DSpace Repository

IDENTIFICATION OF SOURCE MACHINE USING ATTRIBUTION BY NETWORK FORENSIC CAPTURING

Show simple item record

dc.contributor.author Shukla, Sanjeev
dc.date.accessioned 2014-11-29T06:18:38Z
dc.date.available 2014-11-29T06:18:38Z
dc.date.issued 2009
dc.identifier M.Tech en_US
dc.identifier.uri http://hdl.handle.net/123456789/12093
dc.guide Joshi, R. C.
dc.description.abstract Networks have been an essential part of our information infrastructure which enables us to perform various critical operations. The vast amount of data traveling is a potential source which can be examined & investigated to find crucial evidence for e-crimes. Network forensic is an investigation technique which looks at network traffic to find substantial evidence in support of the dubious incidents. The work presented here takes a specific problem of identifying source machine after network address translation is done. Network address translation (NAT) is the process of modifying network address information in datagram packet headers while in transit across a traffic routing device for the purpose of remapping a given address space into another. This poses a great challenge for forensic analysis because it is difficult to attribute observed traffic into discrete hosts. The algorithm thus developed relies on the combination of number of unique characteristics (attributes) specific to a source offered by each layer of the OSI model, allowing identification of source machines. The attribution method used is much better than other approaches like IP Traceback where IP is at the epicenter for all the processes. Here identification does not take IP. into consideration & hence its possible for addresses to dynamically change (by using DHCP) without effecting the algorithm. The program developed follows the process framework of forensic analysis. In a step-by- step process it captures the network traffic which is then segregated to extract relevant information pertaining to the event concerned. It is then analyzed using attribution algorithm to find the source of each packet streams and the results are displayed in graphical form which is easy to represent and understand. en_US
dc.language.iso en en_US
dc.subject ELECTRONICS AND COMPUTER ENGINEERING en_US
dc.subject SOURCE MACHINE en_US
dc.subject NETWORK FORENSIC en_US
dc.subject ATTRIBUTION en_US
dc.title IDENTIFICATION OF SOURCE MACHINE USING ATTRIBUTION BY NETWORK FORENSIC CAPTURING en_US
dc.type M.Tech Dessertation en_US
dc.accession.number G14634 en_US


Files in this item

This item appears in the following Collection(s)

Show simple item record