Comparative Analysis of Network Forensic Tools and Network Forensics Processes

08/12/2021
by   Fahad M Ghabban, et al.
0

Network Forensics (NFs) is a branch of digital forensics which used to detect and capture potential digital crimes over computer networked environments crime. Network Forensic Tools (NFTs) and Network Forensic Processes (NFPs) have abilities to examine networks, collect all normal and abnormal traffic/data, help in network incident analysis, and assist in creating an appropriate incident detection and reaction and also create a forensic hypothesis that can be used in a court of law. Also, it assists in examining the internal incidents and exploitation of assets, attack goals, executes threat evaluation, also by evaluating network performance. According to existing literature, there exist quite a number of NFTs and NTPs that are used for identification, collection, reconstruction, and analysing the chain of incidents that happen on networks. However, they were vary and differ in their roles and functionalities. The main objective of this paper, therefore, is to assess and see the distinction that exist between Network Forensic Tools (NFTs) and Network Forensic Processes (NFPs). Precisely, this paper focuses on comparing among four famous NFTs: Xplico, OmniPeek, NetDetector, and NetIetercept. The outputs of this paper show that the Xplico tool has abilities to identify, collect, reconstruct, and analyse the chain of incidents that happen on networks than other NF tools.

READ FULL TEXT

page 2

page 3

research
09/06/2021

Tools for Network Traffic Generation – A Quantitative Comparison

Network traffic generators are invaluable tools that allow for applied e...
research
01/02/2020

A Feature Comparison of Modern Digital Forensic Imaging Software

Fundamental processes in digital forensic investigation, such as disk im...
research
10/26/2021

Measuring the Effectiveness of Digital Hygiene using Historical DNS Data

This paper describes an ongoing experiment evaluating the efficacy of a ...
research
02/01/2019

Self-Control in Cyberspace: Applying Dual Systems Theory to a Review of Digital Self-Control Tools

Many people struggle to control their use of digital devices. However, o...
research
08/11/2020

Identifying Implicit Vulnerabilities through Personas as Goal Models

When used in requirements processes and tools, personas have the potenti...
research
11/23/2021

Evaluating the application of NLP tools in mainstream participatory budgeting processes in Scotland

In recent years participatory budgeting (PB) in Scotland has grown from ...
research
04/07/2019

Reframing Threat Detection: Inside esINSIDER

We describe the motivation and design for esINSIDER, an automated tool t...

Please sign up or login with your details

Forgot password? Click here to reset