Preface |
|
xvii | |
Organization of This Book |
|
xix | |
Author |
|
xxi | |
Acknowledgments |
|
xxiii | |
Part A Network Forensics Concepts |
|
|
1 Introduction to Network Forensics |
|
|
3 | (28) |
|
|
3 | (2) |
|
|
5 | (3) |
|
1.2.1 Evolution of Network Security |
|
|
5 | (1) |
|
1.2.2 Importance of Network Security |
|
|
6 | (1) |
|
1.2.3 Basic Terminology for Understanding Network Security |
|
|
6 | (1) |
|
1.2.4 Features of Network Security Services |
|
|
7 | (1) |
|
1.3 Types of Network Security Attacks |
|
|
8 | (3) |
|
|
8 | (2) |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.3.1.3 Interruption and Denial of Service |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.3.1.5 Masquerade Attack |
|
|
10 | (1) |
|
|
10 | (1) |
|
|
10 | (1) |
|
1.3.2.2 Message Transmission |
|
|
10 | (1) |
|
1.4 Network Security Tools |
|
|
11 | (2) |
|
1.4.1 Intrusion Detection System |
|
|
11 | (1) |
|
1.4.1.1 Knowledge- or Signature-Based IDS |
|
|
11 | (1) |
|
1.4.1.2 Behavior- or Anomaly-Based IDS |
|
|
11 | (1) |
|
|
12 | (1) |
|
1.4.2.1 Network-Level Firewall |
|
|
12 | (1) |
|
1.4.2.2 Application-Level Firewall |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (1) |
|
|
13 | (4) |
|
1.5.1 Network Access Control |
|
|
14 | (1) |
|
1.5.2 Application Security |
|
|
14 | (1) |
|
1.5.2.1 Application Security Process |
|
|
15 | (1) |
|
|
15 | (2) |
|
1.5.3.1 Antivirus Application on System |
|
|
16 | (1) |
|
|
16 | (1) |
|
1.5.3.3 Antispam Applications |
|
|
16 | (1) |
|
|
16 | (1) |
|
1.5.3.5 Password Rotation |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (1) |
|
|
17 | (3) |
|
1.6.1 Digital Forensics Evolution |
|
|
18 | (1) |
|
1.6.2 Digital Forensic Types |
|
|
19 | (1) |
|
|
20 | (1) |
|
1.7.1 Computer Forensics Process |
|
|
20 | (1) |
|
|
21 | (5) |
|
|
21 | (1) |
|
1.8.2 Taxonomy of Network Forensics Tools |
|
|
22 | (1) |
|
1.8.3 Network Forensics Mechanism |
|
|
23 | (1) |
|
1.8.4 Network Forensics Process |
|
|
24 | (2) |
|
|
24 | (1) |
|
1.8.4.2 Collection of Evidences |
|
|
24 | (1) |
|
1.8.4.3 Identification of Evidences |
|
|
25 | (1) |
|
1.8.4.4 Detection of Crime |
|
|
25 | (1) |
|
|
25 | (1) |
|
|
26 | (1) |
|
1.8.4.7 Incident Response |
|
|
26 | (1) |
|
1.9 Computer Forensics vs Network Forensics |
|
|
26 | (1) |
|
|
27 | (1) |
|
|
27 | (1) |
|
1.10 Network Security vs Network Forensics |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
28 | (1) |
|
|
29 | (2) |
|
|
31 | (22) |
|
|
31 | (2) |
|
|
33 | (2) |
|
2.2.1 Warfare Sponsored by the Country |
|
|
33 | (1) |
|
|
33 | (1) |
|
2.2.3 Commercially Motivated Attack |
|
|
33 | (1) |
|
2.2.4 Financially Driven Criminal Attack |
|
|
33 | (1) |
|
|
33 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
34 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (1) |
|
|
35 | (9) |
|
|
35 | (2) |
|
|
37 | (1) |
|
2.3.3 Classification of Malware |
|
|
38 | (7) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
40 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
|
41 | (1) |
|
2.3.3.10 Kit (Virus Generator) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
42 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
|
43 | (1) |
|
2.3.3.19 Hacker's Useful Components and Other Harmful Programs |
|
|
44 | (1) |
|
2.4 Terminology for the Cyber Attackers |
|
|
44 | (1) |
|
|
45 | (4) |
|
2.5.1 Distributed Denial of Service Attack |
|
|
45 | (1) |
|
|
46 | (1) |
|
2.5.3 Personal Information Thieving |
|
|
47 | (1) |
|
|
48 | (1) |
|
|
49 | (1) |
|
|
49 | (1) |
|
|
50 | (3) |
|
3 Network Forensics Process Model |
|
|
53 | (24) |
|
|
53 | (1) |
|
3.2 Recent Trend in Network Forensics |
|
|
54 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
|
55 | (1) |
|
3.3 Life Cycle of Network Forensics |
|
|
55 | (2) |
|
3.4 Network Forensics Process Model |
|
|
57 | (3) |
|
|
57 | (1) |
|
3.4.2 Collection of Evidence |
|
|
58 | (1) |
|
3.4.3 Identification of Evidence |
|
|
58 | (1) |
|
|
58 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
|
59 | (1) |
|
3.5 Detection and Investigative Network Forensics Frameworks |
|
|
60 | (14) |
|
3.5.1 Detection-Based Framework |
|
|
60 | (4) |
|
3.5.2 BOT GAD-Based Framework |
|
|
64 | (1) |
|
3.5.3 System Architecture-Based Framework |
|
|
65 | (1) |
|
3.5.4 Fast Flux-Based Framework |
|
|
65 | (1) |
|
3.5.5 Mac OS-Based Framework |
|
|
66 | (1) |
|
3.5.6 Open Flow-Based or AAFID Framework |
|
|
67 | (1) |
|
3.5.7 P2P-Based Framework |
|
|
67 | (3) |
|
3.5.8 Distributed Device-Based Frameworks |
|
|
70 | (1) |
|
3.5.9 Soft Computing-Based Frameworks |
|
|
70 | (2) |
|
3.5.10 Honeypot-Based Frameworks |
|
|
72 | (1) |
|
3.5.11 Attack Graph-Based Frameworks |
|
|
72 | (1) |
|
3.5.12 Formal Method-Based Frameworks |
|
|
72 | (1) |
|
3.5.13 Formal Method-Based Frameworks |
|
|
72 | (1) |
|
3.5.14 Network Monitoring Framework |
|
|
72 | (2) |
|
|
74 | (1) |
|
|
74 | (3) |
|
4 Classification of Network Forensics |
|
|
77 | (20) |
|
|
77 | (3) |
|
4.1.1 Signature-Based or Misuse Detection |
|
|
77 | (2) |
|
|
78 | (1) |
|
4.1.1.2 Capturing (Avoidance of Packets Drop) |
|
|
78 | (1) |
|
|
78 | (1) |
|
4.1.1.4 Software Initiation |
|
|
78 | (1) |
|
4.1.1.5 Multiperspective Environment |
|
|
79 | (1) |
|
4.1.2 Anomaly-Based or Hybrid Detection |
|
|
79 | (1) |
|
4.1.3 Comparative Difference between Signature- and Anomaly-Based Detection |
|
|
79 | (1) |
|
4.2 Detection and Prevention System |
|
|
80 | (2) |
|
|
80 | (1) |
|
|
81 | (1) |
|
4.3 Types of Network Forensics Classification |
|
|
82 | (6) |
|
4.3.1 Payload-Based Identification |
|
|
83 | (4) |
|
4.3.1.1 Deep Packet Inspection |
|
|
84 | (3) |
|
4.3.2 Statistical-Based Identification |
|
|
87 | (1) |
|
4.3.2.1 Heuristic Analysis |
|
|
87 | (1) |
|
4.4 Network Forensics Analysis Classification |
|
|
88 | (4) |
|
4.4.1 Signature-Based Classification |
|
|
88 | (1) |
|
4.4.2 Decision Tree-Based Classification |
|
|
88 | (1) |
|
4.4.3 Ensemble-Based Classification |
|
|
89 | (9) |
|
|
91 | (1) |
|
4.4.3.2 Adaptive Boosting |
|
|
91 | (1) |
|
|
91 | (1) |
|
4.5 Implementation and Results |
|
|
92 | (1) |
|
|
93 | (1) |
|
|
93 | (4) |
Part B Network Forensics Acquisition |
|
|
5 Network Forensics Tools |
|
|
97 | (22) |
|
|
97 | (1) |
|
|
98 | (2) |
|
|
99 | (1) |
|
|
99 | (1) |
|
|
100 | (1) |
|
|
100 | (1) |
|
|
100 | (2) |
|
5.3.1 Text-Based Traceroute |
|
|
101 | (1) |
|
5.3.2 3D-Based Traceroute |
|
|
101 | (1) |
|
|
102 | (1) |
|
|
102 | (8) |
|
5.4.1 Packet Sniffer Tool |
|
|
102 | (4) |
|
|
102 | (1) |
|
|
103 | (1) |
|
|
104 | (1) |
|
|
104 | (2) |
|
5.4.2 Intrusion Detection System (IDS) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
106 | (1) |
|
|
107 | (1) |
|
|
107 | (1) |
|
|
108 | (1) |
|
5.4.4 Pattern-Based Monitoring Tool |
|
|
108 | (2) |
|
|
109 | (1) |
|
|
109 | (1) |
|
5.4.5 Statistics-Based Monitoring System |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (1) |
|
|
110 | (6) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (1) |
|
|
111 | (8) |
|
|
112 | (1) |
|
|
112 | (4) |
|
|
116 | (1) |
|
|
116 | (3) |
|
6 Network Forensics Techniques |
|
|
119 | (18) |
|
|
119 | (1) |
|
6.1.1 Conventional Network Forensics Technique |
|
|
120 | (1) |
|
6.1.2 Advanced Network Forensics Technique |
|
|
120 | (1) |
|
6.2 Conventional Network Forensics Technique |
|
|
120 | (7) |
|
6.2.1 IP Traceback Technique |
|
|
120 | (4) |
|
6.2.1.1 Link State Testing |
|
|
121 | (1) |
|
|
121 | (1) |
|
6.2.1.3 Controlled Flooding |
|
|
122 | (1) |
|
|
122 | (1) |
|
6.2.1.5 Packet Marking Techniques |
|
|
123 | (1) |
|
6.2.1.6 Source Path Isolation Engine |
|
|
123 | (1) |
|
6.2.1.7 Payload Attribution |
|
|
124 | (1) |
|
6.2.2 Intrusion Detection System |
|
|
124 | (1) |
|
6.2.2.1 Knowledge- or Signature-Based IDS |
|
|
125 | (1) |
|
6.2.2.2 Behavior- or Anomaly-Based IDS |
|
|
125 | (1) |
|
|
125 | (2) |
|
6.2.3.1 Network-Level Firewall |
|
|
126 | (1) |
|
6.2.3.2 Application-Level Firewall |
|
|
127 | (1) |
|
|
127 | (1) |
|
6.3 Advanced Network Forensics Techniques |
|
|
127 | (8) |
|
6.3.1 Vulnerability Detection Techniques |
|
|
127 | (3) |
|
6.3.1.1 Data Fusion, Alert Generation, and Correlation |
|
|
128 | (1) |
|
6.3.1.2 Black-Box Testing |
|
|
128 | (1) |
|
6.3.1.3 White-Box Testing |
|
|
129 | (1) |
|
6.3.1.4 Double-Guard Detecting Techniques |
|
|
129 | (1) |
|
6.3.1.5 Hidden Markov Models |
|
|
130 | (1) |
|
6.3.2 Honeypots and Honeynet |
|
|
130 | (1) |
|
|
130 | (1) |
|
|
130 | (1) |
|
6.3.2.3 Classification of Honeypots |
|
|
130 | (1) |
|
|
131 | (1) |
|
6.3.2.5 Architecture Types of Honeynet |
|
|
131 | (1) |
|
6.3.3 Highly Efficient Techniques for Network Forensics |
|
|
131 | (2) |
|
|
132 | (1) |
|
6.3.3.2 Rabin Fingerprinting |
|
|
132 | (1) |
|
|
132 | (1) |
|
6.3.3.4 Attribution Systems |
|
|
133 | (1) |
|
6.3.4 UDP Flooding Technique |
|
|
133 | (2) |
|
|
135 | (1) |
|
|
135 | (2) |
|
7 Detection of Vulnerabilities |
|
|
137 | (22) |
|
|
137 | (1) |
|
7.2 Network Forensics Acquisition |
|
|
138 | (9) |
|
|
138 | (1) |
|
|
139 | (1) |
|
|
140 | (2) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
140 | (1) |
|
|
141 | (1) |
|
7.2.4 Forensics Acquisition Website |
|
|
142 | (1) |
|
7.2.5 Oxygen Forensic Suit |
|
|
143 | (1) |
|
7.2.6 Paladin Forensic Suit |
|
|
143 | (1) |
|
|
144 | (1) |
|
|
145 | (1) |
|
|
145 | (1) |
|
|
146 | (1) |
|
7.3 Identification of Network Attacks |
|
|
147 | (7) |
|
|
148 | (1) |
|
7.3.2 Random-UDP Flooding |
|
|
148 | (13) |
|
7.3.2.1 Normal Flow of UDP Datagrams |
|
|
148 | (2) |
|
7.3.2.2 Random-UDP Flooding Attack |
|
|
150 | (2) |
|
7.3.2.3 Identification of Random-UDP Flooding Attack |
|
|
152 | (2) |
|
|
154 | (1) |
|
|
155 | (4) |
Part C Network Forensics Attribution |
|
|
8 Network Forensics Analysis |
|
|
159 | (22) |
|
|
159 | (2) |
|
8.2 Network Forensic Standard Process Model |
|
|
161 | (2) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
8.2.5 Evidence Collection |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
|
163 | (1) |
|
8.2.9 Decision and Reporting |
|
|
163 | (1) |
|
|
163 | (1) |
|
8.3 Network Forensic Framework for the Analysis |
|
|
163 | (4) |
|
8.3.1 Network Traffic Collector |
|
|
164 | (1) |
|
8.3.2 Reduction and Feature Extraction |
|
|
164 | (1) |
|
8.3.3 Analysis and Pattern Matching |
|
|
165 | (1) |
|
|
166 | (1) |
|
|
166 | (1) |
|
8.4 Network Traffic Analysis |
|
|
167 | (6) |
|
|
168 | (1) |
|
8.4.2 Dataset: KDD Cup 99 Case Study-1 |
|
|
168 | (2) |
|
|
170 | (1) |
|
8.4.4 Case Study-I: Experimental Setup |
|
|
170 | (1) |
|
|
170 | (2) |
|
8.4.6 Analysis of the Case |
|
|
172 | (1) |
|
8.5 Network Forensics Analysis with Case Study-2 |
|
|
173 | (6) |
|
8.5.1 Analysis Methodology |
|
|
173 | (1) |
|
|
174 | (2) |
|
8.5.2.1 Domain Name System |
|
|
174 | (1) |
|
8.5.2.2 Internet Control Message Protocol |
|
|
174 | (2) |
|
8.5.3 Bot Analysis Using Classification |
|
|
176 | (3) |
|
|
179 | (1) |
|
|
179 | (2) |
|
9 Evidence and Incident Response |
|
|
181 | (20) |
|
|
181 | (1) |
|
9.2 Evidence and Its Sources |
|
|
182 | (4) |
|
9.2.1 Sources of Evidence within Network |
|
|
185 | (1) |
|
9.2.2 Sources of Evidence in Remote Network |
|
|
186 | (1) |
|
|
186 | (2) |
|
9.3.1 Recovery as Fast as Possible |
|
|
187 | (1) |
|
9.3.2 Monitoring and Collecting Evidence |
|
|
187 | (1) |
|
9.4 Evidence-Handling Procedure |
|
|
188 | (4) |
|
9.4.1 Identification of Evidence |
|
|
188 | (1) |
|
9.4.2 Collection for the Evidence |
|
|
188 | (2) |
|
9.4.3 Acquisition and Analysis of Evidence |
|
|
190 | (2) |
|
9.4.3.1 Physical Extraction |
|
|
190 | (1) |
|
9.4.3.2 Logical Extraction |
|
|
190 | (2) |
|
9.4.4 Preservation and Reporting of Evidence |
|
|
192 | (1) |
|
9.5 Incident Response and Its Methodology |
|
|
192 | (6) |
|
9.5.1 Process of Incident Response |
|
|
193 | (2) |
|
|
193 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
9.5.1.6 Eradication and Recovery |
|
|
195 | (1) |
|
|
195 | (1) |
|
9.5.2 Incident Classification |
|
|
195 | (2) |
|
9.5.2.1 High-Level Incident |
|
|
196 | (1) |
|
9.5.2.2 Middle- or Moderate-Level Incident |
|
|
196 | (1) |
|
9.5.2.3 Low-Level Incident |
|
|
197 | (1) |
|
|
197 | (1) |
|
|
198 | (1) |
|
|
199 | (2) |
|
10 Introduction to Botnet |
|
|
201 | (20) |
|
|
201 | (4) |
|
10.1.1 Spartan Dominition Robot (SD Bot) |
|
|
203 | (1) |
|
10.1.2 AgoBot (aka Gaobot or Phatbot) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
204 | (1) |
|
|
205 | (1) |
|
|
205 | (1) |
|
|
206 | (2) |
|
|
208 | (2) |
|
10.4.1 Propagation and Compromise |
|
|
208 | (1) |
|
10.4.2 Command and Control |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
209 | (1) |
|
|
210 | (1) |
|
|
210 | (1) |
|
10.5 Botnet Security Attacks |
|
|
210 | (1) |
|
10.5.1 Warfare Sponsored by the Country |
|
|
210 | (1) |
|
|
210 | (1) |
|
10.5.3 Commercially Motivated Attack |
|
|
211 | (1) |
|
10.5.4 Financially Driven Criminal Attack |
|
|
211 | (1) |
|
|
211 | (1) |
|
10.6 Traditional Botnet Attacks |
|
|
211 | (5) |
|
10.6.1 Distributed Denial of Service Attack |
|
|
211 | (2) |
|
|
213 | (1) |
|
10.6.3 Personal Information Theft |
|
|
214 | (1) |
|
|
215 | (1) |
|
|
215 | (1) |
|
10.7 Recent Botnet Attacks |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
216 | (1) |
|
|
217 | (1) |
|
10.7.4 Attacks on WordPress Targeting "Admin" Password |
|
|
217 | (1) |
|
10.7.5 Android Master Key Vulnerability |
|
|
217 | (1) |
|
|
217 | (1) |
|
|
218 | (3) |
|
|
221 | (26) |
|
|
221 | (2) |
|
11.2 Methodology Used in Botnet Forensics |
|
|
223 | (1) |
|
11.2.1 Collection of Malwares |
|
|
223 | (1) |
|
|
223 | (1) |
|
11.3 Nature of Botnet Forensics |
|
|
223 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (1) |
|
|
224 | (2) |
|
11.5 Botnet Forensics Classification |
|
|
226 | (3) |
|
11.5.1 Payload Classification |
|
|
226 | (1) |
|
11.5.2 Signature-Based Classification |
|
|
227 | (1) |
|
11.5.3 Decision Tree-Based Classification |
|
|
228 | (1) |
|
11.5.4 Ensemble-Based Classification |
|
|
228 | (1) |
|
11.6 Botnet Forensic Framework |
|
|
229 | (2) |
|
11.6.1 Botnet Forensic Identification |
|
|
230 | (1) |
|
11.7 Botnet Forensic Analysis |
|
|
231 | (11) |
|
11.7.1 Botnet Inquisition Model |
|
|
232 | (4) |
|
|
232 | (1) |
|
|
233 | (1) |
|
|
234 | (1) |
|
11.7.1.4 Network Traffic Filtration |
|
|
234 | (1) |
|
|
234 | (1) |
|
|
234 | (1) |
|
11.7.1.7 Detecting Malicious Traffic Content |
|
|
234 | (1) |
|
11.7.1.8 Attack Intention |
|
|
235 | (1) |
|
11.7.1.9 Data Traffic Extraction/Visualization |
|
|
235 | (1) |
|
11.7.2 Botnet Analysis Using Ensemble of Classifier |
|
|
236 | (3) |
|
11.7.3 Results and Discussion |
|
|
239 | (3) |
|
11.7.3.1 Single Classifier |
|
|
239 | (1) |
|
11.7.3.2 Ensemble of Classifier |
|
|
240 | (1) |
|
|
241 | (1) |
|
|
242 | (1) |
|
|
242 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
243 | (1) |
|
|
244 | (1) |
|
|
244 | (3) |
|
12 System Investigation and Ethical Issues |
|
|
247 | (24) |
|
|
247 | (1) |
|
12.1.1 Postmortem Analysis |
|
|
248 | (1) |
|
12.1.2 Examination of Computer |
|
|
248 | (1) |
|
|
248 | (3) |
|
|
248 | (2) |
|
12.2.1.1 Intelligence Attacks |
|
|
249 | (1) |
|
12.2.1.2 Financial Attacks |
|
|
249 | (1) |
|
12.2.1.3 Business Attacks |
|
|
249 | (1) |
|
12.2.1.4 Terrorist Attacks |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
249 | (1) |
|
|
250 | (1) |
|
12.2.2 Challenges on Deterring Crime |
|
|
250 | (1) |
|
|
250 | (1) |
|
12.2.2.2 Lack of Understanding |
|
|
250 | (1) |
|
12.2.2.3 Lack of Evidence |
|
|
250 | (1) |
|
12.2.2.4 Rules of Evidence |
|
|
250 | (1) |
|
|
251 | (1) |
|
12.2.2.6 Lack of Knowledge |
|
|
251 | (1) |
|
12.2.2.7 Lack of Tangible Assets |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (1) |
|
|
251 | (4) |
|
|
251 | (1) |
|
12.3.2 Intellectual Property |
|
|
252 | (2) |
|
|
252 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
|
253 | (1) |
|
12.3.2.5 Comparison of Patent Law, Copyright, Trademark, and Trade Secret |
|
|
253 | (1) |
|
|
254 | (1) |
|
12.3.4 Telecommunication Law |
|
|
254 | (1) |
|
|
255 | (1) |
|
|
255 | (3) |
|
|
256 | (1) |
|
|
256 | (1) |
|
|
256 | (1) |
|
12.4.1.3 Random-Access Memory |
|
|
256 | (1) |
|
12.4.1.4 Unallocated Space |
|
|
257 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
12.4.2 Methodology for Live System Analysis |
|
|
257 | (1) |
|
12.4.2.1 Implicit or Hidden System Monitoring |
|
|
257 | (1) |
|
12.4.2.2 Explicit System Acquisition |
|
|
258 | (1) |
|
12.4.3 Key Elements of Successful Live Analysis |
|
|
258 | (1) |
|
12.5 Live Computer Analysis |
|
|
258 | (9) |
|
12.5.1 Windows-Based Forensic Analysis |
|
|
259 | (3) |
|
12.5.1.1 Tools to Recover Data on Windows |
|
|
262 | (1) |
|
12.5.2 Unix-Based Forensic Analysis |
|
|
262 | (5) |
|
|
262 | (1) |
|
12.5.2.2 Live Forensics through Built-Up Tools on Unix |
|
|
263 | (1) |
|
12.5.2.3 Phases Involved in Live Forensics on Unix |
|
|
264 | (2) |
|
12.5.2.4 Acquisition Tools |
|
|
266 | (1) |
|
|
267 | (3) |
|
|
268 | (1) |
|
|
268 | (1) |
|
|
269 | (1) |
|
|
269 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
|
|
270 | (1) |
Index |
|
271 | |