Network Forensic Process Model and Framework: An Alternative Scenario
Network Forensic Process Model and Framework: An Alternative Scenario
Abstract Network forensic provides a way to trail the cyber criminals through
analysis and trace back of collected network evidence. The prerequisite is the
deployment of various network traffic collection tools such as Iris, NetIntercept,
NetWitness, SoleraDS5150, Xplico. Network forensic analysis involves examina-
tion of network traffic to detect invasion and exploring how the crime took place,
i.e., setting up crime scene for investigation and replays. In this paper, we have
proposed the process model and compared with the existing network forensic
process models and frameworks. Along with highlighting the research challenges at
various stages, authors propose a high-level description of standard process model
and framework.
1 Introduction
P. Kaur A. Bijalwan
Department of Computer Science & Engineering, Uttaranchal University, Dehradun, India
e-mail: [email protected]
A. Bijalwan
e-mail: [email protected]
R.C. Joshi
Graphic Era University, Dehradun, India
e-mail: [email protected]
A. Awasthi (&)
University of Petroleum and Energy Studies, Dehradun, India
e-mail: [email protected]
2 Related Work
The existing process models are based on the steps involved during digital forensic
investigation process. Pilli et al. designed the generic network forensic process
model by extracting the key features from the existing digital forensic process
models and tried to incorporate in their proposed model [1]. Likewise, the incident
response phase provided by Mandia and Procise is included in their model with
two-way link between detection and presentation phases [2]. Their model involves
phases in the order of preparation phase [3], detection phase (newly introduced
phase), incident response phase [2], collection phase, preservation phase, exami-
nation phase, analysis phase, investigation phase [4, 5], and presentation phase [6].
Kohn et al. defined a generic digital forensic process model to support the
investigation process by following the standardized steps [7]. Liu et al. employed a
logic-based network forensic process model using PROLOG in order to analyze the
collected data evidence and remove other unrelated data [8]. This technique could
be used to reconstruct the attack scenario and can be presented as a proof in the
court of law. Lutui focused attention on design science, which involved the
extensive study of multidisciplinary digital forensic investigation process model to
give more emphasis on efficacy and coherence of the design phase [9].
There are numerous frameworks given by authors such as: ForNet stands for forensic
network is a distributed system-based framework given by Shanmugasundaram et al.
Network Forensic Process Model and Framework: An Alternative … 495
that can identify extreme network events [10]. Similarly, another category is based on
fuzzy decision tree-based network which is a soft computing-based framework [11].
Bijalwan and Pilli engrossed the psychology of criminals while breaching the network
security framework and requirements associated with network forensic [12].
After Ren and Jin [6] proposed the standard network forensic process model, then
Pilli et al. [1] also proposed a generic process model for network forensics incor-
porating the new phase of detection where fast evaluation is done to check the
alleged outbreak of crime. The proposed process model aims to first authorize the
investigator to perform the investigation process. It is important to preserve the
evidence while making an initial assessment. Here, there is an option to abort the
investigation if in case certain prerequisites are not fulfilled such as pre-installed
sensor and network traffic collector tools such as NetIntercept, Xplico, etc. In case
of further investigation is to be carried out, then a strategy is planned to reduce the
network traffic collected and document them. Further analysis is done, and review is
made through to check for further improvement. The proposed standard network
forensic process model is shown in Fig. 1. A brief detail of work performed at each
phase is highlighted in this section.
Authorization: This phase involves obtaining legal permissions from the con-
cerned authority to initiate the investigation process as shown in Fig. 1. Ciardhuain
proposed the authorization phase to take consent from the internal and external
organizations [13].
Preservation: Preservation phase implicates the avoidance of tempering of
network evidence [1]. For example in case a mobile device is involved in the crime,
then it must be switched off to avoid mitigating of call and network logs. This is the
second phase as shown in Fig. 1.
Initial Assessment: In this stage, an initial judgment is made whether to con-
tinue or abort investigation. If there are not pre-installed tools for network traffic
collection, then the investigation is terminated [4]. This phase has two outward
links, out of which only one is selected as displayed in Fig. 1.
Strategy Planning: This phase comprises to jot down the strategy to carry out
further investigation, i.e., team members, duration of investigation, cost involved,
and software use. This phase involves to construct a design strategy using design
science given by Lutui [9], giving more stress on efficacy and coherence.
Evidence Collection: Evidence is collected at this stage which may either
involve automatic or manual network traffic collection. Further, the huge data
collected from the network can be reduced by eliminating superfluous data [14].
Documentation: Documentation is the process of writing all the relevant
information required during the investigation process [4].
496 P. Kaur et al.
The amalgamations of standard network forensic framework phases with the phases
of network forensic process model are explained in this section. In this framework
Fig. 2, the network traffic is collected automatically and reduced to an extent by
eliminating the superfluous data and useful features are extracted which are
transferred to the next phase. The analysis of the derived features is carried through
to obtain a pattern. The newly derived pattern can be matched with the patterns
stored in the knowledge base. If a match is found, then an initial quick response is
made to the criminals stating warning to abort the attack. Further analysis is done to
constantly derive new patterns in case no match is found. The reconstruction phase
involves design of attack scenario which is then replayed by the investigator in the
next phase.
Network Traffic Collector: The vast amount of traffic flows from the Internet.
The network traffic can be collected in one of the following three manners:
(1) automatic network traffic collection [16]; (2) collecting traffic on change in
frequency at different intervals; and (3) manual network traffic collection Casey [4].
This phase involves taking permissions from the concerned authority to perform
forensics in the concerned intruded network and thus collect network traffic. After
obtaining the authorization, the network traffic is collected and the preservation
phase involves keeping the data unaltered while examining the crime scenario. The
three phases of process model acting at the network traffic collector phase is shown
in Fig. 3. Nagesh proposed automatic network data collection using distributed
mobile agents [16]. Initial assessment is done in order to check the feasibility of the
Fig. 1 acts at the analysis phase of framework Fig. 2, and the amalgamation is
shown in Fig. 5.
Reconstruction: The pattern obtained from the analysis phase is reconstructed
to generate the sequence of events [4]. The patterns are scrutinized according to the
flow of packet stream. A proper investigation is done of TCP connection in order to
obtain knowledge about the inflow and outflow of packets via which ports. The
investigation phase of process model acts at the reconstruction phase of framework
to obtain the attack patterns as shown in Fig. 6.
500 P. Kaur et al.
Replay: In this phase, the pattern created in the previous phase is replayed in
order to obtain the crime scenario. The replay of the attack scenario is done on the
investigator end without harming the actual network. This is done using simulators
to replay the constructed attack situation. The outcome of the simulation is com-
pared with the actual attack scene, and reporting is done. Based on reporting, a
decision is made whether to include more parameters and after exhaustive review of
the replay process, the control goes back to the strategy planning phase if further
improvements are required which is shown in Fig. 7.
Network Forensic Process Model and Framework: An Alternative … 501
4 Challenges
The authorization phase may sometimes face challenge of taking permission from
external bodies located overseas, who may not permit due to their country’s legal
perspectives. The challenge arises in analysis of enormous network traffic; it is
therefore suggested in this paper to reduce the network traffic by eliminating the
irrelevant traffic based on some criteria. Before actually initiating the preservation
phase, the intruder may clear its attack traces which could act as a base for
investigation. While collecting evidence, it is necessary to reduce the network traffic
data by using substantial data reduction techniques leading to the availability of
only relevant data. Sometimes, it is difficult to understand the methodology and
intension of the attacker while analyzing large volume of data. If the evidence
collected cannot be presented in court of law, then that investigation is not con-
sidered fruitful. Liu et al. proposed techniques using which network evidence could
be shown in the court of law whenever required [8].
5 Conclusion
References
1. Pilli, E. S., Joshi, R.C., Niyogi, R.: Network forensic frameworks: Survey and research
challenges. Digital Investigation 7, 14–27, (2010).
2. Mandia, K., Procise, C.: Incident Response and Computer Forensics. Osborne McGraw-Hill,
New York, (2003).
3. Reith, M., Carr, C., Gunsch, G.: An Examination of Digital Forensic Models. International
Journal of Digital Evidence 1(3), (2002).
4. Casey, E.: Network traffic as a source of evidence: tool strengths, weakness, and future
needs,” Digital Investigation 1, 28–43 (2004).
5. Palmer, G. L.: Forensic analysis in digital world. International Journal of Digital Evidence, 1
(1), 1–6 (2002).
6. Ren, W., Jin, H.: Distributed Agent-based Real Time Network Intrusion Forensics System
Architecture Design. Proceedings of the International Conference on Advanced Information
Networking and Applications, pp. 177–182, IEEE Press, New York (2005).
502 P. Kaur et al.
7. Kohn, M. D., Eloff, M. M., Eloff, J. H. P.: Integrated digital forensic process model.
Computer & Security 38, 103–115 (2013).
8. Liu, C., Singhal, A., Wijesekera, D.: A logic-based network forensic model for evidence
analysis. IFIP Advances in Information and Communication Technology 462, 129–145
(2015).
9. Lutui, R.: A multidisciplinary digital forensic investigation process model. Business Horizons
59, 593–604 (2016).
10. Shanmugasundaram, K., Memon, N., Savant, A., Bronnimann, H.: ForNet: A Distributed
Forensics Network. Digital Investigation 7, 14–27 (2010).
11. Liu, Z., Feng, D.: Incremental fuzzy decision tree-based network forensic system. Conference
on Computational and Information Science 3802, 995–1002 (2005).
12. Bijalwan, A., Pilli, E. S.: Crime psychology using network forensics. Journal of Computer
Engineering & Information Technology, 3, (2014). doi: 10.4172/2324-9307.1000120.
13. Ciardhuain, S. O.: An extended model of cybercrime investigations. International Journal of
Digital Evidence, 3(2), 1–22 (2004).
14. Tang, Y., Daniels, T. E.: A Simple Framework for Distributed Forensics. Proceedings of the
25th IEEE International Conference on Distributed Computing Systems Workshops, February
2005.
15. Selamat, S. R., Yusof, R., Sahib, S.: Mapping Process of Digital Forensic Investigation
Framework. International Journal of Computer Science and Network Security 8, 163–169,
(2008).
16. Nagesh, A.: Distributed network forensics using JADE mobile agent framework. Master’s
thesis, Arizona State University (2007).
17. Chen, L. M., Chen, M. C., Liao, W., Sun, Y. S.: A Scalable network forensics mechanism for
stealthy self-propagating attacks. Computer Communications, 36, 1471–1484, (2013).
18. Ndatinya, V., Xiao, Z., Manepalli, V. R., Meng, K., Xiao, Y.: Network forensic analysis using
Wireshark. International Journal of Sensor Networks, 10, 91–106, (2015).