2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA) 2013
DOI: 10.1109/aina.2013.133
|View full text |Cite
|
Sign up to set email alerts
|

Forensically-Sound Methods to Collect Live Network Evidence

Abstract: In the last decade Digital Forensics has experienced several issues when dealing with network evidence. An analyst, which is in charge of managing evidence flowing over a network have to face problems due to the volatile nature of such information. In facts, such data may change over time, may be lying on a server out of the his jurisdiction, or geographically far from where the crime was committed.In this paper two methods to allow remote collection of network evidence produced by online services such as web … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…It is important to highlight that, in order to study attacks against a predetermined system, it could be also useful to use tools and methods that record all the packet traffic going to the system under attack [40]. Any way, such approach could not be useful when there is the need of a broader point of view.…”
Section: Discussionmentioning
confidence: 99%
“…It is important to highlight that, in order to study attacks against a predetermined system, it could be also useful to use tools and methods that record all the packet traffic going to the system under attack [40]. Any way, such approach could not be useful when there is the need of a broader point of view.…”
Section: Discussionmentioning
confidence: 99%
“…Further work must be carried out to assess whether it is possible to capture the network traffic generated while printing using techniques similar to [35] and recover the contents of the documents being printed. It would also be interesting to extend the research presented in this paper across a wider range of devices, iOS versions, and 3rd-party applications and to examine if similar issues affect other printing solutions for iOS devices and other mobile devices.…”
Section: Discussionmentioning
confidence: 99%