Pretražite po imenu i prezimenu autora, mentora, urednika, prevoditelja

Napredna pretraga

Pregled bibliografske jedinice broj: 1211594

Network forensics


Volarevic, I.; Tomic, M.; Milohanic, L.
Network forensics // 45th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2022)
Opatija, Hrvatska: Institute of Electrical and Electronics Engineers (IEEE), 2022. str. 1025-1030 doi:10.23919/mipro55190.2022.9803427 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)


CROSBI ID: 1211594 Za ispravke kontaktirajte CROSBI podršku putem web obrasca

Naslov
Network forensics

Autori
Volarevic, I. ; Tomic, M. ; Milohanic, L.

Vrsta, podvrsta i kategorija rada
Radovi u zbornicima skupova, cjeloviti rad (in extenso), znanstveni

Skup
45th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2022)

Mjesto i datum
Opatija, Hrvatska, 23.05.2022. - 27.05.2022

Vrsta sudjelovanja
Predavanje

Vrsta recenzije
Međunarodna recenzija

Ključne riječi
Performance evaluation , Firewalls (computing) , Forensics , Digital forensics , Intrusion detection , Software , Security

Sažetak
Network firewalls and intrusion detection and prevention devices or software are crucial parts of today's networks. However, security breaches still can and do happen. They can originate from malicious users of on-site devices or any other point in local or remote networks. Often, a single compromised host is a source of further and more devastating attacks. After a breach occurs, or there is a reasonable doubt that it occurred, it is important to perform forensic analysis. The analysis could potentially discover the type of the attack, how long it lasts, the range of affected hosts, the scale of the attack, or sometimes even the intruders. In this paper, we explore a network forensic analysis workflow, evidence collection and analysis steps. We present a common analysis tool and its usage and perform an example analysis based on actual packet captures and intrusion detection systems logs, following a successful security measures breach and host infection. The paper will present a realistic example of forensic analysis based on Snort alerts, and the rest of the investigation will be conducted with the help of Wireshark, with which we will find various useful information about the infected host.

Izvorni jezik
Engleski



POVEZANOST RADA


Ustanove:
Tehnički fakultet, Rijeka

Profili:

Avatar Url Mladen Tomić (autor)

Poveznice na cjeloviti tekst rada:

doi

Citiraj ovu publikaciju:

Volarevic, I.; Tomic, M.; Milohanic, L.
Network forensics // 45th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2022)
Opatija, Hrvatska: Institute of Electrical and Electronics Engineers (IEEE), 2022. str. 1025-1030 doi:10.23919/mipro55190.2022.9803427 (predavanje, međunarodna recenzija, cjeloviti rad (in extenso), znanstveni)
Volarevic, I., Tomic, M. & Milohanic, L. (2022) Network forensics. U: 45th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO 2022) doi:10.23919/mipro55190.2022.9803427.
@article{article, author = {Volarevic, I. and Tomic, M. and Milohanic, L.}, year = {2022}, pages = {1025-1030}, DOI = {10.23919/mipro55190.2022.9803427}, keywords = {Performance evaluation , Firewalls (computing) , Forensics , Digital forensics , Intrusion detection , Software , Security}, doi = {10.23919/mipro55190.2022.9803427}, title = {Network forensics}, keyword = {Performance evaluation , Firewalls (computing) , Forensics , Digital forensics , Intrusion detection , Software , Security}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, publisherplace = {Opatija, Hrvatska} }
@article{article, author = {Volarevic, I. and Tomic, M. and Milohanic, L.}, year = {2022}, pages = {1025-1030}, DOI = {10.23919/mipro55190.2022.9803427}, keywords = {Performance evaluation , Firewalls (computing) , Forensics , Digital forensics , Intrusion detection , Software , Security}, doi = {10.23919/mipro55190.2022.9803427}, title = {Network forensics}, keyword = {Performance evaluation , Firewalls (computing) , Forensics , Digital forensics , Intrusion detection , Software , Security}, publisher = {Institute of Electrical and Electronics Engineers (IEEE)}, publisherplace = {Opatija, Hrvatska} }

Citati:





    Contrast
    Increase Font
    Decrease Font
    Dyslexic Font