AN APPROACH TO ASSIST NETWORK FORENSICS ANALYSTS

Authors

  • Yogesh Pandey M.Tech (Cyber Security), Raksha Shakti University, Ahmedabad
  • Ravi K Sheth Assistant Professor (IT), Raksha Shakti University, Ahmedabad

Keywords:

Cyber-crime, Data, Forensics Analyst, Information, Network, Network Forensics, Network Traffic Piecewise Polynomials, Security

Abstract

Network forensics is a critical area of research because, in the digital age, information security is vital.
Network Forensics can help us to determine whether a network is truly under attack or a user has carelessly installed
an untested patch or some custom scripts. A lot of time and resources get wasted in determining whether a bug in a
custom program or an untested open-source program caused the “attack.” So, Network Forensics can reduce this
time and resources and can minimize downtime of a network. One must appropriately differentiate malicious network
traffic from normal network traffic based on the patterns in the data transfers. With confidential information such as
social security numbers, credit card information, and government records stored on a network, the potential threat of
identity theft, credit fraud, and national security breaches increases. In this paper we are presenting a review of how
we can reduce the network traffic data carved for Forensics by implementing Piecewise Polynomials to save memory
and also by implementing NetStore (a storage infrastructure) for storing our captured data and access those data in a
fast manner with simplified query options so that a Forensics Analyst can have a good resource for investigating
cyber-crime across the network.

Published

2016-04-25

How to Cite

Yogesh Pandey, & Ravi K Sheth. (2016). AN APPROACH TO ASSIST NETWORK FORENSICS ANALYSTS. International Journal of Advance Research in Engineering, Science & Technology, 3(4), 452–456. Retrieved from https://ijarest.org/index.php/ijarest/article/view/574