5 Analysis of Challenges in Modern Network Forensic Framework
5 Analysis of Challenges in Modern Network Forensic Framework
Research Article
Analysis of Challenges in Modern Network Forensic Framework
Received 3 September 2020; Revised 15 July 2021; Accepted 13 August 2021; Published 29 August 2021
Copyright © 2021 Sirajuddin Qureshi et al. ,is is an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is
properly cited.
Network forensics can be an expansion associated with network security design which typically emphasizes avoidance and
detection of community assaults. It covers the necessity for dedicated investigative abilities. When you look at the design, this
indeed currently allows investigating harmful behavior in communities. It will help organizations to examine external and
community this is undoubtedly around. It is also important for police force investigations. Network forensic techniques can be
used to identify the source of the intrusion and the intruder’s location. Forensics can resolve many cybercrime cases using the
methods of network forensics. ,ese methods can extract intruder’s information, the nature of the intrusion, and how it can be
prevented in the future. ,ese techniques can also be used to avoid attacks in near future. Modern network forensic techniques
face several challenges that must be resolved to improve the forensic methods. Some of the key challenges include high storage
speed, the requirement of ample storage space, data integrity, data privacy, access to IP address, and location of data extraction.
,e details concerning these challenges are provided with potential solutions to these challenges. In general, the network forensic
tools and techniques cannot be improved without addressing these challenges of the forensic network. ,is paper proposed a
thematic taxonomy of classifications of network forensic techniques based on extensive. ,e classification has been carried out
based on the target datasets and implementation techniques while performing forensic investigations. For this purpose, qualitative
methods have been used to develop thematic taxonomy. ,e distinct objectives of this study include accessibility to the network
infrastructure and artifacts and collection of evidence against the intruder using network forensic techniques to communicate the
information related to network attacks with minimum false-negative results. It will help organizations to investigate external and
internal causes of network security attacks.
can protect the interest of their customers. ,ese companies signature scan detection. In anomaly detection techniques,
continuously analyze the traffic to detect the potential the system creates patterns of behavior of the user and the
malicious attacks as soon as possible and deal with them in network’s resources. ,e irregular pattern of traffic is de-
time. tected as malicious by the anomaly detection technique [20].
,e term “malicious” may refer to the malicious packets ,e signature scan is one of the detection techniques in
of data or malicious traffic programs. ,e malicious traffic which traffic signatures are stored in the network’s database.
programs are irregular traffic patterns. Malicious data Recognition of irregular patterns is performed with the help
packets can be identified as those that violate network of passive scans [21]. ,e malicious activity is detected when
communication principles. ,ese malicious packets attack the signature matches the one stored in the database. ,is
the network by exploiting the vulnerabilities of the devices technique is particularly useful when the attackers in the
installed for security purposes, which may occur, including system are known. ,e intrusion detection systems work
the gateways and the attempts to gain unauthorized access in based on statistical anomaly and matching patterns [22]. ,e
the network. In the case of malicious packets, various packet 136 malicious traffic is detected using statistical anomaly
fields contain forged information, that is, port numbers, when the usage patterns deviate from the normal usage
TCP flags, and IP address [16]. For example, IP spoofing is a patterns. ,e system forms the standard usage patterns, and
specific kind of attack in which the attacker uses a spoofed the purpose of creating them is to identify any deviation
IP, and it may appear as a trusted node. ,e attacker can be from the standard usage patterns. Access control list is a
connected with the victim node by registering as a trusted technique in which the rules for determining malicious
user on the network [17]. ,e land attack is another form of activities are predefined, and the intruders are detected
spoofing in which the intruder uses the victim’s destination based on matching packet headers [23]. ,e honeypot
and source of IP addresses. ,e victim of this attack enters technique is the one that acts as the trap for the intruders. It
into a loop of self-connection attempts. ,e intruder can prevents users from entering the secure areas of the network
alter the TCP flags to indicate several events, including [21]. ,e trap that honeypot forms is a disguise whose role is
pushing off the data, highest priority of data, starting of to protect the server by replicating and persuading the at-
connection, and ending. ,e SYN TCP flag indicates the tacker to interact with the network. ,e honeypot requires
starting of the connection, and the FIN TCP flag indicates open ports to invite the intruder, and the attack is detected
the ending of the connection. A combination of these two when the intruder interacts with one of these ports. Network
flags, that is, SYN-FIN, can be used by the intruder to avoid forensics reconstructs the sequence of attacks and detects the
detection by the system’s security. Most of the available intrusion based on historical network data [9]. It collects and
intrusion detection systems detect the connection’s starting captures the network packets to form emails, FTP traffic,
(SYN TCP flag) or ending (FIN TCP flag). ,erefore, any messages, and other communication forms. Network fo-
attempts to start or stop the connection are 112 considered rensics is significant to detect attacks in identifying the
unauthorized. ,e intruders can also attack by altering the problems in critical business systems. Some of the other
packet’s port numbers for source and destination ports and functions performed by the network forensics may include
can communicate the packets abnormally. ,e networking monitoring the workflow regularly for corporate defiance,
device discards the packet if the intruder assigns the same enhancing the network’s performance, shielding against the
port numbers to both of the ports. ,e communication also viruses, and locating the device that has the potential to
becomes suspicious when the intruder tampers with the generate an attack.
packet or performs fragmentation of the packets [18]. ,e
packet fragmentation is performed when the packet’s size is 2. Research Methodology
too large to be transmitted. ,e intrusion can be conducted
in the form of tiny fragment attacks; two TCP fragments are 2.1. Classification of Modern Forensic Techniques. ,is sec-
formed from each packet. Each of these fragments contains tion consists of the proposed taxonomy of network forensic
little information, and they are transmitted in the form of techniques; their evaluation, implementation, and the crit-
tiny fragments. ,e network devices cannot detect the tiny ical review of these techniques are presented as presented in
fragments, and bypassing the security protocols is the related domain [24–28]. Figure 2 shows the components of
outcome of such transmission. On the other hand, some modern forensic techniques.
intruders use large packets of information to perform an
attack. ,e packets are reassembled at the receiving device;
however, when the reassembled packets become too large, 2.2. Traceback-Based Network Forensic Technique.
the reassembling process becomes disturbed, affecting the Traceback is a specific term used when the origin of the
entire network. Such an attack is known as the Ping of Death packet is to be identified in a network. It is also known as the
Attack. ,e intruder uses echo request messages, and the size IP traceback [12]. IP tracing is a useful tool for analyzing and
of packets in such a message is larger than the regular size attribution of network assaults, Figure 3. ,is technique
packets [19]. ,e network operators carry out active mon- determines the origin of the attack by identifying the device
itoring of the events to detect malicious programs and from where packets are generated. ,e traceback technique
packets. Anomaly detection is one of the techniques of active is useful when packets’ origin is to be identified in case of
monitoring. Some other techniques also include honey pots, spoofing attacks and DDoS attacks [29]. ,e DDoS and
access control lists, intrusion detection systems, and botnet attacks are mostly observed in the distribution
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
4 Security and Communication Networks
Digital Media
Stegenography
Covert Data
Storage
Network
Stegenography/
Covert Chennels
Covert Data
Communication
Local and out-of band
Chennels
R7
HOST1
R4
R6 R2 R1 VICTIM
ATTACKER
R3
R5
HOST2
Attack Path: A R6 R3 R2 R1 V
Trackback: V R1 R2 R3 R6 A
Figure 3: Network forensic using IP traceback.
networks, and the traceback technique is useful in such monitoring system. However, investigation of post-
attacks. ,e distributed networks are more susceptible to mortem captures packet is operated offline
attack because they collaborate with the Internet, and the Source of data: flow-based process mainly collects
atmosphere is favorable for the attacks by the bot-masters statistical records in the form of the flow of network
[30]. ,e network requires various traceback systems to traffic where packet-based tool includes thorough
overcome these attacks efficiently: packet inspection
Network forensics: the employment of scientifically
proved processes to gather, fuse, determine, examine, 2.3. Converge Network-Based Network Forensic Technique.
correlate, evaluate, and document evidence from this is Converge network-based network forensic techniques are
undoubtedly electronic, definitely processing and specifically useful in identifying the digital evidence found in
transmitting digital resources for the intended purpose the converged networks. ,e VoIP communication is a
of uncovering facts related to the planned intent or specific example of the converged network. VoIP requires a
assessed success of unauthorized tasks supposed to medium for data communication due to which it faces
interrupt, corrupt, and/or compromise system com- several kinds of vulnerabilities, security threats, and attacks.
ponents too as providing information to help in re- ,e communication signals in VoIP are divided into the
sponse to or recovery from these tasks form of frames, and these frames are embedded as voice
Analysis time: forensics covers real-time and includes codes in the data packets. ,ese data packets are commu-
security for live network surveillance and its nicated as simple voice packets on the IP network. When the
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Security and Communication Networks 5
voice packets are transmitted from a sender to a receiver ,e interaction and visualization framework is used in
without any modification and interference, they are known the attack graphs, and the purpose of using this framework is
as 181 normal voice packets. Typically, the voice packets are to study the intrusion behavior of the attack. ,ere are
transmitted over the IP networks using H.3231 and SIP thousands of edges and vertices, and it is a very time-
protocols [31]. ,e port and IP addresses information is consuming process to identify those susceptible to attack.
enclosed in the voice packets, assisting the communication Many research studies have depicted the attack graphs that
protocols. ,e communication protocols act as session can be used for different aspects, including critical systems,
control 184 protocols. ,e ports and IP addresses attached in data reduction, attack dependency graph, virtual exploita-
the voice packets are not encrypted because the address tion information, and others. However, only a few studies
translation devices have to translate the voice packets. ,e have emphasized the visualization process. ,e attack graphs
lack of encryption of the voice packets makes them sus- are very complex in large integrated networks, and RAVEN
ceptible to attacks from intruders. ,e intruder can exploit architecture was proposed to embed the visualization feature
the voice packets during transmission, which changes the in the attack graphs. ,e principal purpose of introducing
normal voice packets to the 188 malicious voice packets. ,e this architecture was to reduce the graphs’ complexity in
malicious voice packets may take several forms including the large networks. ,e RAVEN architecture has a visualized
exploitation of VoIP devices, degrading call integrity, pri- interface, and the investigators can interact with it with less
vacy leakage, eavesdropping, man-in-the-middle, buffer complexity due to this visualized interface. RAVEN has a
overflow, hijack calls, and flooding. Figure 4 can be referred collaborative environment that is analytical, and it has
for details. several gesture controls as well. ,e RAVEN architecture has
VoIP network forensic analysis involves identifying the a human-computer interaction platform that allows the
malicious packets from the normal packets [10]. ,e in- investigators to manage the attack graph more effectively. A
truders inject malicious or abnormal packets during the multitouch technology was integrated into the human-
transmission process. Lin et al. [10] offered a solution to such computer interaction platform to make it easier for the
attacks by collecting digital shreds of evidence while per- investigator to view each node and how they interact with
forming a forensic investigation. ,e digital proof is in the the entire network. Some of the other vital features of the
form of information received from packet value, TTL, RAVEN architecture include non-real-time visual support
service type, protocol, and the packet’s payload. A change in the real-time environment. However, the RAVEN does
found in the packets means that alteration has occurred, and not have a composite layout, due to which the investigators
the packet becomes malicious. ,e scholars have identified cannot observe the multiple attack paths in parallel. Another
different fields of voice packets to differentiate between disadvantage of using RAVEN is that it cannot mine the
different types of VoIP-NFDE. However, a common issue is related information from the network efficiently. Assaults
scalability, which is considered during the investigation of tend to be foiled by the utilized services and products, and
large integrated networks. Another problem is that the in- novel attacks still circumvent prevention services and
vestigation process may be prolonged because of the rees- products without being detected. During these circum-
tablishment of a communication link between IP phone stances, examining the assaults is just a task; this is certainly
users and the SIP registrar on its disconnection. Reestab- very challenging. Quite often, severe attackers tend to be
lishing the connection is time-consuming, and some useful skillful at concealing evidence. Consequently, firewall logs
data may be lost during the process. Similarly, storage re- and intrusion detection notifications may totally miss these
sources are also required to investigate the attack patterns assaults or may prove to be insufficient for the examination.
collected from the voice data. ,is is certainly extensive, especially when the target is to
apprehend the perpetrator.
Packet
Probabilistic Logging
Packet Marking SPIE
PPM AAPM DLLT AMN
APM HITS
SNITCH
FIT
AAST
ASEM AS-SPT
DPM LDPM
Deterministic DERM Proposed
Packet Marking
AS-Overlay
Autonomous
Systems based
Figure 4: Relationship among traceback techniques.
No
No Yes
the network traffic using the signature rule, which compares software-defined networks. Following are the open chal-
the packets with the already encoded packets. ,e proba- lenges extracted from review analysis and are in line with the
bilistic inference process is carried out through using Snort, network forensic techniques.
which triggers the rule when a specific packet matches the
pattern prerecorded in the signature rule. ,ese rules assist
the investigators in recognizing the potential attacks on the 2.8. High-Speed Data Transmission. High-speed data
network, and they also help the investigators to define new transmission is one of the biggest challenges for network
rules to prevent future attacks. AIDF also has some disad- forensics because it cannot capture and record all the packets
vantages; for example, the AIDF does not know based on the network because of high speed. Millions of data
modules because it cannot store hidden and untreated data. packets are transmitted on networks within a short period,
AIDF cannot be used to prevent future attacks because of and these packets pass through a vast number of inter-
this disadvantage. ,e storage of unprocessed information connected devices. ,e network devices can play a signifi-
can save a lot of time during the investigation process, and it cant role as evidence as the network data transmit through
can help to generate precise results. ,is mechanism can be them. To identify the network data’s susceptibilities, it is
used in creating intrusion detection alerts that can be used in necessary to record the data packets at high speed; however,
real-time situations. it is a very time-consuming process. Most companies en-
hance and expand their network structures. For this pur-
pose, the companies connect distributive infrastructures to
2.7. Review Analysis of Modern Network Forensics. ,is their high-speed networks. However, in most cases, network
section of the paper discusses the open challenges faced by traffic is not entirely captured by the distributive infra-
modern network forensic techniques (Figure 7). ,ese structures, and incomplete logs of network information are
challenges are significant to be studied while investigating obtained. ,e reconstruction of suspicious attacks becomes
large integrated networks such as cloud computing and more difficult because of these incomplete logs, and it
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
8 Security and Communication Networks
becomes tough to recognize the origin of the attack. ,is data system become low. Several causes of little integrity may
problem can be resolved only when capturing, indexing, include frequent mobility of data, system malfunctioning,
preserving, and analyzing the data packets on a network are malicious attacks, software errors, and hardware errors. ,e
carried out in a real-time situation. A review of the literature process of network forensic is adversely affected when the
suggests three distinct solutions for the aforementioned data loses its integrity because of deliberate and intentional
problems. ,ese solutions include distributive-based solu- efforts [5]. Data integrity is an essential factor while pros-
tions, software-based solutions, and hardware-based solu- ecuting the intruder in the court of law.
tions [19]. ,e hardware-based solution requires installing a ,e data integrity should be maintained using the end-
separate high-speed network traffic capturing device. ,is to-end approach. It means that the use of software, as well as
device can obtain specific data, and it can carry out a real- the hardware, should be seamless. Modern networks are
time analysis. ,e response time of this device is quick. ,e growing at a breakneck pace, and it is necessary to get early
software-based solution requires installing software on the updates about the problems and resolving the issues of the
network. ,e nCap library is the software that is specifically network as soon as possible. Standards and appropriate
designed to capture high-speed traffic on a network. ,is methodologies are required to efficiently achieve the ob-
software is used to program the customized hardware for jective of cost-effectiveness to maintain the integrity of data,
this purpose. ,is software is installed using the space of the specifically in large and distributed networks. Reference [5]
user rather than utilizing kernel space. ,e programmers can proposed a GUI-based monitoring system in which the
quickly deploy this software, and it can perform the func- server carries out the analysis of the network packets and
tions of capturing and carrying out analysis quickly. ,e then transmits them to client nodes for storage. It is a reliable
distributed solution involves using a distributed packet system because it improves the data packets’ analysis on the
capturing technique on high-speed networks. ,is technique network with real-time characteristics 348 and then stores
provides the load balance within different nodes and min- them in the storage spaces owned by the clients where they
imizes the cost of CPU cycles and memory. are safe from different kinds of vulnerabilities.
2.9. Data Storage on the Network Devices. ,e amount of data 2.11. Data Privacy. Data privacy holds one of the critical
captured and stored on the network for carrying out the positions within the realm of network forensics. ,e
investigation is tremendous. Such a large amount of data problem mentioned above can be resolved using a forensic
creates problems for forensic experts while retrieving rele- attribution solution. ,e forensic investigator can have a
vant information from these networks [39]. ,e inter- look at the particular data but only by verifying the signa-
connectivity devices’ storage capacity is low, and huge ture. ,is process is known as forensic attribution in any
storage space is required to store the captured data packets. network. Cryptographical tools can be used for this purpose,
Apart from this, the problem is resolved by designing a which may include BBS short group signatures and group
framework for capturing data by a machine based on time signatures. It means that anyone of the group members can
[9]. ,is framework minimizes the need for a massive create a signature, which is verifiable by the rest of the group;
storage speed and can also enhance the investigation however, the identification of the creator cannot be per-
process’s pace. formed without authentication from the rest of the members
Moreover, the General Processing Unit (GPU) offloads of the group. BBS small signature group has short signatures
the indexing packets when it carries out a compressed as compared to the group-signature scheme. It is in the form
bitmap index in real-time. ,e GPU performs determinis- of a clue that is associated with the optimization of the
tically, which results in parallel operations at the same speed evidence. ,e cryptographical tools used for this purpose
because of the advance and faster memory interfaces. ,e ensure that only known parties have awareness about the
storage speed reaches approximately a million records per hardware’s physical identity, which is transmitting the IP
second. In addition to this infrastructure, n2disk architec- packets on a network. In contrast, others cannot identify
ture can also be used for this purpose. It can be used for their physical status. As a result, the issue of data privacy is
single and multiple threat packet consumers, and it can resolved, which arises while analyzing the integrated
search the packets from the dump files efficiently. ,is in- networks.
frastructure can resolve the issue of storage space in high-
speed networks.
2.12. Access to IP Addresses. Identification of the IP address
of the attacker is an essential step in carrying out network
2.10. Data Integrity. Data integrity is one of the major forensics. ,e IP address of the source provides information
concerns for the investigators while performing the network about the origin of the attack [12]. Identifying the IP address
forensics. Data integrity means that the network must have can lead the investigators to the intruder and prevent future
the most consistent, complete, and accurate data. Analyzing attacks from the same intruder. ,e intruders use several
data integrity on the networks is one of the most challenging techniques to hide their IP addresses from the various de-
and critical tasks for the investigators. Maintaining data vices installed on the network. Spoofing the IP address is one
integrity is difficult, considering several factors, including such technique in which the intruder can show a fake IP
velocity, size, and scope of data. Network complications address to the devices registered on the network. Spoofing is
become higher when the trust and integrity of the data and the technique that is mostly used in DDoS attacks. ,e
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Security and Communication Networks 9
purpose of conducting DDoS attacks is to bombard the network is called the intercloud network between two or
network with enormous traffic from different suspect sys- more clouds. ,is network deploys a high capacity and high-
tems. Identifying the original IP address in case of spoofed IP speed line rate fiber optics network. ,e intercloud network
address becomes very difficult for forensic investigators, is used when one domain migrates or transfers an appli-
specifically in large integrated networks. A Source Address cation for execution or storage to another domain. ,e
Validation Improvement (SAVI) solves the problem men- intercloud network provides a dedicated network, and
tioned above, as it binds the source host Mac address, IP through the protocol, optimization increases the transfer
address, and uplink port properties. It prevents intruders speed. Table 3 provides a brief overview of each network
from spoofing the IP address by restricting the attached position within MCC. All network positions in MCC are
nodes to stay connected with the same uplink. Additionally, considered vulnerable to NFF attacks. Due to vulnerabilities,
the SAVI uses traceback and antispoofing for IPv4/IPv6 no network is safe from a 411 attack, which requires further
transition by 377 extracting common and crucial properties. investigation to find the attack’s origin.
In short, this system works very effectively to prevent
(i) Scalability
spoofing.
(ii) Overhead computational
(iii) Data storage
2.13. Location of Data Extraction. ,e process of network
forensics becomes challenging due to the virtualized char- (iv) Data accuracy
acteristics and distributive nature of networks. It becomes (v) Complexity
difficult for forensic experts to identify the device and ap- (vi) Privacy/security
propriate location for extracting data. It is almost impossible
(vii) Adaptability
to handle all links and the connected devices on the networks
where thousands of devices are connected and millions of ,e data is analyzed using SPSS (version 16), and all the
packets of data pass through each device every second. graphical illustrations of study variables are interpreted
Extracting data from any location in such networks becomes accordingly. Moreover, the description of codes is as follows:
a radical challenge for network forensics because they may scalability: horizontal (HT), vertical (VT), both (BT), and
breach privacy or affect data integrity at any point. Besides, not applicable (N/A); overhead computational: high (H),
many devices on a network are designed to extract and moderate (M), low (L), and not applicable (N/A); data
analyze the data for network forensics, including packet storage: high (H), moderate (M), low (L), and not applicable
sniffers, protocol analyzers, network forensic analysis tools, (N/A); data accuracy: high (H), moderate (M), low (L), and
firewalls, IDS, and routers. ,e appropriate placement of not applicable (N/A); complexity: implementation (IM),
these devices to extract and analyze data from the data analysis (AL), collection (CL), and investigation (IV); pri-
network is a key challenge for network forensics. vacy/security: high (H), moderate (M), low (L), and not
applicable (N/A); adaptability: difficult (D), high (H),
moderate (M), low (L), and not applicable (N/A).
2.14. Forensic Networks in Mobile Cloud Computing (MMC).
MCC network cloud services are obtained by smart device
users associated with long-term evolution networks via Wi-
Fi, WLAN, and 3G/4G/5G. ,ese networks must be very 2.15. Data Analysis Results. Frequency analysis is suitable for
quick and protected enough to send user requests to parallel categorical data of the current study. ,e data size is 22
computing clouds and return results to connected devices’ covering each theme of Network Forensic Framework (NFF)
users. However, attackers target these networks to connect for each variable of the study. ,e variables are analyzed as
and get access in the form of a network attack. ,e current shown in the outputs as follows. Table 4 shows the exper-
security plan covers the use of firewalls and IDS to detect and imentation results. It can be perceived that the scalability is
identify attack patterns. However, smart attacks use these the highest for the horizontal category having 50%, whereas
security approaches to spread malicious network activities. both-sided scalability is very less and is 1%. Besides, over-
Protection systems should be smart enough to detect smart head shows the maximum percentage for moderate (45.5%)
attacks that threaten the system. ,e network position shows while the minimum percentage exists for low (22.7%).
a network address, which connects two entities in MCC. Furthermore, the output (data storage) represents 435 that
MCC generally includes these networks: data center, cloud out of the total themes of NFF; moderate and low data
access, and intercloud networks [40], as shown in Table 1. storage is at the same percentage of 40.9% and is very less for
,e value of the forensics process lies in every aspect of high and not appropriate, showing 9.1%. Data accuracy
MCC’s network channels of communication. NFF must shows the minimum percentage for the category high and is
monitor malicious activity through network packets if a 9.1%, whereas not applicable is 50%, and 27.3% of the data is
smart device user is connected to mobile clouds or data accurate for NFF, which is low. Besides, the highest com-
centers are connected or linked to other cloud data centers. plexity proportion exists for implementation and analysis
NFIs have limited or no access to examine various network both together and is 40.9%. In contrast, data complexity
susceptibilities [41]; therefore, the forensic investigation collection and analysis are less. ,is paper proposed a
should become a permanent service for MCC users via thematic taxonomy of classifications of network forensic
channels and secure cloud resources (Table 2). ,e linking techniques based on extensive. ,e category was performed
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
10 Security and Communication Networks
Table 2: Various problems in current network forensic and mobile cloud computing (MCC).
Issues Current network forensic MCC network forensics
Data acquisition No Yes
Access of artifacts No Yes
Bandwidth utilization No Yes
Chain of custody No Yes
Data integrity No Yes
Privacy No Yes
Real-time analysis No Yes
Volatile data No Yes
Forensics tools No Yes
considering the target information units and execution availability to the system infrastructure and artifacts and
strategies while doing investigations is forensic. ,e quali- collection of research against the intruder system that uti-
tative practices were made use of to develop thematic tax- lizes practices to communicate the information regarding
onomy for this function. ,e objectives of this study include community attacks with minimal false-negative issues.
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Security and Communication Networks 11
Table 4: Analyzed results of the selected variables using IBM SPSS (version 16).
Frequency Percent Valid percent Cumulative percent
Scalability
HT (horizontal) 11 50.0 50.0 50.0
VT (vertical) 2 9.1 9.1 59.1
Valid BT (both) 1 4.5 4.5 63.6
N/A (not applicable) 8 36.4 36.4 100.0
Total 22 100.0 100.0
Overhead
High (H) 7 31.8 31.8 31.8
Moderate (M) 10 45.5 45.5 77.3
Valid
Low (L) 5 22.7 22.7 100.0
Total 22 100.0 100.0
Data storage
High (H) 2 9.1 9.1 9.1
Moderate (M) 9 40.9 40.9 50.0
Valid Low (L) 9 40.9 40.9 90.9
Not applicable (N/A) 2 9.1 9.1 100.0
Total 22 100.0 100.0
Data accuracy
High (H) 2 9.1 9.1 9.1
Moderate (M) 3 13.6 13.6 22.7
Valid Low (L) 6 27.3 27.3 50.0
Not applicable (N/A) 11 50.0 50.0 100.0
Total 22 100.0 100.0
Complexity
Implementation (IM) and analysis (AL) 9 40.9 40.9 40.9
Implementation (IM), collection (CL), and analysis (AL) 4 18.2 18.2 59.1
Valid Analysis (AL) 6 27.3 27.3 86.4
Collection (CL) and analysis (AL) 3 13.6 13.6 100.0
Total 22 100.0 100.0
Privacy/security
High (H) 1 4.5 4.5 4.5
Moderate (M) 6 27.3 27.3 31.8
Valid Low (L) 12 54.5 54.5 86.4
Not applicable (N/A) 3 13.6 13.6 100.0
Total 22 100.0 100.0
Frequency
Valid
Cumulative
Figure 7: Challenges in modern network forensic issues.
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
12 Security and Communication Networks
Among all categories showing a portion of the data storage [2] R. Bejtlich, ?e Practice of Network Security Monitoring:
88.6%, the percentage of security/privacy is highest, which is Understanding Incident Detection and Response, p. 469, No
88.5%, and is very less in the category of accuracy, which is high Starch Press, San Francisco, California, 2013.
showing 90%, which means that data is not secured and has [3] E. S. Pilli, R. C. Joshi, and R. Niyogi, “Network forensic
weak or no privacy system NFF. Lastly, the adaptability to frameworks: survey and research challenges,” Digital Inves-
MCC is very difficult in cloud computing. Data also shows the tigation, vol. 7, no. 1-2, pp. 14–27, 2010.
[4] M. Rasmi and A. Jantan, “A new algorithm to estimate the
percentage of 100%, which is the highest, is least for high
similarity between the intentions of the cyber crimes for
adaptability, and is 90.5%, respectively.
network forensics,” Procedia Technology, in Proceedings of the
4th International Conference on Electrical Engineering and
3. Conclusions and Future Research Informatics (Iceei 2013), vol. 11, pp. 540–547, Malaysia,
Malaysia, June 2013.
,is research reviewed the subject matter of network fo- [5] B. Cusack and M. Alqahtani, “Acquisition of evidence from
rensic techniques used to gather and investigate the legal network intrusion detection systems,” in Proceedings of the
information regarding the intruders. ,e investigators have 11th Australian Digital Forensics Conference, Perth, Western
to consider many factors, including the integrity and reli- Australia, December 2013.
ability of attack, the origin of the attack, the objectives [6] B.-C. Cheng, G.-T. Liao, H.-C. Huang, and P.-H. Hsu,
behind the attack, determining the worst path susceptible to “Cheetah: a space-efficient HNB-based NFAT approach to
attacks, and highlighting the actual attack paths. ,e net- supporting network forensics,” annals of telecommunications
work forensic goals can be achieved when forensic experts - annales des télécommunications, vol. 69, no. 7-8, pp. 379–
are well aware of the nature of the attack. Also, they are 389, 2014.
aware of the challenges of network forensics associated and [7] D. Wang, T. Li, S. Liu, J. Zhang, and C. Liu, “Dynamical
the tools they select to perform the network forensics. ,e network forensics based on immune agent,” in Proceedings of
network forensic techniques play a significant role in cap- the ?ird International Conference on Natural Computation
turing, identifying, recording, and analyzing the legal in- (ICNC 2007), vol. 3, pp. 651–656, IEEE, Haikou, China,
August 2007.
formation, specifically in integrated networks. Forensic
[8] M. Ibrahim, M. T. Abdullah, and A. Dehghantanha, “VoIP
experts face several challenges while performing forensics, evidence model: a new forensic method for investigating VoIP
and details about each of the 455 problems are provided in malicious attacks,” in Proceedings of the 2012 International
the paper’s previous sections. ,e network forensic experts Conference on Cyber Security, Cyber Warfare and Digital
need to emphasize developing more intelligent network Forensic (CyberSec), pp. 201–206, IEEE, Kuala Lumpur,
forensic tools instantly. ,is is the only way through which Malaysia, June 2012.
they can minimize the abovementioned challenges in net- [9] L. M. Chen, M. C. Chen, W. Liao, and Y. S. Sun, “A scalable
work forensics. Besides, they can also reduce the storage network forensics mechanism for stealthy self-propagating
requirements and delays in network forensics, can work in attacks,” Computer Communications, vol. 36, no. 13,
high-speed networks, and can also maintain the privacy and pp. 1471–1484, 2013.
integrity of data. ,e forensics should also explore cloud [10] I. L. Lin, Y. S. Yen, B. L. Wu, and H. Y. Wang, “VoIP network
computing networks, especially mobile cloud computing forensic analysis with digital evidence procedure,” in Pro-
because mobile devices will also be the most important and ceedings of the 485 ?e 6th International Conference on
widely used devices sooner. ,e classification has been Networked Computing and Advanced Information Manage-
carried out based on the target datasets and implementation ment, pp. 236–241, IEEE, Seoul, January 2010.
[11] W. Ren and H. Jin, “Distributed agent-based real time net-
techniques while performing forensic investigations. For this
work intrusion forensics system architecture design,” in
purpose, the qualitative methods have been used to develop Proceedings of the 19th International Conference on Advanced
thematic taxonomy. ,e objectives of this study include Information Networking and Applications (AINA’05), vol. 1,
accessibility to the network infrastructure and artifacts and pp. 177–182, IEEE, Taipei, Taiwan, March 2005.
collection of evidence against the intruder using network [12] E. Jeong and B. Lee, “An IP traceback protocol using a
forensic techniques to communicate the information related compressed hash table, a sinkhole router and data mining
to network attacks with minimum false-negative results. based on network forensics against network attacks,”
Future Generation Computer Systems, vol. 33, pp. 42–52,
Data Availability 2014.
[13] Y. Zhu, “Attack pattern discovery in forensic investigation of
Experimental data available within the article. network attacks,” IEEE Journal on Selected Areas in Com-
munications, vol. 29, no. 7, pp. 1349–1357, 2011.
Conflicts of Interest [14] S. Perry, “Network forensics and the inside job,” Network
Security, vol. 2006, no. 12, p. 13, 2006.
,e authors declare that they have no conflicts of interest. [15] D. M. White, “,e federal information security management
act of 2002: a Potemkin village,” Fordham Law Review,
References vol. 497, pp. 79–369, 2010.
[16] C. Wang, T. Feng, J. Kim, G. Wang, and W. Zhang, “Catching
[1] K. Jiang and R. Xuan, “Book review: guide to computer fo- packet droppers and modifiers in wireless sensor networks,”
rensics and investigations,” Journal of Digital Forensics, Se- in Proceedings of the 2009 6th Annual IEEE Communications
curity and Law, vol. 3, no. 5, p. 467, 2008. Society Conference on Sensor, Mesh and Ad 500 Hoc
2037, 2021, 1, Downloaded from https://onlinelibrary.wiley.com/doi/10.1155/2021/8871230 by Cochrane Peru, Wiley Online Library on [25/10/2024]. See the Terms and Conditions (https://onlinelibrary.wiley.com/terms-and-conditions) on Wiley Online Library for rules of use; OA articles are governed by the applicable Creative Commons License
Security and Communication Networks 13
Communications and Networks, pp. 1–9, IEEE, Rome, Italy, [35] S. Anwar, J. M. Zain, M. F. Zolkipli, Z. Inayat, A. N. Jabir, and
June 2009. J. B. Odili, “Response option for attacks detected by intrusion
[17] S. Zander, G. Armitage, and P. Branch, “A survey of covert detection system,” in Proceedings of the 2015 4th International
channels and countermeasures in computer network proto- Conference on Software Engineering and Computer Systems
cols,” IEEE Communications Surveys & Tutorials, vol. 9, no. 3, (ICSECS), pp. 195–200, IEEE, Kuantan, Malaysia, August
pp. 44–57, 2007. 2015.
[18] H. Kim, “Protection against packet fragmentation attacks at [36] K. Shanmugasundaram, N. Memon, A. Savant, and
6LoWPAN adaptation layer,” in Proceedings of the 2008 In- H. Bronnimann, ForNet: A Distributed Forensics Network.
ternational 504 Conference on Convergence and Hybrid In- Computer Network Security, V. Gorodetsky, L. Popyack, and
formation Technology, pp. 796–801, IEEE, Wisła, Poland, V. Skormin, Eds., Springer Berlin Heidelberg, Berlin, Hei-
October 2008. delberg, 2003pp. 1–16, Lecture Notes in Computer Science.
[19] A. Sperotto, G. Schaffrath, R. Sadre, C. Morariu, A. Pras, and [37] M. Ponec, P. Giura, J. Wein, and H. Brönnimann, “New
B. Stiller, “An overview of IP flow-based intrusion detection,” payload attribution methods for network forensic investiga-
IEEE Communications Surveys & Tutorials, vol. 12, no. 3, tions,” ACM Transactions on Information and System Security,
pp. 343–356, 2010. vol. 13, no. 2, pp. 1–32, 2010.
[20] V. Chandola, A. Banerjee, and V. Kumar, “Anomaly detec- [38] B. K. Sy, “Integrating intrusion alert information to aid fo-
tion,” ACM Computing Surveys, vol. 41, no. 3, pp. 1–58, 2009. rensic explanation: an analytical intrusion detection frame-
[21] P. Li, M. Salour, and X. Su, “A survey of internet worm work for distributive IDS,” Information Fusion, vol. 10, no. 4,
detection and containment,” IEEE Communications Surveys pp. 325–341, 2009.
& Tutorials, vol. 10, no. 1, pp. 20–35, 2008. [39] W. Wang and T. E. Daniels, “A graph based approach toward
[22] V. Igure and R. Williams, “Taxonomies of attacks and vul- network forensics analysis,” ACM Transactions on Informa-
nerabilities in computer systems,” IEEE Communications tion and System Security, vol. 12, no. 1, pp. 1–33, 2008.
Surveys & Tutorials, vol. 10, no. 1, pp. 6–19, 2008. [40] H. T. Dinh, C. Lee, D. Niyato, and P. Wang, “A survey of
[23] B. Yu and R. Wang, “Research of access control list in en- mobile cloud computing: architecture, applications, and ap-
terprise network management,” Lecture Notes in Electrical proaches,” Wireless Communications and mobile Computing,
Engineering, in Informatics and Management Science VI, vol. 13, no. 18, pp. 1587–1611, 2013.
pp. 121–129, Springer, Berlin, Germany, 2013. [41] S. Gupta, P. Kumar, and A. Abraham, “A profile based
[24] F. Akhtar, J. Li, M. Azeem et al., “Effective large for gestational network intrusion detection and prevention system for se-
age prediction using machine learning techniques with curing cloud environment,” International Journal of Dis-
monitoring biochemical indicators,” ?e Journal of Super- tributed Sensor Networks, vol. 9, no. 3, Article ID 364575,
computing, vol. 76, pp. 1–19, 2019. 2013.
[25] J. Li, D. Zhou, W. Qiu et al., “Application of weighted gene co-
expression network analysis for data from paired design,”
Scientific Reports, vol. 8, pp. 622–628, 2018.
[26] F. Akhtar, J. Li, Y. Pei et al., “Diagnosis and prediction of
large-for-gestational-age fetus using the stacked general-
izationmethod,” Applied Sciences, vol. 9, no. 20, p. 4317, 2019.
[27] A. Imran, J. Li, Y. Pei, J.-J. Yang, and Q. Wang, “Comparative
analysis of vessel segmentation techniques in retinal images,”
IEEE Access, vol. 7, pp. 114862–114887, 2019.
[28] J. Li, L. Liu, J. Sun et al., “Comparison of different machine
learning approaches to predict small for gestational age in-
fants,” IEEE Transactions on Big Data, vol. 6, no. 2, 2016.
[29] C. Liu, A. Singhal, and D. Wijesekera, “Using attack graphs in
forensic examinations,” in Proceedings of the 2012 Seventh
International 528 Conference on Availability, Reliability and
Security, pp. 596–603, IEEE, Prague, August 2012.
[30] A. Diamah, M. Mohammadian, and B. M. Balachandran,
“Network security evaluation method via attack graphs and
fuzzy cognitive maps,” in Intelligent Decision Technologies,
pp. 433–440, Springer, Berlin, Germany, 2012.
[31] A. B. Johnston, SIP: Understanding the Session Initiation
Protocol, Artech House, Norwood, Massachusetts, 2015.
[32] D. Saha, “Extending logical attack graphs for efficient vul-
nerability analysis,” in Proceedings of the 15th ACM conference
on Computer and communications security, pp. 63–74, New
York, NY, USA, October 2008.
[33] Y. Fen, Z. Hui, C. Shuang-shuang, and Y. Xin-chun, “A
lightweight IP traceback scheme depending on TTL,” Pro-
cedia Engineering, vol. 29, pp. 1932–1937, 2012.
[34] M. Albanese, S. Jajodia, A. Pugliese, and V. S. Subrahmanian,
“Scalable analysis of attack scenarios,” Computer Security-
ESORICS 2011. European Symposium on Research in Com-
puter Security, pp. 416–433, Springer, Berlin, Germany, 2011.