Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network administrators build a solid foundation of processes and controls to identify incidents and gather evidence from the network. Forensic scientists and investigators are some of the fastest growing jobs in the United States with over 70,000 individuals employed in 2008. Specifically in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10,000 qualified specialists. Almost every technology company has developed or is developing a cloud computing strategy. To cut costs, many companies are moving toward network-based applications like SalesForce.com, PeopleSoft, and HR Direct. Every day, we are moving companies’ proprietary data into a cloud, which can be hosted anywhere in the world. These companies need to understand how to identify where their data is going and what they are sending.
- Key network forensics skills and tools are discussed—for example, capturing network traffic, using Snort for network-based forensics, using NetWitness Investigator for network traffic analysis, and deciphering TCP/IP.
- The current and future states of network forensics analysis tools are addressed.
- The admissibility of network-based traffic is covered as well as the typical life cycle of a network forensics investigation.
Forensic Investigators (corporate and law enforcement) and Incident Response Professionals, IT Security and System Administrator professionals.
PART I INTRODUCTION
CHAPTER 1 What Is Network Forensics?
Introduction to Cloud Computing
Introduction to the Incident Response Process
Investigative and Forensics Methodologies
Where Network Forensics Fits In
PART II GATHERING EVIDENCE
CHAPTER 2 Capturing Network Traffic
The Importance of DHCP Logs
Limitations of tcpdump
tcpdump Command Line
Limitations of Wireshark
Limitations of Using Libpcap and Derivatives
Using SPAN Ports or TAPS
SPAN Port Issues
Placement of Sensors
CHAPTER 3 Other Network Evidence
Overview of Botnets and Other Network-Aware Malware
The Botnet Life Cycle
Temporal, Relational, and Functional Analyses and Victimology
First Responder Evidence Sources of Network-Related Evidence
Dynamic Evidence Capture
Malware Analysis: Using Sandbox Technology
PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE
CHAPTER 4 Deciphering a TCP Header
OSI and TCP Reference Models
Source Port Number
Destination Port Number
Decipherment of a TCP Segment
TCP Signature Analysis
CHAPTER 5 Using Snort for Network-Based Forensics
Real-Time Network Traffi c Capturing
Playback Binary Network Traffic (pcap Format)
Snort Preprocessor Component
Snort Detection Engine Component
Network Forensics Evidence Generated with Snort
PART IV COMMER
- No. of pages:
- © Syngress 2010
- 2nd June 2010
- Paperback ISBN:
"Syngress [is] by far the best publisher of digital forensics and general security books…I would strongly recommend that you read Digital Forensics for Network, Internet and Cloud Computing…as this book really does cover a plethora of issues that we’ll all have to face, maybe sooner than we think." –Tony Campbell, Publisher, Digital Forensics Magazine