Logo des Repositoriums
 

Network infrastructure forensics

dc.contributor.authorLindner, Felix
dc.contributor.editorGöbel, Oliver
dc.contributor.editorFrings, Sandra
dc.contributor.editorGünther, Detlef
dc.contributor.editorNedon, Jens
dc.contributor.editorSchadt, Dirk
dc.date.accessioned2019-06-04T11:30:42Z
dc.date.available2019-06-04T11:30:42Z
dc.date.issued2008
dc.description.abstractIncident identification, response and forensic analysis depend on the ability to extract meaningful evidence from the suspected system. Such tools do not exist for network infrastructure equipment. The significantly increased attack resilience of common general purpose operating systems poses a surprising new challenge to forensics, as attackers will likely shift their attention back towards network infrastructure control. The paper discusses the importance of network equipment forensics, the anatomy of devices and the attack types encountered. Finally a method for performing forensics on a widely used type of network equipment is presented.en
dc.identifier.isbn978-3-88579-234-5
dc.identifier.pissn1617-5468
dc.identifier.urihttps://dl.gi.de/handle/20.500.12116/23596
dc.language.isoen
dc.publisherGesellschaft für Informatik e.V.
dc.relation.ispartofIMF 2008 – IT Incident Management & IT Forensics
dc.relation.ispartofseriesLecture Notes in Informatics (LNI) - Proceedings, Volume P-140
dc.titleNetwork infrastructure forensicsen
dc.typeText/Conference Paper
gi.citation.endPage40
gi.citation.publisherPlaceBonn
gi.citation.startPage27
gi.conference.dateSeptember, 23-25, 2008
gi.conference.locationMannheim
gi.conference.sessiontitleRegular Research Papers

Dateien

Originalbündel
1 - 1 von 1
Lade...
Vorschaubild
Name:
gi-proc-140-004.pdf
Größe:
108.11 KB
Format:
Adobe Portable Document Format