docxSUBHI7
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer ForensicEditor IJCTER
 

Similar to A proposed architecture for network (20)

The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...The Next Generation Cognitive Security Operations Center: Network Flow Forens...
The Next Generation Cognitive Security Operations Center: Network Flow Forens...
 
Intrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural NetworkIntrusion Detection Systems By Anamoly-Based Using Neural Network
Intrusion Detection Systems By Anamoly-Based Using Neural Network
 
Evaluating Network Forensics Applying Advanced Tools
Evaluating Network Forensics Applying Advanced ToolsEvaluating Network Forensics Applying Advanced Tools
Evaluating Network Forensics Applying Advanced Tools
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
Collecting and analyzing network-based evidence
Collecting and analyzing network-based evidenceCollecting and analyzing network-based evidence
Collecting and analyzing network-based evidence
 
Passive monitoring to build Situational Awareness
Passive monitoring to build Situational AwarenessPassive monitoring to build Situational Awareness
Passive monitoring to build Situational Awareness
 
Topic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docxTopic Since information extracted from router or switch interfaces.docx
Topic Since information extracted from router or switch interfaces.docx
 
Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics Optimised Malware Detection in Digital Forensics
Optimised Malware Detection in Digital Forensics
 
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCANADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
ADRISYA: A FLOW BASED ANOMALY DETECTION SYSTEM FOR SLOW AND FAST SCAN
 
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...FORTIFICATION OF HYBRID INTRUSION  DETECTION SYSTEM USING VARIANTS OF NEURAL ...
FORTIFICATION OF HYBRID INTRUSION DETECTION SYSTEM USING VARIANTS OF NEURAL ...
 
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
MACHINE LEARNING AND DEEP LEARNING MODEL-BASED DETECTION OF IOT BOTNET ATTACKS.
 
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
A_Measurement_Approach_for_Inline_Intrusion_Detection_of_Heartbleed-Like_Atta...
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSSUNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
UNCONSTRAINED ENDPOINT SECURITY SYSTEM: UEPTSS
 
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation AnalysisA New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
A New Way of Identifying DOS Attack Using Multivariate Correlation Analysis
 
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITYUSE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
USE OF NETWORK FORENSIC MECHANISMS TO FORMULATE NETWORK SECURITY
 
Use of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network securityUse of network forensic mechanisms to formulate network security
Use of network forensic mechanisms to formulate network security
 
Running Head Security Assessment Repot (SAR) .docx
Running Head  Security Assessment Repot (SAR)                    .docxRunning Head  Security Assessment Repot (SAR)                    .docx
Running Head Security Assessment Repot (SAR) .docx
 
Ii2514901494
Ii2514901494Ii2514901494
Ii2514901494
 
Review on Computer Forensic
Review on Computer ForensicReview on Computer Forensic
Review on Computer Forensic
 

More from IJCNCJournal

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficIJCNCJournal
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...IJCNCJournal
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...IJCNCJournal
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...IJCNCJournal
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsIJCNCJournal
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionIJCNCJournal
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficIJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IJCNCJournal
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...IJCNCJournal
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...IJCNCJournal
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...IJCNCJournal
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsIJCNCJournal
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...IJCNCJournal
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...IJCNCJournal
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemIJCNCJournal
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSIJCNCJournal
 

More from IJCNCJournal (20)

April 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & CommunicationsApril 2024 - Top 10 Read Articles in Computer Networks & Communications
April 2024 - Top 10 Read Articles in Computer Networks & Communications
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT TrafficHigh Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
High Performance NMF Based Intrusion Detection System for Big Data IOT Traffic
 
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
A Novel Medium Access Control Strategy for Heterogeneous Traffic in Wireless ...
 
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
A Topology Control Algorithm Taking into Account Energy and Quality of Transm...
 
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
Multi-Server user Authentication Scheme for Privacy Preservation with Fuzzy C...
 
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation SystemsAdvanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
Advanced Privacy Scheme to Improve Road Safety in Smart Transportation Systems
 
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware DetectionDEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
DEF: Deep Ensemble Neural Network Classifier for Android Malware Detection
 
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT TrafficHigh Performance NMF based Intrusion Detection System for Big Data IoT Traffic
High Performance NMF based Intrusion Detection System for Big Data IoT Traffic
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
IoT Guardian: A Novel Feature Discovery and Cooperative Game Theory Empowered...
 
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
** Connect, Collaborate, And Innovate: IJCNC - Where Networking Futures Take ...
 
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
Enhancing Traffic Routing Inside a Network through IoT Technology & Network C...
 
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
Multipoint Relay Path for Efficient Topology Maintenance Algorithm in Optimiz...
 
March 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & CommunicationsMarch 2024 - Top 10 Read Articles in Computer Networks & Communications
March 2024 - Top 10 Read Articles in Computer Networks & Communications
 
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
Adaptive Multi-Criteria-Based Load Balancing Technique for Resource Allocatio...
 
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
Comparative Study of Orchestration using gRPC API and REST API in Server Crea...
 
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio SystemSensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
Sensing Time Improvement Using Two Stage Detectors for Cognitive Radio System
 
Feature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDSFeature Selection using the Concept of Peafowl Mating in IDS
Feature Selection using the Concept of Peafowl Mating in IDS
 

Recently uploaded

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxbritheesh05
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxKartikeyaDwivedi3
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVRajaP95
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxk795866
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvLewisJB
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...srsj9000
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineeringmalavadedarshan25
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionDr.Costas Sachpazis
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx959SahilShah
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerAnamika Sarkar
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024hassan khalil
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024Mark Billinghurst
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfAsst.prof M.Gokilavani
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...VICTOR MAESTRE RAMIREZ
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfAsst.prof M.Gokilavani
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxwendy cai
 

Recently uploaded (20)

Artificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptxArtificial-Intelligence-in-Electronics (K).pptx
Artificial-Intelligence-in-Electronics (K).pptx
 
Concrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptxConcrete Mix Design - IS 10262-2019 - .pptx
Concrete Mix Design - IS 10262-2019 - .pptx
 
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IVHARMONY IN THE NATURE AND EXISTENCE - Unit-IV
HARMONY IN THE NATURE AND EXISTENCE - Unit-IV
 
Introduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptxIntroduction-To-Agricultural-Surveillance-Rover.pptx
Introduction-To-Agricultural-Surveillance-Rover.pptx
 
Work Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvvWork Experience-Dalton Park.pptxfvvvvvvv
Work Experience-Dalton Park.pptxfvvvvvvv
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
Gfe Mayur Vihar Call Girls Service WhatsApp -> 9999965857 Available 24x7 ^ De...
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 
Internship report on mechanical engineering
Internship report on mechanical engineeringInternship report on mechanical engineering
Internship report on mechanical engineering
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective IntroductionSachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
Sachpazis Costas: Geotechnical Engineering: A student's Perspective Introduction
 
Application of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptxApplication of Residue Theorem to evaluate real integrations.pptx
Application of Residue Theorem to evaluate real integrations.pptx
 
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube ExchangerStudy on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
Study on Air-Water & Water-Water Heat Exchange in a Finned Tube Exchanger
 
Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024Architect Hassan Khalil Portfolio for 2024
Architect Hassan Khalil Portfolio for 2024
 
IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024IVE Industry Focused Event - Defence Sector 2024
IVE Industry Focused Event - Defence Sector 2024
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdfCCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
CCS355 Neural Networks & Deep Learning Unit 1 PDF notes with Question bank .pdf
 
Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...Software and Systems Engineering Standards: Verification and Validation of Sy...
Software and Systems Engineering Standards: Verification and Validation of Sy...
 
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdfCCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
CCS355 Neural Network & Deep Learning Unit II Notes with Question bank .pdf
 
What are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptxWhat are the advantages and disadvantages of membrane structures.pptx
What are the advantages and disadvantages of membrane structures.pptx
 

A proposed architecture for network

  • 1. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 DOI : 10.5121/ijcnc.2015.7403 43 A PROPOSED ARCHITECTURE FOR NETWORK FORENSIC SYSTEM IN LARGE-SCALE NETWORKS Tala Tafazzoli1 , Elham Salahi2 and Hossein Gharaee3 1,3 Network Security Technology Group, Iran Telecommunication Research Center, Tehran, Iran 2 IT Security and Systems Group, Iran Telecommunication Research Center, Tehran, Iran ABSTRACT Cybercrime is increasing at a faster pace and sometimes causes billions of dollars of business- losses so investigating attackers after commitment is of utmost importance and become one of the main concerns of network managers. Network forensics as the process of Collecting, identifying, extracting and analyzing data and systematically monitoring traffic of network is one of the main requirements in detection and tracking of criminals. In this paper, we propose an architecture for network forensic system. Our proposed architecture consists of five main components: collection and indexing, database management, analysis component, SOC communication component and the database. The main difference between our proposed architecture and other systems is in analysis component. This component is composed of four parts: Analysis and investigation subsystem, Reporting subsystem, Alert and visualization subsystem and the malware analysis subsystem. The most important differentiating factors of the proposed system with existing systems are: clustering and ranking of malware, dynamic analysis of malware, collecting and analysis of network flows and anomalous behavior analysis. KEYWORDS Network forensics, forensic system architecture, forensic analysis system, database management. 1. INTRODUCTION By continuing to use technology, cyber-attacks occur rapidly and malware spreads across the globe. Considerable countermeasures have been developed to protect and react to cyber-attacks and cyber-crime. Despite the reactive and preventive security measures taken to protect networks, forensic investigation of critical information infrastructure is still necessary. Security operation centres (SOC) store security alerts produced by network security appliances. They also store partial network traffic. On the other hand, network forensic systems must store all network traffic. Digital forensic process and investigation depends on the information stored in security operations centre (SOC) communication channel, other network appliances and raw traffic stored in forensic system. The appliances needed to perform the forensic process on this communication channel help the investigators to answer the six questions in forensics: why, how, when, what, where, and who committed the crime.
  • 2. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 44 Digital forensic process for cyber-attack and cyber-crime investigation is an intelligent task. To perform the investigation successfully, the investigator has to be innovative and intelligent. Observing the attack and crime evidence, the investigator intelligently extracts the information from traffic and alerts stored in security appliances. After analysing the evidence, the investigator either accepts or rejects the hypothesis. In this paper, we present an architecture for network forensic solution, in which we cover weaknesses of current commercial products and research frameworks. Commercial products and solutions establish themselves in analysis capabilities such as session reconstruction, signature analysis, statistical analysis and searching methods with reasonable speed and storage capabilities such as supporting of 1G or 10G traffic. Research frameworks focus on different aspects in network forensics such as distributed storage and searching of evidence, use of soft computing based methods in forensic analysis, etc. Some key components make up our architecture, bringing advanced capabilities and nearly unlimited scalability to bear on network traffic monitoring, analysis problems, anomalous behaviour analysis, online executable filtering, online processing, clustering and analysis of executable to our proposed architecture. The purpose of this paper is to present a unique network forensics tool that will allow the network forensics examiner to participate more effectively in the analysis of a network-crimebased investigation. Using this network forensics tool, the network forensics examiner can enhance the success of solving the case attributable to the accurate, timely, and useful analysis of captured network traffic for crime analysis, investigation, and/or intelligence purposes. The following chapters are organized as follows. Network forensic architectures and frameworks are presented in chapter 2. Our proposed architecture of network forensic system for large scale networks like telecommunication infrastructure network is presented in chapter 3. We compare our proposed architecture with existing network forensic systems in chapter 4. The following formatting rules must be followed strictly. This (.doc) document may be used as a template for papers prepared using Microsoft Word. Papers not conforming to these requirements may not be published in the conference proceedings. Every organization or network requires a specific architecture for its forensic system depending on its characteristics and goals. Various frameworks and architectures for network forensic systems have been introduced [1]. These frameworks can be classified as follows: distributed system frameworks [2, 3, 4, and 5], dynamic network frameworks [6], soft computing based frameworks [7, 8, 9, and 10] and graph based frameworks [11]. Further, we investigate an example framework of each class in detail [5]. Fornet is a distributed network forensic framework. In 2003, Shanmugasundaram et al. introduced Fornet which is a distributed network logging mechanism over wide area networks. This system is developed for digital forensic purposes. The framework is composed of two components: SynApps and Forensic Server. SynApp integrates to network devices, such as switches and routers and summarizes and remembers network events for a time interval and is able to verify these events with certain confidence levels. Although a single SynApp can provide very useful information to a forensic analyst, a network of such co-operating appliances would bring powerful new possibilities to the types of information that could be inferred from the combined SynApps. Networking SynApps would also help to share data and storage and answer
  • 3. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 45 to the queries accurately. These SynApps can be organized in a peer-to-peer architecture to collaborate with each other in absence of centralized control, although a hierarchical architecture is simpler and would work better with the given structure of the Internet. In the hierarchical architecture all the SynApps within a domain form a network. They are associated with the Forensic Server of that domain. In fact, Forensic Server is a centralized administrative control for the domain which manages a group of SynApps in that domain. Forensic Server receives queries from outside of its domain and processes them with the help of the SynApps and passes the results back to the sender after authentication and certification. Network of SynApps form the first level of hierarchy in ForNet hierarchical architecture. Forensic Servers can also be networked for inter-domain collaboration which forms the second level of the hierarchy. Queries that need to cross domain boundaries go through appropriate Forensic Servers. A Forensic Server is the only gateway to queries sent to a domain from outside the domain boundaries. In other words, a query sent to a domain goes to the Forensic Server of that domain, is authenticated by the server and passed on to appropriate SynApps in the domain. Likewise, the SynApps process results are sent to the Forensic Server that is in control of the domain to be certified and sent back. In practice, queries begin from the leaf nodes of a branch in the hierarchy, traverse Forensic Servers in higher levels, and end up in leaf nodes in another branch. Queries usually travel in the opposite direction of the attack or crime. In 2007, Wang et al. proposed dynamic network forensic model based on the artificial resistance theory and multi agent theory [6]. The system presents a moment method to collect and store log data simultaneously. Furthermore, the system has the capability to collect the evidence automatically and to respond to network crimes rapidly. Agent theory is a new method for designing, analysing and implementing an open system. A group of agents solve the problems that cannot be handled by each of the agents. These agents have the same role as the protective white cells in human body. Therefore, the agent based security system is more flexible and is similar to a human body immunity system. Dynamic forensic network is used in large scale networks and stores digital data in a distributed and secure manner, when attacks happen. Soft computing approaches in network forensic systems deal with analyzing collected data and classifying related attacks. Neural network and fuzzy tools are used to verify the occurrence of attacks. In 2007, Zhang et al. proposed a network forensic system based on neural networks and feature extraction with ANN-PCA [10]. Storing and analyzing large amounts of information poses important challenges for network forensic experts. ANN-PCA correlates features with attacks and reduces the amount of stored data. ANN-PCA techniques are used for fraud detection, feature extraction and signature generation for new attacks. FAAR algorithm is used to classify and to search for relational rules and to compute PCA values. Feature extraction in ANN-PCA increases classification accuracy and decreases the data storage amount. In 2008, Wang and Daniels proposed a graph-based approach for network forensic analysis [3]. The brief description of the main components of this work is as follows:
  • 4. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 46 • Evidence collection module, which collects digital evidence from heterogeneous sensors on networks and hosts. • Evidence preprocessing module, which transforms collected evidence into standardized format and reduces the redundancy in raw evidence. • Attack knowledge base, which provides knowledge of attacks, their phases and target vulnerabilities. • Assets knowledge base, provides knowledge of the networks and hosts under investigation, including network topology, system configuration and value of entities. • Evidence graph manipulation module, generates the evidence graph by retrieving preprocessed evidence from the depository. Hypotheses and out of band information are also instantiated into the evidence graph through graph edit operations. • Attack reasoning module, performs semi-automated reasoning based on the evidence graph. In the hierarchical reasoning process, results of local reasoning provide instant updates to the evidence graph. 3. A REVIEW ON NETWORK FORENSIC SYSTEMS Net Witness Company [17] offers modular hardware and software network forensic solutions. Considering the modular and scalable architecture of Netwitness products, they can be used in small sized companies and organizations, large multinational enterprises, datacentres and ISPs. Net Witness architecture consists of five subsystems: network traffic collection subsystem, data processing subsystem, data synchronization subsystem, indexing subsystem and analysis subsystem. SiLK is an open source analysis software [18] which consists of a set of command-line tools which processes flow records collected through SiLK Packing System. SiLK tools read and process flow records gathered in binary format (segmentation, sorting and analysis). Some of the analysis capabilities of SiLK include: filtering, displaying and sorting, counting and classifying, processing and storing statistical information, labelling based on port number and IP address. Silent Runner is a tool used for collecting and visualizing the data. Some of the analysis capabilities of this tool are: correlating network traffic with log and alert files, analysis of content and pattern, analysis of requested security incident. This tool has a simple and flexible architecture. Silent Runner monitors and analyzes network and application layer data. 4. OUR PROPOSED ARCHITECTURE Our proposed network forensic system architecture for large-scale networks is presented in Figure 1. The main components of this system are as follows: Network traffic collection and indexing subsystem • Database management subsystem • Analysis subsystem • SOC Communication part • Database.
  • 5. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 47 Each of these components are described in the following subsections. Figure 1 The Proposed Architecture for our network forensic system 4.1.Network Traffic Collection and Indexing subsystem Traffic collection is referred to the set of the following operations: Receiving traffic through the network interface or importing data from an external file or database, Applying filters or storing the traffic in the system database for further use in next phases. We use indexing to provide quick access to the required data among the mass data. Indexing and the method to perform it define an important part of system speed parameter both in receive and store phase and in analysis phase [5, 6]. Indexing is an important parameter that has implications on network forensic system speed, in both collection and analysis subsystems [5, 6]. The implementation on indexing component depends on the file system. Macro architecture of traffic collection and indexing subsystem is shown in figure 2. We describe it in the following subsections.
  • 6. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 48 Figure 2 Macro Architecture of Traffic Collection and Indexing Subsystem 4.1.1. Network Traffic Collection Traffic data can be collected with two different technologies. First, span/mirror ports indicate the ability to copy traffic from all/one port to a single port. Second, Rap devices monitor the traffic flowing between two points in the network. Both methods have their own advantages and disadvantages, and each of them can be used in a forensic system with proper analysis and consideration of the expected level of advantages and disadvantages. SPAN ports have lower cost and lower reliability compared with TAP devices. Routers doesn't send received packets with inconsistent CRC to SPAN ports. Another disadvantage of SPAN port is the possibility of bandwidth overflow of a port and packet loss. The reason is that the traffic of all the ports are transmitted through one single port. Unlike the SPAN port, TAP devices send a copy of all packets transmitting on an input line to the network to two separate lines with the same bandwidth as the original line. Currently, in SOC systems, data is transmitted to Intrusion Detection Systems using TAP devices. An image of the traffic can also be stored in the forensic system. The policy for data collection is determined by the company using this system. Moreover, our forensic system must have the capability to import and index network traffic data using network packet files. Our system must be compatible with different network traffic file types.
  • 7. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 49 4.1.2. Network Filters Network layer filters separate the packets without session reconstruction. In other words, in this type of filtering, packets are classified based on their headers. Header information of three TCP/IP layers – network, internet and transport layers- is used to separate the traffic without session reconstruction. Some of the header information used for traffic filtering is shown in Table 1. Table 1 Protocol Stack Layers and their Characteristics for filtering 4.1.3. Parsers Parser is a program that receives continuous string of symbols and parses it to defined units. Parsers are usually one of the main components of a compiler in programming languages. In this article, parsers are used to scan the information of a reconstructed session and search for certain characteristics in that string. For example, a parser specific for MAIL Standard protocol is used to scan an e-mail session. The parser scans the whole session to find information such as source account, content, etc. The parser put this information in the memory for application layer filtering. 4.1.4. Application Layer Filters After session reconstruction and extraction of application characteristics, the necessary rules for traffic filtering based on application layer characteristics should be developed. Filtering at this layer is the same as lower layers and traffic filtering is performed based on application layer rules. For example, a rule can be defined to store the header information of SSL packets without payload. The goal of network and application layer filters is to limit input/output traffic storage. In both filters (network and application layer), the system admin should be able to choose the possible actions performed on the packet considering the rule i.e. the future of the packet is determined based on the rule applied to it. Some examples of possible actions on the packet are: session reconstruction of the packet, storing network metadata in the process of data mining. All possible actions for the rules should exist in the system.
  • 8. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 50 Network traffic collection and indexing subsystem resides on an isolated hardware and is placed in network endpoint. It receives a copy of traffic from the Mirror port as input. Scalability and distribution are basic requirements of the collection subsystem. The subsystem must be able to receive network traffic from multiple points in the network simultaneously. For example, suppose that network traffic is received from one 10G Ethernet port and two 1G Ethernet ports. In this case, three traffic collection subsystems are installed in the network separately. The metadata collected by each of these collection subsystems, must be integrated and stored in the system. 4.1.5. Indexing In this phase, indices are generated from network traffic to speed up database access (see figure 2). Indices provide quick access to data. Indexing and the way it is performed, is very important in determining the speed of system in collection and analysis phases. 4.2.The Analysis System The analysis system is used to analyze the stored data in database and consists of three parts: Analysis and Investigation system, Report, Alert and Visualization System and Malware Analysis System. 4.2.1. The Analysis and Investigation Subsystem This system provides analysis capabilities for raw traffic stored in database. Analysis in this system is based on counting (counting the packets, sessions, etc.). Metadata generated in this system consist of different parts (such as source IP address, destination IP address list). The analysis and investigation system provides the capability to focus in metadata, part of metadata, sessions in some part of metadata and to investigate the information related to that particular part more closely. For example, it should be possible to query for metadata for sessions with certain source IP address, related services such as TCP/IP/HTTP, session size in KB and to query for related events and to reconstruct their sessions [7]. Network analyses are performed on layers 2 to 7. Analysis can be done in the following ways: session analysis, path and content analysis, finding the sources of external threats, mapping IP addresses to geographic location, storing data in the sessions, displaying data as seen by the user (web, voice, email, chat, files, etc.), searching and analyzing the contents and sessions (MAC, IP, keyword, usernames, …), the ability to define parsers and alerts, the ability to define customized operations. Some of the results and outputs of this unit are: alerts, Source and destination IP addresses, source and destination port numbers, IP address, title, email content, session graph display, server program, service type (HTTP, SSL, DNS, …), sites used, attachments, file types, username, reconstructed sessions and protocols restored content such as web page and email content, decrypted and decompressed content.
  • 9. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 51 The following analysis methods are provided by this unit: Temporal Analysis: storage and display of sessions and operations in chronological order and limiting the investigation to a particular range of time. Packet Level Analysis: displaying the number of packets for each metadata. Session Level Analysis: displaying the number of sessions for each metadata. File Content Analysis: Specifying the name, type and origin of metadata. Moreover, the system should provide the capability to perform these analyses: Temporal Analysis: Displaying the start time and end time of incidents to create incident time axis, displaying incident duration. For example, displaying how fast the malware spreads and the life time of an incident. Incident Source Analysis: the source of the attack is determined. Incident Destination Analysis: The destination of the targeted attack is determined. Relation Analysis: The relations between attack sources and also the relations between culprit and victim is determined. 4.2.2. Reporting, Alerting and Visualization Subsystem This subsystem is connected to various databases. In this subsystem, graphical representations of volume of traffic and protocols used are created. Files, contents and exchanged information with different protocols are extracted and displayed in visualization unit. In this subsystem, the information stored in different databases is investigated and online reports are created. 4.2.3. Malware Analysis system The system architecture is shown in Figure 4. It consists of four main units: file signature control unit, network anomalous behaviour detection unit, automatic sandbox, and domain knowledge unit. Each of these units is described as follows. Figure 4 Malware Analysis system components File
  • 10. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 52 File Signature Control Unit: Malware file signatures are created in this unit and are compared with signatures of executables that are transmitting over the network. Network Anomalous Behaviour Detection Unit: In this unit, with respect to network traffic characteristics, network bandwidth and server capacity thresholds are determined to detect anomalous behaviour in the network. Behavioural profiles are also created. Moreover, traffic is analyzed online and in real time from the network behavioural perspective. In this method, network behavioural pattern in a time period is considered as network's normal behaviour and network normal pattern in time is measured based on it. Using this method, some of network risk areas which are not addressed in other methods are covered. The other analyses are not addressed in this system. Domain knowledge unit: In this unit, if possible, latest malware signatures are received from other companies inside and outside of the company. Automated Malware Analysis section: In this unit, executable files transmitting over the network are first extracted. Unknown executable samples run in sandbox controlled environment and their behaviour are logged. Malware behaviour profile is extracted from recorded logs, network traces, registry changes and access to files. This profile is used for different purposes. Identification and seizure of malwares transmitting over the network are two main applications of this section. This section is composed of two main units: • preprocessing and filtering • Automatic sandbox [11,12] Figure 5 shows the overall scheme of the unit. Automated malware clustering and analysis have the following benefits: • A new executable is analyzed rapidly and is determined whether it belongs to known or unknown family. • If malware belongs to a known family, there would be no need for dynamic analysis. Therefore fewer samples are analyzed in sandbox. The sandbox platform should be capable of online analysis of malware samples. Figure 5 Overall Scheme of the Automatic Malware Analysis Unit. The main responsibilities for each of the units of this section will be explained sequentially.
  • 11. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 53 Preprocessing and Filtering Unit: The purpose of this unit is principally focused on extracting executable codes, reducing their count and separating unknown samples. There are different approaches to achieve this goal. We explain one approach here. This approach is shown in figure 6. Figure 6 A Scheme for Executable Code Preprocessing and Filtering Unit Here we explain different units of this scheme [8, 9, and 10]. Feature extraction: First, static features of each sample are extracted without executing the code. They are extracted from the code. Some of these features are as follows: file structure, antivirus analysis results of the code. Cluster prediction: Behavioural profiles and static features of the code are used as input to this unit. Here, we attempt to predict the behavioural cluster of the sample, using a supervised learning approach. Cluster scoring: In this phase, a score is assigned to each sample which investigates the dissimilarity of the sample in the cluster. High score samples are passed to dynamic analysis phase. Dynamic analysis: Selected executable samples are executed in the sandbox. The network level and host level behaviour observed during execution is condensed in a set of behavioural features. The set of features is fed back to the cluster ranking phase. We cluster malware samples based on their malicious behavioural features. The behavioural cluster that a sample belongs to, is fed back to cluster prediction phase. Therefore, high score samples from preprocessing phase are fed as input to dynamic analysis phase and behavioural characteristics of malware samples are output from the sandbox. These characteristics are stored in a behavioural profile. The profiles are expressed by OS objects and OS functions. 4.3. Database Management Security Operation Center is responsible for receiving network security events from different security tools, and correlating and analyzing them.
  • 12. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 54 Connection to Security Operation Center occurs in data management section. A general view of connection to security operation center is shown in figure 7. Network forensic system searches for patterns. The requests are sent to security operation center and appropriate responses are received from database management system in an acceptable time. Figure 7 Communication to the Security Operation Center APIs should be placed between SOC and analysis system to covert data structures transmitting between different units. Database management unit should combine raw traffic with alerts transmitted from security operations center. Considering Telecommunication Infrastructure policies, the forensic system might be authorized to access and search in alert databases and correlation logs directly. Searches must be performed with proper speed. 4.4. Database There are two methods for storing traffic and metadata. The first method is clustered storage [16]. In this storage, all raw traffic and metadata are aggregated and stored in server farm. The advantages of this technology include: integration of traffic stored in the network to be used by all security units, reducing setup and maintenance costs, and increasing the system security. In contrast, implementation complexity and the need for information about system implementation details are possible disadvantages of clustered storage subsystem. 5. A COMPARISON BETWEEN OUR METHOD AND OTHER PROPOSED METHOD Table 2 shows different aspects and components of NetWitness, Silk and Solent Runner system and compares them to our proposed architecture. It shows strengths and weaknesses of our architecture in comparison with other products. 6. CONCLUSION The main purpose of forensic systems is to help the investigators to identify criminals and crime signs. Strength of a network forensic system depends on its ability to process network traffic with a speed proportional to data transmission and analysis.
  • 13. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 55 In this paper, we propose an architecture of a forensic system for security operation center. It is composed of several units: data collection and indexing, database management system and analysis system. The proposed architecture tries to use maximum existing potentials to optimize designed system efficiency. Compared to existing frameworks, our proposed architecture brings us advanced capabilities for dynamic malware analysis and clustering and analysis and network behavioural analysis. Table 2- The proposed architecture compared with existing systems References [1] Emmanuel S. Pilli*, R.C. Joshi, Rajdeep Niyogi, Network forensic frameworks: Survey and research challenges, Digital Investigation 7 ( 2 0 1 0 ) 1 4 – 2 7. [2] Shanmugasundaram K, Memon N, Savant A, Bronnimann H. ForNet: a distributed forensics network. In Proceedings of the second international workshop on mathematical methods models and
  • 14. International Journal of Computer Networks & Communications (IJCNC) Vol.7, No.4,July 2015 56 architectures for computer networks security (MMMACNS 2003), LNCS 2776. Springer; 2003. p. 1– 16. [3] Wang W, Daniels TE. A graph based approach towards network forensics analysis. ACM Transactions on Information System Security (TISSEC) Oct. 2008; 12 (1). [4] Terrence V. Lillard, Clint P. Garrison, Craig A. Schiller and James Steele, Digital Forensics for Network, Internet, and Cloud Computing, A Forensic Evidence Guide for Moving Targets and Data, 2010. [5] Cherie Cheung and Jue Wang, "Data Partitioning and Indexing for Network Forensic Analysis". [6] R. Geambasu, T. Bragin, J. Jung, and M. Balazinska. On-Demand View Materialization and Indexing for Network Forensic Analysis. In Proceedings of NetDB 2007, April 2007. [7] http://www.netwitness.com/ [8] Matthias Neugschwandtner1, Paolo Milani Comparetti1, Gregoire Jacob2, and Christopher Kruegel FORECAST – Skimming off the Malware Cream. In Proceedings of the 2011 Annual Computer Security Applications Conference (ACSAC). December 2011. [9] U. Bayer, P. Milani Comparetti, C. Kruegel, and E. Kirda. Scalable, Behaviour-Based Malware Clustering. In Network and Distributed System Security (NDSS), 2009. [10] G. Jacob, M. Neugschwandtner, P. Milani Comparetti,C. Kruegel, and G. Vigna. A static, packeragnostic filter to detect similar malware samples. Technical Report 2010-26, UC Santa Barbara, 2010. [11] Anubis. http://anubis.iseclab.org. [12] Norman Sandbox. http://sandbox.norman.com. [13] C. Sartori and M. R. Scalas. Partial indexing for nonuniform data distributions in relational DBMS’s. IEEE Transactions on Knowledge and Data Engineering, 6(3):420–429, 1994. [14] Stonebraker et. al. C-store: a Column-Oriented DBMS. In Proceedings of the 2005 VLDB, pages 553–564, 2005. [15] Lukasz Golab, Theodore Johnson, J. Spencer Seidel, and Vladislav Shkapenyyuk, Stream warehousing with Data Depot, SIGMOD 2009, pages 847-854, New York. [16] G. A. Gibson, et al. A cost-effective, high-bandwidth storage architecture. Architectural Support for Programming Languages and Operating Systems. Published as SIGPLAN Notices, 33(11):92–103, November 1998. AUTHORS Tala Tafazzoli received B.S. degree in computer engineering from Sharif University of Technology and received M.S. degree in computer engineering from Amirkabir University of Technology. She is a faculty member of network security group of Iran Telecom Research Center. Her research interest areas include: digital forensics, intrusion detection system and network security. Elham Salahi has a BSc degree in Computer Science from Sharif University, and an MSc degree in Applied Mathematics with a minor in Computer science from Iran University of Science and Technology. She has more than nine years of experience working as a researcher in ITRC. Her research interests are: digital forensics, Image Watermarking, intrusion detection system and network security. Hossein Gharaee received B.S. degree in electrical engineering from Khaje Nasir Toosi University, in 1998, M.S. and Ph.D. degree in electrical engineering from Tarbiat Modares University, Tehran, Iran, in 2000 and 2009 respectively. Since 2009, he has been with the Department of Network Technology in IRAN Telecom Research Center (ITRC). His research interests include general area of VLSI with emphasis on basic logic circuits for low-voltage low-power applications, DSP Algorithm, crypto chip and Intrusion detection and prevention systems.