2021
DOI: 10.14569/ijacsa.2021.01205103
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensics: A Comprehensive Review of Tools and Techniques

Abstract: With the evolution and popularity of computer networks, a tremendous amount of devices are increasingly being added to the global internet connectivity. Additionally, more sophisticated tools, methodologies, and techniques are being used to enhance global internet connectivity. It is also worth mentioning that individuals, enterprises, and corporate organizations are quickly appreciating the need for computer networking. However, the popularity of computer and mobile networking brings various drawbacks mostly … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(6 citation statements)
references
References 32 publications
0
6
0
Order By: Relevance
“…Reporting is the most vital part of network forensic because it will show the results of all this investigation. The report should be clear and understandable by any non-technical person [15].…”
Section: Network Forensic Methodologymentioning
confidence: 99%
“…Reporting is the most vital part of network forensic because it will show the results of all this investigation. The report should be clear and understandable by any non-technical person [15].…”
Section: Network Forensic Methodologymentioning
confidence: 99%
“…Network Forensics [30] Can detect suspicious network activity. Provides details about a drone's communication with other devices.…”
Section: Source Advantages Disadvantagesmentioning
confidence: 99%
“…The analysis included the tools Wireshark, Ettercap, Etherape, Kismet, Network Miner, TcpDump, WinDump, Cloud Shark, Colasoft Capsa, Sysdig, Debokee, Etheral, Intercepter NG, Nethogs, MNM, SmartSniff, PacketSled, Scapy, Cain and Abel, Savvius Omnipeek, Packet Peeker, CPA, KisMac. In [12], the authors reviewed the OSCAR methodology and the tools and techniques for network forensics. The tools included were Wireshark, Tshark, Dumpcap, and NFATs.…”
Section: Literature Reviewmentioning
confidence: 99%