Difference between revisions of "Network forensics"

From ForensicsWiki
Jump to: navigation, search
m (Deep-Analysis Systems)
m (Flow-Based Systems)
Line 18: Line 18:
 
* Lanscope
 
* Lanscope
 
* Mazu Networks
 
* Mazu Networks
* Q1 Labs
+
* Q1 Labs http://www.q1labs.com/
  
 
== Tips and Tricks ==
 
== Tips and Tricks ==
  
 
* The time between two events triggered by an intruder (as seen in logfiles, for example) can be helpful. If it is very short, you can be pretty sure that the actions were performed by an automated script and not by a human user.
 
* The time between two events triggered by an intruder (as seen in logfiles, for example) can be helpful. If it is very short, you can be pretty sure that the actions were performed by an automated script and not by a human user.

Revision as of 09:26, 31 December 2006

Network forensics is the process of capturing information that moves over a network and trying to make sense of it in some kind of forensics capacity. A network forensics appliance is a device that automates this process.

There are both open source and proprietary network forensics systems available.

Open Source Network Forensics

Commercial Network Forensics

Deep-Analysis Systems

Flow-Based Systems

Tips and Tricks

  • The time between two events triggered by an intruder (as seen in logfiles, for example) can be helpful. If it is very short, you can be pretty sure that the actions were performed by an automated script and not by a human user.