Network Forensics

Download Report

Transcript Network Forensics

Network Forensics
What is it?
► Remote
data acquisition (disk capture)
► Remote collection of live systems (memory)
► Traffic acquisition (cables and devices)
► Multiple examiners viewing single source
Technical
►
Current tools don’t cut it









►
Validation – integrity of data
Multiple machine functions (network devices)
Traffic Capture (non TCP/UDP)
Data loss due to high traffic volumes
Content ID and analysis (VoIP, IM)
Traffic pattern recognition
Data reduction
Attribution (IP forgery, onion routing)
False Positives
Dynamic systems
 Speed and minimal system impact is a priority
Legal
► Privacy
Issues
 Commingling of data
► Jurisdiction
 Interstate Warrants
Policy
► Banners
and policy statements
► Logging requirements
 Third party tools to meet our needs?
 Pressure device vendors?
► Bill
of rights
 Balance need for attribution with individual
rights
Short Term Goals
► Define
network forensics
► Tools
 Capture
 Analysis (data normalization, visualization and
mining)
 Attribution
► Process
 Best practices
 Guidelines for various devices/situations
Long Term Goals
► Persuade
Industry Provide Monitoring Ability
► OS development to enable capture of
volatile data
► OS development to minimize commingling