Network Forensics an emerging approach to an network analysis.
|
|
|
- Alexandra Wilkinson
- 9 years ago
- Views:
Transcription
1 Network Forensics an emerging approach to an network analysis. 1 Abhishek Srivastav M.S. in Cyber Law & Information Technology Indian Institute of Information Technology, Allahabad, India [email protected] 2 Irman Ali M.S. in Cyber Law & Information Technology Indian Institute of Information Technology, Allahabad, India [email protected] Abstract: Network forensic is a new growing approach to a network security. Digital forensic applies the forensic procedure to electronic or digital evidence. This digital forensic process involves systematically collecting and analyzing digital information for use as evidence in court. Network forensics is a branch of digital forensics that focuses on the monitoring and analysis of network traffic. Network forensics is the process of gathering and examining raw data of network and systematically tracking and monitoring traffic of network to make sure of how an attack took place. Network forensic will help in identifying unauthorized access to computer systems and networks, and searches for evidence if it will happen. In this paper, we are focusing on network forensics, the steps to perform network forensics, various network forensic tools, comparison chart, and emerging area of network forensics. Keywords: network forensics, digital forensic, network forensic tools Introduction : Network forensics is the process of collecting, recording, and examining of network events for finding the source of security attacks. It helps in identifying unauthorized access to computer systems, and searches for evidence in case of such an occurrence. Network forensics is in fact to investigate, at a network level, things taking place or that have taken place across an IT system. There are three parts of network forensics: [2] Intrusion detection Logging Correlating the intrusion detection and logging[2] The main goal of network forensics is to provide enough evidence to allow the criminal perpetrator to be successfully prosecuted. The practical application of Network Forensics could be in areas such as hacking, investigation, fraud detection, insurance companies, data the, defamation, narcotics trafficking, credit card cloning, software piracy, electoral law, obscene publication, perjury, murder, sexual harassment, and discrimination. Network Forensics Systems Can Be Of Two Kinds Catch-it-as-you-can systems, in which all packets passing through certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage.[3] Stop, look and listen systems, in which each packet is analyzed in a rudimentary way in memory and only certain information saved for future analysis. This approach requires a faster processor to keep up with incoming traffic. [3] Developing Standard Procedures for Network Forensics: network forensics is a long, tedious process, and unfortunately trail can go cold quickly. A standard procedure often used in network forensics Is as follows. Always use a standard investigation image for system on a network. This image is not a bit stream image but an image(dd) containing all the standard application used. You should also have the MD5 and SHA-1 hash values off all application and os files.[1] When an intrusion incident happens,make sure the vulnerability has been fixed to prevents othr attacks from taking advantage of the opening. Attempt to retrieve all volatile data such as RAM and running processes, by doing a live acquisition before turning the system off. ISSN : Vol. 5 No. 02 Feb
2 Acquire the Compromised drive and make a forensic image of it. Compare files on the forensic image to the original installation image compare hash values of coomon files, such as Win.exe and standards DLLs and ascertain whether they have changed. EMERGING NETWORK FORENSICS AREAS Network forensics has important roles to play in new and developing areas related to social networking, data mining and digital imaging, and data visualization. Social networks : Social networking sites such as Google+, Facebook, Twitter, and YouTube have expanded astronomically in recent years, but because the success of such sites depends on the number of users they attract, there is pressure on developers to design systems that encourage behavior that increases both the number of users and their connections. Security has not been a high priority, leading to the emergence of inevitable security risks. Obviously, there is a need for network forensic tools that address such an important area of usage, but to date, only traditional digital and network forensic tools are available. Data mining: Forensic profiles can be created using data mining technology, which provides a way to discover relevant patterns, thus generating profiles from large quantities of data. Although there has been significant work in the areas of extracting and analyzing digital evidence from physical devices such as hard disks, less work has been reported on data mining in portable storage devices such as flash drives, cell phones, digital cameras, radio frequency identification devices, compact disks, and ipods. The extraction of historical data from supervisory control and data acquisition (SCADA) systems, which are widely used to monitor and control equipment in various industries such as oil and gas refining, water and waste control, and transportation, is an important area that draws on the combination of data mining and network forensics. There is currently no generic model for understanding the processes necessary to gather digital evidence from SCADA systems. However, such a model is needed to enable incident response, intelligence gathering, digital evidence collection and legal action against system intruder. There is a distinct difference between the process of network forensics-based data mining investigations (where time-based data is analyzed to detect potential malware intrusion) and incident recovery and response (where the key purpose is to respond to an alarm and implement recovery). Some work has been done to incorporate the use of decision trees as well as naive Bayesian, a priori, and neural network techniques. Recently proposed architectures also incorporate mechanisms for monitoring process behavior, analyzing trends, and optimizing plant performance. Digital imaging and data visualization: Researchers have developed numerous state-of-the-art tools to assist in conducting digital crime investigations. However, digital investigations are increasingly complex and time-consuming due to the amount of data involved. The visualization of data obtained from such investigations is a new and developing area and has the potential to display significant volumes of data where the dimensionality, complexity, or volume prohibits manual analysis. Data visualization is the graphical interpretation of high-dimensional data, which is particularly appropriate for obtaining an overall view and locating important aspects within a dataset. This is useful in network forensics because the data encountered in digital investigations is often significant in size, multidimensional, and complex. Consequently, obtaining an overall view can help digital investigators obtain a better understanding of the data and identify important aspects to assist in the recovery of appropriate digital evidence. Network forensic tools : Network forensic can be done by using different types tools which can be categorized as the following: Using network tools Using UNIX/LINUX tools Using packet sniffer Using network tools : A variety of tools are available for network administrators to perform remote shutdowns, monitor device use, and more. The following are the list describes a few examples of the powerful windows tolls available at Sys internals Regimen shows all registry data in real time Process Explorer shows what files, registry keys, and dynamic link libraries are loaded at a specific time. Handle shows what files are open and which processes are using these files Philemon shows file system activity. Using Unix /Linux tools: Knoppix security tools distribution is a bootable Linux CD intended for computer and network forensics. A few of the Knoppix-std tools include the following. ISSN : Vol. 5 No. 02 Feb
3 Dcfldd- the u.s. DOD computer forensics lab version of the DD command Memfetch- forces a memory dump Snort- a popular IDS that perform packet capture and analysis in real time. Oinkmaster helps manage snort rules so that you can specify what items to ignore as regular traffic and what items should raise alarms John the latest version of john the ripper, a password cracker Chntpw enables you to reset passwords on a windows computer, including the administrator password. Tcpdump and ethereal packet sniffers.[1] Using packet sniffers : packet sniffers are devices and/or software placed on a network to monitor traffic. Most network administrators use sniffers for increasing security and tracking bottlenecks. However, attackers can use them to obtain information illegally. On tcp/ip networks, sniffers examine packets, hence the term packet sniffers. Most packet sniffers work at layer 2 or layer 3 of the osi model. To understand what s happening on a network, often you have to look at the higher layers by using custom software that comes with switches and routers, however. Methodology Task performed by network forensics tools: all network forensics tool perform some specific task. These task are combined into five major categories, each with sub functions for further refining data analysis and recovery. Acquisition Validation and discrimination Extraction Reconstruction Reporting Acquisition : the first task in network forensics investigation, is making a copy of the original drive. Sub function in the acquisition category include the following : Physical copy of data Logical copy of data Data acquisition format Command line acquisition GUI acquisition Remote acquisition Verification Validation and discrimination : the process of validating data is what allows discrimination of data. Many forensics software vendors offer three methods for discriminating data values. These are the sub functions of the validation and discrimination function Hashing Filtering Analyzing file headers Extraction : The Extraction process is the recovery process in an investigation of cyber crime and is the most challenging of all tasks to master. The following sub functions of extraction are used in investigation. Packet viewing Keyword Searching Decompressing Carving Decrypting Bookmarking Reconstruction: The purpose of having a reconstruction feature in a forensics tool is to re create a suspect drive to show what happened during a crime or an incident. These are the sub functions of reconstruction. Disk to disk Copy Image to Disk Copy Partition to Partition copy Image to Partition copy ISSN : Vol. 5 No. 02 Feb
4 Reporting : To complete a digital forensics analysis and examination, you need to make a report. These are the sub functions of the reporting function Log Reports Report Generator Network Forensic Analysis Process: Figure: Network Forensic Analysis process ISSN : Vol. 5 No. 02 Feb
5 Functional Point Analysis: Tools Features and Advantages Attributes Wireshark Widely used network traffic analysis tool, forms basis of network forensic studies. Driftnet Listen to network traffic and picks out images used in backtrack version 5 Tcpdump Command line Network packet analyzer that supports network forensic Analysis. Kismet Network detector, network packet sniffer, and intrusion-detection system for wireless LANs Xplico A network forensic analysis tool that allows for data extraction from traffic captures; used in Backtrack version 5 NetworkMiner A network forensic analysis tool that can be used as a passive network sniffer/packetcapturing tool Ngrep Simple, low level network traffic debugging tool. Solera DS Appliance for live network forensics, application classification, metadata extraction, and analysis tools NetIntercept Netwitness RSA EnVision Forensic & Log Analysis GUI Dragon IDS Infinistream Savant Snort Honey D Omnipeek EtherApe Flow-Tools Fenris Appliance for network forensics, monitoring, and analysis Addresses network forensic analysis, insider threat, data leakage protection, compliance verification, designer malware, and 0-day detection Provides live network forensics analysis, log management, network security surveillance, data leakage protection Log file analysis combined with network forensics, the Python implementation Provides network, host intrusion detection and network forensic capture analysis Appliance for network forensics, incident analysis combined with session reconstruction and playback Appliance for live forensic analysis, surveillance, network analysis, and critical infrastructure reporting Widely used, popular tool for network intrusion detection and prevention, as well as for network forensic analysis Improves cyber security by providing mechanisms for traffic monitoring, threat detection, and assessment Low-level traffic analyzer for network forensics Graphical network monitor for capturing, network traffic Software package for collecting and processing NetFlow data from Cisco and Juniper routers Suite of tools for code analysis, debugging, protocol analysis, reverse engineering, network forensics,, Reassembly of data stream, Reassembly of data stream, Correlation of data, Application layer view, Reassembly of data stream, Correlation of data, Application layer view, Log Analysis, Reassembly of data stream, Correlation of data, Application layer view, Log Analysis Log Analysis, Reassembly of data stream, Correlation of data, Log Analysis, Reassembly of data stream, Correlation of data, Reassembly of data, Reassembly of data stream,log Analysis, Log Analysis ISSN : Vol. 5 No. 02 Feb
6 DeepNines Argus Netstumble Airmon-ng Ettercap diagnostics, security audits, vulnerability research Provides real-time identity-based network defense for content and applications, along with basic network forensics Used for network forensics, nonrepudiation, detecting very slow scans, and supporting zero-day attacks Widely used wireless LAN analysis tool for devices and network traffic analysis Widely used suite of low-level traffic analysis tools for wireless LANs; used in Backtrack version 5 Packet capture, ARP poisoning, Network protocol analysis & security auditing., Log Analysis, Reassembly of data stream, Correlation of data, Log Analysis Conclusion: Network Forensic is the procedure that makes sure of investigation of attacks performed in the network or network devices. In this paper we concluded a matrix for analyzing various network forensics tools. The data analysis steps of network forensic process is the core for investigating any security breach in network. Unlike digital forensics, which collects information from a computer and disk of computer or other storage devices, network forensics collects both traffic and information about which ports it used to access the network. It is impractical that a single tool will be used for any investigation in generally it is observe that combinations of tools are used for investigation process. Form analyzing various past statistics it is found that Network forensics has crucial roles to play in new and developing areas that is related to social networking, data mining and digital imaging, and data visualization. References: [1] data accessed, jan 26, [2] data accessed, jan 26, [3] data accessed, jan 26, ISSN : Vol. 5 No. 02 Feb
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 12 Network Forensics Objectives Understand Internet fundamentals Understand network basics Acquire data on a Linux computer Guide
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Keyword: Cloud computing, service model, deployment model, network layer security.
Volume 4, Issue 2, February 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Emerging
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Malicious Network Traffic Analysis
Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the
Computer Forensic Tools. Stefan Hager
Computer Forensic Tools Stefan Hager Overview Important policies for computer forensic tools Typical Workflow for analyzing evidence Categories of Tools Demo SS 2007 Advanced Computer Networks 2 Important
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks
Intrusion Detection and Cyber Security Monitoring of SCADA and DCS Networks Dale Peterson Director, Network Security Practice Digital Bond, Inc. 1580 Sawgrass Corporate Parkway, Suite 130 Sunrise, FL 33323
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 4 Current Computer Forensics Tools Objectives Understand how to identify needs for computer forensics tools Evaluate the requirements
Network Intrusion Analysis (Hands-on)
Network Intrusion Analysis (Hands-on) TCP/IP protocol suite is the core of the Internet and it is vital to understand how it works together, its strengths and weaknesses and how it can be used to detect
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer
Network/Cyber Security
Network/Cyber Security SCAMPS Annual Meeting 2015 Joe Howland,VC3 Source: http://www.information-age.com/technology/security/123458891/how-7-year-old-girl-hacked-public-wi-fi-network-10-minutes Security
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009
Top Five Data Security Trends Impacting Franchise Operators Payment System Risk September 29, 2009 Top Five Data Security Trends Agenda Data Security Environment Compromise Overview and Attack Methods
Topics in Network Security
Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
1! Network forensics
Network Forensics COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1! Network forensics Network Forensics Overview! Systematic tracking of incoming and outgoing traffic!
When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING. www.pecb.com
When Recognition Matters THE COMPARISON OF PROGRAMS FOR NETWORK MONITORING www.pecb.com Imagine a working environment comprised of a number of switches, routers, some terminals and file servers. Network
Packet Sniffer using Multicore programming. By B.A.Khivsara Assistant Professor Computer Department SNJB s KBJ COE,Chandwad
Packet Sniffer using Multicore programming By B.A.Khivsara Assistant Professor Computer Department SNJB s KBJ COE,Chandwad Outline Packet Sniffer Multicore Command for CPU info Program in Python Packet
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Open Source and Incident Response
Open Source and Incident Response Joe Lofshult, CISSP, GCIH 1 Agenda Overview Open Source Tools FIRE Demonstration 2 Overview Incident Adverse event that threatens security in computing systems and networks.
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEM INTRUSION DETECTION AND PREVENTION using SAX 2.0 and WIRESHARK Cain & Abel 4.9.35 Supervisor Dr. Akshai Kumar Aggarwal Director School of Computer Sciences University of Windsor
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR
場 次 :C-3 公 司 名 稱 :RSA, The Security Division of EMC 主 題 : 如 何 應 用 網 路 封 包 分 析 對 付 資 安 威 脅 主 講 人 :[email protected] Sr. Technology Consultant GCR Minimum Requirements of Security Management and Compliance
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
RAVEN, Network Security and Health for the Enterprise
RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
DoD Cyber Crime Center
DoD Cyber Crime Center (DC3) Digital Forensics Challenge 2013 Team Northrop Grumman April 30, 2014 Jesse Mayer Northrop Grumman Cyber Security Operations Center DC3 Digital Forensics Challenge Annual Competition
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment
Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,
Network Security Forensics
Network Security Forensics As hacking and security threats grow in complexity and organizations face stringent requirements to document access to private data on the network, organizations require a new
Network Defense Tools
Network Defense Tools Prepared by Vanjara Ravikant Thakkarbhai Engineering College, Godhra-Tuwa +91-94291-77234 www.cebirds.in, www.facebook.com/cebirds [email protected] What is Firewall? A firewall
Digital Forensics. Module 7 CS 996
Digital Forensics Module 7 CS 996 Outline of Module #7 Review of labs (Kulesh) Review of module #6: sniffer tools Network Forensics Overview of tools Motivations Log Logic Appliance overview 3/22/04 Module
Who is Watching You? Video Conferencing Security
Who is Watching You? Video Conferencing Security Navid Jam Member of Technical Staff March 1, 2007 SAND# 2007-1115C Computer and Network Security Security Systems and Technology Video Conference and Collaborative
A Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University [email protected] Abstract
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Information Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
Taxonomy of Intrusion Detection System
Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use
Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA
A Seminar report On Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface I have made
Some Tools for Computer Security Incident Response Team (CSIRT)
Some Tools for Computer Security Incident Response Team (CSIRT) AfNOG 12 30 th May 2011 10 th June 2011 Tanzania By Marcus K. G. Adomey Overview Some Unix Commands Some Selected Tools Snort AirSnort hping
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
Missing the Obvious: Network Security Monitoring for ICS
Missing the Obvious: Network Security Monitoring for ICS If ICS are so vulnerable, why haven t we seen more attacks? We aren t looking! Two Key Reasons Intent Visibility Intent Why are targeted attacks
Forensic Network Analysis Tools
Forensic Network Analysis Tools Strengths, Weaknesses, and Future Needs Eoghan Casey Author, Digital Evidence and Computer Crime Editor, Handbook of Computer Crime Investigation Technical Director, Knowledge
Open Source Security Tool Overview
Open Source Security Tool Overview Presented by Kitch Spicer & Douglas Couch Security Engineers for ITaP 1 Introduction Vulnerability Testing Network Security Passive Network Detection Firewalls Anti-virus/Anti-malware
Protecting Critical Infrastructure
Protecting Critical Infrastructure SCADA Network Security Monitoring March 20, 2015 Table of Contents Introduction... 4 SCADA Systems... 4 In This Paper... 4 SCADA Security... 4 Assessing the Security
IT Networking and Security
elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software powered by Calibrate www.medallionlearning.com
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.
GFI White Paper PCI-DSS compliance and GFI Software products
White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption
Network Security Monitoring: Looking Beyond the Network
1 Network Security Monitoring: Looking Beyond the Network Ian R. J. Burke: GCIH, GCFA, EC/SA, CEH, LPT [email protected] [email protected] February 8, 2011 2 Abstract Network security monitoring
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important
Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE. Vahidin Đaltur, Kemal Hajdarević,
DIGITAL FORENSIC INVESTIGATION, COLLECTION AND PRESERVATION OF DIGITAL EVIDENCE Vahidin Đaltur, Kemal Hajdarević, Internacional Burch University, Faculty of Information Technlogy 71000 Sarajevo, Bosnia
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL
REAL-TIME WEB APPLICATION PROTECTION. AWF SERIES DATASHEET WEB APPLICATION FIREWALL AWF Series Web application firewalls provide industry-leading Web application attack protection, ensuring continuity
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected]
Automating Linux Malware Analysis Using Limon Sandbox Monnappa K A [email protected] A number of devices are running Linux due to its flexibility and open source nature. This has made Linux platform
Certified Information Systems Auditor (CISA)
Certified Information Systems Auditor (CISA) Course Introduction Course Introduction Module 01 - The Process of Auditing Information Systems Lesson 1: Management of the Audit Function Organization of the
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell
You Don t Know What You Can t See: Network Security Monitoring in ICS Rob Caldwell Mandiant, a FireEye company [2014 SANS European ICS Summit] About me Currently: Principal Consultant on Mandiant s Industrial
SURVEY OF INTRUSION DETECTION SYSTEM
SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
Intrusion Detections Systems
Intrusion Detections Systems 2009-03-04 Secure Computer Systems Poia Samoudi Asli Davor Sutic Contents Intrusion Detections Systems... 1 Contents... 2 Abstract... 2 Introduction... 3 IDS importance...
IT Security and OT Security. Understanding the Challenges
IT Security and OT Security Understanding the Challenges Security Maturity Evolution in Industrial Control 1950s 5/4/2012 # 2 Technology Sophistication Security Maturity Evolution in Industrial Control
ANTI-HACKER TOOL KIT. ourth Edition
ANTI-HACKER TOOL KIT i ' Mm. i m Fm ourth Edition m CONTENTS Acknowledgments Introduction xvii xix The Best of the Basics 1 Managing Source Code and Working with Programming Languages 3 SCM Concepts 4
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS
EFFECTIVE IMPLEMENTATION OF DYNAMIC CLASSIFICATION FOR NETWORK FORENSIC AND TRAFFIC ANALYSIS Manu Bansal Assistant Professor Department of IT University Institute of Engineering & Technology Panjab University,
SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013
SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
040020305-Penetration Testing 2014
Comprehensive Questions/Practical Based :- 040020305-Penetration Testing 2014 1. Demonstrate the installation of BackTrack using Live DVD. Also list all the steps. 2. Demonstrate the installation of BackTrack
COMP416 Lab (1) Wireshark I. 23 September 2013
COMP416 Lab (1) Wireshark I 23 September 2013 2 Before the lab Review the content of communication architecture. Review TCP/IP model and protocol suite. Understand data transferring, layering, and encapsulation/demultiplexing.
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
Design & Implementation of Linux based Network Forensic System using Honeynet
Design & Implementation of Linux based Network Forensic System using Honeynet Jatinder Kaur, Gurpal Singh, Manpreet Singh SMCA, Thapar University, Patiala -147004, India CSE, Ramgharia College, Phagwara,
