Network infrastructure forensics
dc.contributor.author | Lindner, Felix | |
dc.contributor.editor | Göbel, Oliver | |
dc.contributor.editor | Frings, Sandra | |
dc.contributor.editor | Günther, Detlef | |
dc.contributor.editor | Nedon, Jens | |
dc.contributor.editor | Schadt, Dirk | |
dc.date.accessioned | 2019-06-04T11:30:42Z | |
dc.date.available | 2019-06-04T11:30:42Z | |
dc.date.issued | 2008 | |
dc.description.abstract | Incident identification, response and forensic analysis depend on the ability to extract meaningful evidence from the suspected system. Such tools do not exist for network infrastructure equipment. The significantly increased attack resilience of common general purpose operating systems poses a surprising new challenge to forensics, as attackers will likely shift their attention back towards network infrastructure control. The paper discusses the importance of network equipment forensics, the anatomy of devices and the attack types encountered. Finally a method for performing forensics on a widely used type of network equipment is presented. | en |
dc.identifier.isbn | 978-3-88579-234-5 | |
dc.identifier.pissn | 1617-5468 | |
dc.identifier.uri | https://dl.gi.de/handle/20.500.12116/23596 | |
dc.language.iso | en | |
dc.publisher | Gesellschaft für Informatik e.V. | |
dc.relation.ispartof | IMF 2008 – IT Incident Management & IT Forensics | |
dc.relation.ispartofseries | Lecture Notes in Informatics (LNI) - Proceedings, Volume P-140 | |
dc.title | Network infrastructure forensics | en |
dc.type | Text/Conference Paper | |
gi.citation.endPage | 40 | |
gi.citation.publisherPlace | Bonn | |
gi.citation.startPage | 27 | |
gi.conference.date | September, 23-25, 2008 | |
gi.conference.location | Mannheim | |
gi.conference.sessiontitle | Regular Research Papers |
Dateien
Originalbündel
1 - 1 von 1