SUSTAINABLE DEVELOPMENT
Innovate. Sustain. Transform.
Save up to 30% on top Physical Sciences & Engineering titles!

Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics pr… Read more
SUSTAINABLE DEVELOPMENT
Save up to 30% on top Physical Sciences & Engineering titles!
Network forensics is an evolution of typical digital forensics, in which evidence is gathered from network traffic in near real time. This book will help security and forensics professionals as well as network administrators build a solid foundation of processes and controls to identify incidents and gather evidence from the network. Forensic scientists and investigators are some of the fastest growing jobs in the United States with over 70,000 individuals employed in 2008. Specifically in the area of cybercrime and digital forensics, the federal government is conducting a talent search for 10,000 qualified specialists. Almost every technology company has developed or is developing a cloud computing strategy. To cut costs, many companies are moving toward network-based applications like SalesForce.com, PeopleSoft, and HR Direct. Every day, we are moving companies’ proprietary data into a cloud, which can be hosted anywhere in the world. These companies need to understand how to identify where their data is going and what they are sending.
Forensic Investigators (corporate and law enforcement) and Incident Response Professionals, IT Security and System Administrator professionals.
PART I INTRODUCTION
CHAPTER 1 What Is Network Forensics?
Introduction to Cloud Computing
Introduction to the Incident Response Process
Investigative and Forensics Methodologies
Where Network Forensics Fits In
PART II GATHERING EVIDENCE
CHAPTER 2 Capturing Network Traffic
The Importance of DHCP Logs
Using tcpdump/WinDump
Limitations of tcpdump
tcpdump Command Line
Troubleshooting tcpdump
Using Wireshark
Wireshark GUI
Limitations of Wireshark
Limitations of Using Libpcap and Derivatives
Wireshark Utilities
TShark
Rawshark
Dumpcap
Mergecap
Editcap
Text2pcap
Using SPAN Ports or TAPS
SPAN Port Issues
Network Tap
Using Fiddler
Firewalls
Placement of Sensors
Summary
CHAPTER 3 Other Network Evidence
Overview of Botnets and Other Network-Aware Malware
The Botnet Life Cycle
Temporal, Relational, and Functional Analyses and Victimology
First Responder Evidence Sources of Network-Related Evidence
Dynamic Evidence Capture
Malware Analysis: Using Sandbox Technology
Summary
PART III ANALYZING EVIDENCE WITH OPEN SOURCE SOFTWARE
CHAPTER 4 Deciphering a TCP Header
OSI and TCP Reference Models
TCP Header
Source Port Number
Destination Port Number
Sequence Number
Acknowledgment Number
Data Offset
Reserved
TCP Flags
Windows Size
TCP Checksum
Urgent Pointer
TCP Options
Padding
Decipherment of a TCP Segment
TCP Signature Analysis
Summary
CHAPTER 5 Using Snort for Network-Based Forensics
IDS Overview
Snort Architecture
Real-Time Network Traffi c Capturing
Playback Binary Network Traffic (pcap Format)
Snort Preprocessor Component
Snort Detection Engine Component
Network Forensics Evidence Generated with Snort
Summary
PART IV COMMERCIAL NETWORK FORENSICS APPLICATIONS
CHAPTER 6 Commercial NetFlow Applications
What Is NetFlow?
How Does NetFlow Work?
The Benefit of NetFlow
NetFlow Collection
NetFlow User Datagram Protocol (UDP) Datagrams
NetFlow Header
Enabling NetFlow
Enabling NetFlow v9 (Ingress and Egress)
What Is an FNF?
Key Advantages
Enabling FNF What Is an sFlow?
Enabling sFlow
Which Is Better: NetFlow or sFlow?
Scrutinizer
Scaling
Scrutinizer Forensics Using Flow Analytics
Using Flow Analytics to Identify Threats within NetFlow
Summary
CHAPTER 7 NetWitness Investigator
Introduction
NetWitness Investigator Architecture
Import/Live Capture Network Traffic
Collections
Parsers, Feeds, and Rules
Navigation Views
Data Analysis
Exporting Captured Data
Summary
CHAPTER 8 SilentRunner by AccessData
History of SilentRunner
Parts of the SilentRunner System
Installing SilentRunner
Stand-Alone Installation
Distributed Installation
SilentRunner Terminology
Graphs
Spec Files
Customizing the Analyzer
Context Management
Data Investigator Tools
Some Final Tricks and Tips
Summary
References
PART V MAKING YOUR NETWORK FORENSICS CASE
CHAPTER 9 Incorporating Network Forensics into Incident Response Plans
Investigation Method
Incident Response
Spearphishing
DMCA Violations
Web Site Compromise: Search Engine Spam and Phishing
Summary
References
CHAPTER 10 Legal Implications and Considerations
Internet Forensics
Admissibility of Internet Evidence
Hearsay Exceptions and Internet Evidence
Cloud Forensics
Evidence Collection in the Cloud
Admissibility of Cloud Evidence
E-Discovery in the Cloud
International Complexities of Internet and Cloud Forensics
The Hague Convention on Evidence
Privacy
Summary
References
Case Law
Legislation
CHAPTER 11 Putting It All Together
Network Forensics Examiner Skills
Network Forensics Investigation Life Cycle
Summary
PART VI THE FUTURE OF NETWORK FORENSICS
CHAPTER 12 The Future of Cloud Computing
History of Cloud Computing
What Drives the Cloud
A Break from Dependence on IT to Solve a Business Problem
The Cloud Is Enabled through Virtualization
Accelerating Development and Delivery of New Applications
Private versus Public Cloud Computing
Which Cloud Vendors Will Rise to the Top?
Yes, There Are Risks
The Risks Are Worthwhile
Will Microsoft and Google Be the 1000-Pound Gorillas of the Cloud?
The Current State of Cloud Computing
Cloud Usage Patterns
Who Will Host the Cloud?
Cloud Computing and Collective Intelligence
Security and IT from the Cloud
Other Widely Used Cloud Applications
Cloud Market Size
Elements of the Cloud
The U.S. Federal Government Is Leading the Movement to the Cloud
Rapid Rate of Change
Common Security Risks of the Current Cloud
Next Phases of Cloud Computing
New Database Models Will Greatly Change Product Creation
Integrated Applications Will Accelerate Cloud Product Creation
Microsoft Azure Will Enable a Cloud Cottage Industry
Other Changes in the New Cloud World
Security Improvements in the Future Cloud
Summary
CHAPTER 13 The Future of Network Forensics
Today’s Challenges with Existing Devices for Network Forensics
Network Forensics Quadrants of Focus
Network Forensics Analysis Tools
Summary
CG
Security. Clint started his career working for a small police department near Austin Texas in
1995, and moved on as a Sergeant Investigator for the Texas Department of Insurance Insurer
Fraud Unit’s Major Case Team. His primary responsibilities included investigating major financial
fraud cases and digital forensics.
Clint is currently an IT Security Consultant for a fortune 100 company where his primary
responsibility is to ensure his company’s security compliance posture with numerous global
security standards. He is also responsible for maintaining the incident response process to
ensure timely and effective responses to potential breaches of company systems.
Certifications and Degrees:
• Adjunct instructor, teaching a Cyber Crimes and Information System Security class for
the University of Phoenix’s online graduate program in Criminal Justice
• BS in Administration of Criminal Justice from Mountain State University
• MBA in Information Assurance and MS in Information Technology from the University of
Dallas
• CISSP
• Master Peace Officer’s License and Peace Officer Instructor License
TL
He holds a B.S. in Electrical Engineering, Master of Business Administration (MBA), and is currently pursuing a Ph.D. in Information Security.