Network forensic frameworks: Survey and research challenges

https://doi.org/10.1016/j.diin.2010.02.003Get rights and content

Abstract

Network forensics is the science that deals with capture, recording, and analysis of network traffic for detecting intrusions and investigating them. This paper makes an exhaustive survey of various network forensic frameworks proposed till date. A generic process model for network forensics is proposed which is built on various existing models of digital forensics. Definition, categorization and motivation for network forensics are clearly stated. The functionality of various Network Forensic Analysis Tools (NFATs) and network security monitoring tools, available for forensics examiners is discussed. The specific research gaps existing in implementation frameworks, process models and analysis tools are identified and major challenges are highlighted. The significance of this work is that it presents an overview on network forensics covering tools, process models and framework implementations, which will be very much useful for security practitioners and researchers in exploring this upcoming and young discipline.

Introduction

On August 6, 2009, social networking sites like Twitter, Facebook and Google blogger were knocked down by distributed denial of service (DDoS) attacks. Facebook and Google could recover within a day while Twitter staff team worked round the clock in the weekend to deal with the attack as reported in Computer World. Los Angeles Times speculated that perpetrators of the DDoS attack may have been bored teenagers or Russian and Georgian political operatives involved in cyberspace fighting. The newspaper quoted security experts that fingerprints of a sophisticated operation involving botnets were observed and Twitter website had limited capacity to handle incoming traffic. The obvious reason for the success of this attack was that Twitter's network did not have the defenses in place to mitigate a massive DDoS attack. Most traditional security products aren't equipped to handle massive bombardment of packets that happens in a DDoS attack. The lack of solid contingency plan and pro-active security mechanism created a fragile platform vulnerable to attack as reported in ChannelWeb.

Rosenberg referring to the attack on Twitter, wrote that having appropriate tools in place and following correct procedures help to eliminate or mitigate the effects of an attack. A network analysis tool can be used to capture all packets in a common data format for analysis. It can also raise alerts when thresholds are exceeded. Network forensic tools can be used to reconstruct the sequence of events that occur at the time of attack. Crucial information is gained to prevent a similar attack in future even if the present attack could not be prevented.

Habib in his detailed analysis explained that network forensics can be used to analyze how the attack occurred, who was involved in that attack, duration of the exploit, and the methodology used in the attack. It also helps in characterizing zero-day attacks. In addition, network forensics can be used as a tool for monitoring user activity, business transaction analysis and pinpointing the source of intermittent performance issues.

Network forensics is not another term for network security. It is an extended phase of network security as the data for forensic analysis are collected from security products like firewalls and intrusion detection systems. The results of this data analysis are utilized for investigating the attacks. However, there may be certain crimes which do not breach network security policies but may be legally prosecutable. These crimes can be handled only by network forensics (Broucek and Turner, 2001).

Network security protects system against attack while network forensics focuses on recording evidence of the attack. Network security products are generalized and look for possible harmful behaviors. This monitoring is a continuous process and is performed all through the day. But, network forensics involves post mortem investigation of the attack and is initiated notitia criminis (after crime notification). It is case specific as each crime scenario is different and the process is time bound.

Network forensics is the science that deals with capture, recording, and analysis of network traffic. The network log data are collected from existing network security products, analyzed for attack characterization and investigated to traceback the perpetuators. This process can bring out deficiencies in security products which can be utilized to guide deployment and improvement of these tools.

Network forensics is a natural extension of computer forensics. Computer forensics was introduced by law enforcement and has many guiding principles from the investigative methodology of judicial system. Computer forensics involves preservation, identification, extraction, documentation, and interpretation of computer data. Network forensics evolved as a response to the hacker community and involves capture, recording, and analysis of network events in order to discover the source of attacks.

In computer forensics, investigator and the hacker being investigated are at two different levels with investigator at an advantage. In network forensics, network investigator and the attacker are at the same skill level. The hacker uses a set of tools to launch the attack and the network forensic specialist uses similar tools to investigate the attack (Berghel, 2003). Network forensic investigator is further at disadvantage as investigation is one of the many jobs he is involved. The hacker has all the time at his disposal and will regularly enhance his skills, motivated by the millions of dollars in stake. The seriousness of what is involved makes network forensics an important research field.

The aim of this work is to provide a detailed overview of network forensics. The paper is organized as follows: definition, categorization and motivation are clearly stated in Section 2. The various tools available for network forensic analysis and security tools which can also be used for specific phases are described in Section 3. Section 4 surveys the existing network forensic models. We use the term ‘model’ to imply a theoretical representation of phases involved in network forensics. This model may or may not have been implemented. We propose a generic process model for network forensics, considering only the phases applicable to networked environments, based on the existing models.

Section 5 surveys many implementation frameworks of these models. They are discussed under various categories like distributed systems, soft computing, honeypots and aggregation systems. We use the term ‘framework’ to mean practical implementation. The specific research gaps existing in these framework implementations and major challenges are presented in Section 6. Conclusions and future work are given in Section 7.

Section snippets

Background

Network forensics is being researched for a decade but it still seems a very young science and many issues are still not very clear and are ambiguous. The definition, categorization and motivation for this upcoming field are given below.

Network Forensic Analysis Tools

Network Forensic Analysis Tools (NFATs) (Sira, 2003) allow administrators to monitor networks, gather all information about anomalous traffic, assist in network crime investigation and help in generating a suitable incident response. NFATs also help in analyzing the insider theft and misuse of resources, predict attack targets in near future, perform risk assessment, evaluate network performance, and help to protect intellectual propriety.

NFATs capture the entire network traffic, allow users to

Network forensic process models

Proven investigative techniques and methods exist for the traditional computer forensic discipline. However as we become more and more networked and mobile in home and business, there is a need to expand our forensic view from disk level to the network level. There is a need to factor this transition into concepts, designs and prototypes. Various digital forensic models were proposed to handle the networked environments since 2001. A generic process model for network forensics is proposed after

Network forensic frameworks

DFRWS proposed the first process model for digital forensics in the networked environments. Many variant models were proposed with different phases as discussed in the previous section. Researchers developed many frameworks which implement these phases and an exhaustive survey is presented category wise to highlight the specific gaps and identify the research challenges.

Research challenges

The frameworks and implementations for network forensic analysis have been surveyed in the previous section. The limitations and specific research gaps associated with different phases in each implementation are given below.

Conclusions and future work

Network forensics ensures investigation of the attacks by tracing the attack back to the source and attributing the crime to a person, host or a network. It has the ability to predict future attacks by constructing attack patterns from existing traces of intrusion data. The incident response to an attack is much faster. The preparation of authentic evidence, admissible into a legal system, is also facilitated.

We made an extensive survey on various network forensic framework implementations. We

References (87)

  • Anaya EA, Nakano-Miyatake M, Meana HMP. Network forensics with neurofuzzy techniques. In: Proceedings of the 52nd IEEE...
  • Argus,...
  • Baryamureeba V, Tushabe F. The enhanced digital investigation process model. In: Proceedings of the fourth digital...
  • H. Berghel

    The discipline of Internet forensics

    Communications of the ACM

    (2003)
  • Bro,...
  • Broucek V, Turner P. Forensic computing: developing a conceptual approach for an emerging academic discipline. In:...
  • Carrier et al.

    Getting physical with the digital investigation process

    International Journal of Digital Evidence

    (2003)
  • E. Casey et al.

    The investigative process

  • S.O. Ciardhuain

    An extended model of cybercrime investigations

    International Journal of Digital Evidence

    (2004)
  • G.E. Clarke

    Network+ certification study guide

    (2006)
  • M.I. Cohen

    PyFlag – an advanced network forensic platform

    Digital Investigation (The International Journal of Digital Forensics & Incident Response)

    (Sept. 2008)
  • V. Corey et al.

    Network forensics analysis

    IEEE Internet Computing

    (2002)
  • DDOS attackers continue hitting Twitter, Facebook, Google,...
  • Denial-of-service got Twitter. Is your network next?,...
  • Flow-tools,...
  • Garfinkel S. Network forensics: tapping the Internet,...
  • Infinistream,...
  • Iris,...
  • ISO/IEC 27001. Information technology (security techniques, information security management, requirements),...
  • Khurana H, Basney J, Bakht M, Freemon M, Welch V, Butler R. Palantir: a framework for collaborative incident response...
  • J. Kim et al.

    A fuzzy expert system for network forensics

  • Z. Liu et al.

    Incremental fuzzy decision tree-based network forensic system

  • K. Mandia et al.

    Incident response and computer forensics

    (2003)
  • Merkle LD. Automated network forensics. In: Proceedings of the conference on genetic and evolutionary computation...
  • Mitropoulos S, Patsos D, Douligeris C. Network forensics: towards a classification of traceback mechanisms. In:...
  • S. Mukkamala et al.

    Identifying significant features for network forensic analysis using artificial intelligent techniques

    International Journal of Digital Evidence

    (2003)
  • Nagesh A. Distributed network forensics using JADE mobile agent framework. Master's thesis. Department of Computing...
  • Nessus,...
  • NetDetector,...
  • NetFlow,...
  • Network forensics and digital time travel,...
  • netForensics security compliance management,...
  • NetIntercept,...
  • Cited by (0)

    View full text