You are on page 1of 7

Network Forensics

What is it?
Remote

data acquisition (disk capture) Remote collection of live systems (memory) Traffic acquisition (cables and devices) Multiple examiners viewing single source

Technical

Current tools dont cut it


Validation integrity of data Multiple machine functions (network devices) Traffic Capture (non TCP/UDP) Data loss due to high traffic volumes Content ID and analysis (VoIP, IM) Traffic pattern recognition Data reduction Attribution (IP forgery, onion routing) False Positives

Dynamic systems
Speed and minimal system impact is a priority

Legal
Privacy

Issues

Commingling of data
Jurisdiction

Interstate Warrants

Policy
Banners

and policy statements Logging requirements


Third party tools to meet our needs? Pressure device vendors?
Bill

of rights

Balance need for attribution with individual rights

Short Term Goals


Define

network forensics

Tools

Capture Analysis (data normalization, visualization and mining) Attribution


Process

Best practices Guidelines for various devices/situations

Long Term Goals


Persuade

Industry Provide Monitoring Ability OS development to enable capture of volatile data OS development to minimize commingling

You might also like