Abstract

With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth men-tioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly associated with security and data breaches. Each day, cyber-related criminals explore and devise complicated means of infiltrating and exploiting individual and corporate networks’ security. This means cyber or network forensic investigators must be equipped with the necessary mech-anisms of identifying the nature of security vulnerabilities and the ability to identify and apprehend the respective cyber-related offenders correctly. Therefore, this research’s primary focus is to provide a comprehensive analysis of the concept of network forensic investigation and describing the methodologies and tools employed in network forensic investigations by emphasizing on the study and analysis of the OSCAR methodology. Finally, this research provides an evaluative analysis of the relevant literature review in a network forensics investigation.

Highlights

  • The evolution of computer networks and the internet has created many opportunities for the perpetration of cyber-related crimes

  • Network forensics is a digital forensic process that involves the investigation, Analysis, and monitoring of computer networks to discover essential information that helps in the apprehension of cybercriminals [2]

  • This paper aims to provide a comprehensive description of network forensics’ concept to understand the tools and methodologies used

Read more

Summary

INTRODUCTION

The evolution of computer networks and the internet has created many opportunities for the perpetration of cyber-related crimes. Network forensics is a digital forensic process that involves the investigation, Analysis, and monitoring of computer networks to discover essential information that helps in the apprehension of cybercriminals [2]. Recent Internet technology advances drive the evolution of network security and its associated forensic processes and related toolsets. The companies usually use different items when it comes to network security Such devices typically approach protection from two main perspectives; detection and monitoring, in other words. Network forensics has been suggested in information security literature to incorporate investigative capabilities in existing networks This refers to a dedicated research infrastructure that enables network packets and events to be captured and evaluated for research purposes. An analysis and review of critical related works that illustrate the practical implementation of the network forensics concept are extensively discussed

RELATED WORK
Network Security and Network Forensic
NETWORK FORENSICS
Obtaining Information
Strategy
Collecting Evidence
Analyze
Report
NETWORK FORENSIC TOOLS
Wireshark
Tshark
Dumpcap
F F F F FRC FL F FL F F F FLR
CHALLENGES RELATING TO NETWORK EVIDENCE
VIII. CONCLUSION
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call