Network Forensic Log Analysis
Network Forensic Log Analysis
Volume: 3 Issue: 5
ISSN: 2321-8169
2654 - 2658
_______________________________________________________________________________________________
Abstract - Network forensics log analysis is the capturing, recording, and analysis of network events in order to discover the source of security
attacks. An investigator needs to back up these recorded data to free up recording media and to preserve the data for future analysis. An
investigator needs to perform network forensics process to determine which type of an attack over a network and to trace out the culprit. In the
cyber-crime world huge log data, transactional data occurs which tends to plenty of data for storage and analyze them. It is difficult for forensic
investigators to keep on playing with time and to find out the clues and analyze those collected data. In network forensic analysis, it involves
network traces and detection of attacks. The trace involves an Intrusion Detection System and firewall logs, logs generated by network services
and applications, packet captures. Network forensics is a branch of digital forensics that focuses on the monitoring and analysis of
network traffic. Unlike other areas of digital forensics that focus on stored or static data, network forensics deals with volatile and dynamic data.
It generally has two uses. The first, relating to security, involves detecting anomalous traffic and identifying intrusions. The second use, relating
to law enforcement according to the chain of custody rule, involves capturing and Analyzing network traffic and can include tasks such as
reassembling transferred files.Stop, look and listen systems, in which each packet is analysed in a rudimentary way in memory and only
certain information saved for current analysis. On this analysis, we propose to archive data using various tools and provide a unified structure
based on a standard forensic process. This different unified structured IDS data are use to store and preserve in a place, which would be use to
present as an evidence in court by the forensic analysis.
Keywords- Network forensics, Log Files, Forensic Process,Chain Of Custody.
__________________________________________________*****_________________________________________________
I.
INTRODUCTION
RESEARCH METHODOLOGY
_______________________________________________________________________________________
ISSN: 2321-8169
2654 - 2658
_______________________________________________________________________________________________
A. Security Engine:
III.
PROPOSED WORK
_______________________________________________________________________________________
ISSN: 2321-8169
2654 - 2658
_______________________________________________________________________________________________
recovered during investigation can be produced in a court of
law. If the information is extracted accordingly i.e. yes then
the result is ready for the use and final reporting is presented.
1) Port scans
2) Traffic coming in on strange ports or protocols
3) Recognized threats, such as worms or viruses
attempting to enter the network
4) Anonymous attempts at using FTP or other
services on the network
5) Originating IP addresses of attacks
6) Bandwidth usage
File Logs
Evidence Data
Any Module
Extracted Information
Information Extraction/Identification
Result
Testing
Final Reporting
IV.
EVIDENCE DATA
FILE LOG
MODULE
EXTRACTED
INFORMATION
INFORMATION
EXTRACTION
->
INVESTIGATION
RESULT
TESTING
7
IDENTIFICATION
FINAL
REPORTING
PRESERVATION
COLLECT
ANALYSE
REPORT
Countermeasure:
Installation of Anti-virus
Installation of Firewall and blocking of unwanted
ports.
A. Firewall:
Firewalls are software programs or hardware system
that filter the traffic that flows into you network or on
PC through a internet connection. Firewalls are used
to prevent from unauthorized Internet users from
accessing private networks connected to the Internet.
All data entering or leaving the intranet passes
through the firewall, which examines each and every
packet and blocks those which not meet the security
criteria.
B. Intrusion-detection system (IDS):
An IDS logs everything thats deemed even mildly
suspicious. One purpose of IDS is to log an event for
further work in order to keep that event from
happening again. Heres a list of items that an IDS
may log:
examine recovered
data, search for
potential evidence
document facts &
findings, summarize
evidence, prepare
testimony
V.
2656
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
2654 - 2658
_______________________________________________________________________________________________
TABLE I.
Tools/Platform
Network Miner
Wireshark
Ubuntu, Kali
Putty
Winscp (Windows
Secure Copy)
TOOLS/PLATFORM
Features and
Advantages
A network forensic
analysis tool that can
be used as a passive
network
sniffer/packet
capturing tool
Widely used network
traffic analysis tool,
forms basis of
network forensic
studies.
It is a Debianderived Linux
distribution designed
for digital forensics
and penetration
testing
It is an easy to install
Apache distribution
containing MySQL,
PHP, and Perl
Attributes
Filter & collect
It to allow website
designers and
programmers to test
their work on their
own computers
without any access
to the Internet
It is a free and open-source terminal
emulator, serial console and network file
transfer application
It is a free and open- It is secure file
source SFTP, SCP transfer between a
and FTPclient for local and a remote
Microsoft Windows.
computer. For secure
transfers, it uses
Secure Shell (SSH)
and supports the
SCP protocol.
F. Analysis Work:
On the basis of analysis done by comparing the tool on the
website and the data collected through different tools will be
presented to the court as same as it origin according to the
forensic process with COC.
2657
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
2654 - 2658
_______________________________________________________________________________________________
TABLE II.
Sr.
No.
1.
Security Solutions
Description
Digital Certificates
2.
Firewalls,
Filtering
Deep
VI.
Packet
CONCLUSION
[9]
[1]
[13] Network
[2]
[3]
[4]
[5]
[6]
[7]
Forensics:
Tapping
the
Internet
http://www.oreillynet.com/pub/a/network/2002/04/26/nettap.htm
l.
2658
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________