Evaluating Network Forensics Applying Advanced Tools
Evaluating Network Forensics Applying Advanced Tools
Science (IJAEMS)
Peer-Reviewed Journal
ISSN: 2454-1311 | Vol-9, Issue-4; Apr, 2023
Journal Home Page: https://ijaems.com/
Article DOI: https://dx.doi.org/10.22161/ijaems.94.1
Received: 24 Feb 2023; Received in revised form: 18 Mar 2023; Accepted: 25 Mar 2023; Available online: 03 Apr 2023
Abstract— Network forensics comes under the domain of digital forensics and deals with evidences left
behind on the networkiafter a cyber-attack. It is indication of the weakness that led to the crime and the
possible cause. Network focused research comes up with many challenges which involves the collection,
storage, content, privacy, confiscation and the admissibility. It is important and critical for any network
forensic researcher or the investigator to consider adopting efficient forensic network investigation
framework or the methodologies in order to improve investigation process. The main aim of this research
contribution was to do a comprehensive analysis of concepts of networks forensics through extensive
investigation and by analyzing various methodologies and associated tools which should be used in the
network forensic investigations. Detailed and in depth analysis of concepts of network forensic investigation
on a designed/conceived network architecture was carried out which was then followed by analyzing various
methodologies and tools employed. An innovative framework for the investigation was designed which can
be used by any forensic expert. The acquired data was analyzed by using information, strategizing and
collecting evidence and by analyzing and reporting of the methodologies on the conceptualized network.
Consequently, it led to the researcher to adopt and utilize a powerful and efficient forensic network
methodology that will ultimately help in improving the investigation process and providing required
tools/techniques along with the requisite guidelines that will determine the approach, methods, and
strategies which are to be used for networkiforensiciprocess to be followed and be executed with the use of
relevant tools that will tend to help in the simplification and improvement of the forensics investigation
process.
Keywords— Forensic Science, Network Forensics, OSCAR.
Network forensics falls under the category of (DF) related The subsequent domains falling under them are shown in
to monitoring and analyzing computer network traffic for the figures below.
data collection purposes. Unlike DF, network forensic deals
with dynamic information. It comes under the domain of DF
and is related to the investigation of evidence left on the
network following any cyber-attack. This forensic allowed
the businesses to make it possible to enhance their security
situation and apply the requisite corrections appropriately.
In fact, networkiforensics is a subset of the digital forensics
itself is a branch of intelligence science - where jurists look
for technologies or data that contain criminal evidence.
Network forensics, surprisingly, refers to the investigation Fig.1.4: Computer Forensics
and analysis of all network traffic suspected of cybercrime
i.e. proliferation of malicious software that steals data.
Law enforcement agencies use network forensics to analyze
network traffic data collected from suspected criminal
activities. Analysts will search for data that identifies
human interactions, file fraud, and through use of keywords.
By the use of network and digital forensics, the law
enforcement agencies and the crime investigators can track
communications and can easily set up time-based network
events installed through a network controlled system.
In addition to criminal investigations, network forensics is
often used to analyze network events in order to trace the
origins of robberies and other security-related incidents.
This includes looking at suspected network locations,
collecting information about network features and resources
& identifying incidents of unauthorized network access. Fig.1.5: Mobile Forensics
There exist 2 methods for full network forensics;
1. Catch as much as possible" method: Capturing
network traffic for analysis requiring long process and
maintenance.
2. Stop, watch and listen method: Based on analyzing
each data packet which passes across network only what
looks like suspicious and worthy of analysis data thus
needing lots of processing power but can be achieved by
less storage space.
Unlike DF, network forensics are much harder to perform
as data transferred across the network and then lost; in CF
data is usually stored on disk or solid state storage which
makes them easy to access.
The applications of Digital Forensics are shown below; Fig.1.6: Database Forensics
It is important to review several cases subjects where the • Identification of Malicious Activities
concept has been used sufficiently. In particular, Kurniawan
• Identifying the Source of Activity
and Riadi [15] were able to test again use the unique
framework from which it was obtained use the concept of • Application of Tools
networkiforensics analysis once point to the behavior of the • Decision Making based on Data Analysis
infamous Cerber Ransomware. As noted by Messier and
The designed network will be analysed using the following
Bensefia and Ghoualmi, most fire protection systems have
tools.
the ability to use software power in UNIX/Windows
platforms [16] [17]. • Wireshark
Wireshark packet analyser: network troubleshooting,
It is noteworthy that most Honeypot services are secretive analysis, software and communications protocol
[18]. Honey jars are considered important components development.
which help to improve organizational safety [19]. Network • Tshark
forensics is different from access by the evidence gathered
must be accepted in court as well hence satisfying TShark network protocol analyser: Captures packet data
technical/legal concerns [20]. from a live network.
• Dumpcap
While the acquisition of intervention helps in improving Dumpcap is network traffic dump tool: Captures packet
computer network security, network forensics are key data from a live network & writes them to file.
corresponding to the need to identify related evidence
• Network Forensic Analysis Tools (NFATs)
security breach. Network forensics is helpful resolving
issues related to online terrorism, child pornography, drugs, NFATs help administrators monitor their environment for
national security, cybercrime, and corporate intelligence, anomalous traffic, perform forensic analysis and get a clear
among others [21] [22] [23]. picture of their environment.
The focus of this research contribution is cantered towards
2.2. Literatures Gaps the need to find and look at the malware affecting network
hosts. The analysis of the network behaviour can come up
There is a need to develop some tools that can parse varied with infections, exploited channel, and the payload with
network protocols in place or embedded in different ransomware. As we are focussed on the network forensics,
networks. As most of the information carried on the hence, in order to move forward, the forensic mechanisms
networks is volatile, it is essential that it should be preserved need to be looked at which fall under the following
in order to expedite the forensic process. categories.
• Network Security Forensic Mechanisms
III. RESEARCH METHODOLOGY AND
o Embedding the Firewall forensics in the network.
FRAMEWORK
• Honeypot Forensics
This section deals with the research methodology and
conceptualized framework of this research used by the o Network system designed is such to allure by
researcher. depicting information as critical and sensitive.
3.1. Research Methodology A typical firewall forensics scenario is shown in the below
After going through the detailed literature review, figure. The firewall has to detect and mitigate the threat
the research selected the base paper [24]. This research from the attacker using the IPs as identifiers.
contribution is based on following a comprehensive process
A typical honeypot deployment is shown in the below
which will be executed by using OSCAR (obtain, strategize,
figure. The honeypot is placed between the internet network
collect, analyze and report) principles.
and the firewall and the attacker instead of breaking the
firewall is allured towards the honeypot considering it as the
main network server. This saves the other network servers
Fig. 3.1: OSCAR from being attacked and compromised.
Fig.4.3: Capturing Traffic using Wireshark Tool • Designed an innovative OSCAR Framework
which can be adopted in any network forensic
analysis implementations.
• It was found that Network forensic science is
extremely essential important and it helps a cyber-
forensics investigator to;
o O - Obtain
o A - Analyse
o E - Evaluate
Fig.4.4: Penetration Testing with Burp Suite & Wireshark o C - Categorize
(Uncovering Vulnerabilities)
o I - Identify crucial evidences
• Helps in apprehending cyber-criminals
• Network forensics investigator should adopt and
utilize efficient forensic network investigation
methodologies
• OSCAR methodology equips forensic investigator
with critical tools and guidelines to develop;
Fig.4.6: Network Miner for Analysis of Network Traffic 5.2. Future Recommendations
Following are the recommendations for future research
work.
V. CONCLUSIONS AND FUTURE
RECOMMENDATIONS • Development tool kits which can analyse varied
network protocols.
The section looks at the conclusions of the research and the
future recommendations. • Preserve and document data selectively in advance
5.1. Conclusions to speed up the forensic process.
Following are the outcomes and conclusions of this research
contribution.