100% found this document useful (1 vote)
27 views147 pages

Network Forensics: Privacy and Security 1st Edition Anchit Bijalwan pdf download

The document provides information about the book 'Network Forensics: Privacy and Security' by Anchit Bijalwan, published in 2022, which covers various aspects of network forensics, including security measures, types of attacks, and incident response. It details the processes involved in network forensics and discusses recent trends in the field. The book aims to equip readers with comprehensive knowledge about network security and forensic practices.

Uploaded by

yzvoeqai328
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
27 views147 pages

Network Forensics: Privacy and Security 1st Edition Anchit Bijalwan pdf download

The document provides information about the book 'Network Forensics: Privacy and Security' by Anchit Bijalwan, published in 2022, which covers various aspects of network forensics, including security measures, types of attacks, and incident response. It details the processes involved in network forensics and discusses recent trends in the field. The book aims to equip readers with comprehensive knowledge about network security and forensic practices.

Uploaded by

yzvoeqai328
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 147

Network Forensics: Privacy and Security 1st

Edition Anchit Bijalwan pdf download

https://ebookmeta.com/product/network-forensics-privacy-and-security-1st-edition-anchit-bijalwan/

★★★★★ 4.9/5.0 (22 reviews) ✓ 238 downloads ■ TOP RATED


"Fantastic PDF quality, very satisfied with download!" - Emma W.

DOWNLOAD EBOOK
Network Forensics: Privacy and Security 1st Edition Anchit
Bijalwan pdf download

TEXTBOOK EBOOK EBOOK META

Available Formats

■ PDF eBook Study Guide TextBook

EXCLUSIVE 2025 EDUCATIONAL COLLECTION - LIMITED TIME

INSTANT DOWNLOAD VIEW LIBRARY


Collection Highlights

Network Forensics Privacy and Security 1st Edition Anchit


Bijalwan

Privacy, Security And Forensics in The Internet of Things


(IoT) Reza Montasari

Cyber Security and Network Security 1st Edition Sabyasachi


Pramanik (Editor)

The Research Foundations of Graduate Education: Germany,


Britain, France, United States, Japan Burton R. Clark
(Editor)
Nikon Photography - The Complete Manual Series: 2022 Nikon

Key Collector 00 5 The Magic Thief 1st Edition Laurel


Night

School Governance in Global Contexts Trends Challenges and


Practices 1st Edition Nicholas Sun Keung Pang (Editor)

The Complete and Original Norwegian Folktales of


Asbjørnsen and Moe 1st Edition Peter Christen Asbjørnsen

Microbiology and Parasitology Prep Manual for


Undergraduates Bs Nagoba
Preacher Brothers Complete Collection 1st Edition Jenika
Snow
Network Forensics
Network Forensics
Privacy and Security

Anchit Bijalwan
First edition published 2022
by CRC Press
6000 Broken Sound Parkway NW, Suite 300, Boca Raton, FL 33487-2742

and by CRC Press


2 Park Square, Milton Park, Abingdon, Oxon, OX14 4RN

© 2022 Taylor & Francis Group, LLC

CRC Press is an imprint of Taylor & Francis Group, LLC

Reasonable efforts have been made to publish reliable data and information, but the author and publisher cannot
assume responsibility for the validity of all materials or the consequences of their use. The authors and p ­ ublishers
have attempted to trace the copyright holders of all material reproduced in this publication and apologize to
­copyright ­holders if permission to publish in this form has not been obtained. If any copyright material has not been
­acknowledged, please write and let us know so we may rectify in any future reprint.

Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or
utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, ­including
­photocopying, microfilming, and recording, or in any information storage or retrieval system, without written
­permission from the publishers.

For permission to photocopy or use material electronically from this work, access www.copyright.com or contact the
Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. For works that are
not available on CCC, please contact [email protected]

Trademark notice: Product or corporate names may be trademarks or registered trademarks and are used only for
identification and explanation without intent to infringe.

Library of Congress Cataloging‑in‑Publication Data


Names: Bijalwan, Anchit, author.
Title: Network forensics : privacy and security / Anchit Bijalwan.
Description: First edition. | Boca Raton : Chapman & Hall/CRC Press, 2022. |
Includes bibliographical references and index. | Summary: “Network
Forensics: A privacy & Security provides a significance knowledge of network forensics in different functions and
spheres of the security. The book gives the complete knowledge of network security, all kind of network attacks, inten-
tion of an attacker, identification of attack, detection, its analysis, incident response, ethical issues, botnet and botnet
forensics. This book also refer the recent trends that comes under network forensics. It provides in-depth insight to the
dormant and latent issues of the acquisition and system live investigation too”— Provided by publisher.
Identifiers: LCCN 2021027908 (print) | LCCN 2021027909 (ebook) |
ISBN 9780367493615 (hardback) | ISBN 9780367493646 (paperback) |
ISBN 9781003045908 (ebook)
Subjects: LCSH: Computer crimes—Investigation. |
Computer networks—Security measures. | Computer security. | Forensic sciences.
Classification: LCC HV8079.C65 B55 2022 (print) | LCC HV8079.C65 (ebook) |
DDC 363.25/968—dc23
LC record available at https://lccn.loc.gov/2021027908
LC ebook record available at https://lccn.loc.gov/2021027909

ISBN: 978-0-367-49361-5 (hbk)


ISBN: 978-0-367-49364-6 (pbk)
ISBN: 978-1-003-04590-8 (ebk)

DOI: 10.1201/9781003045908

Typeset in Palatino
by codeMantra
Contents

Preface........................................................................................................................................... xvii
Organization of This Book......................................................................................................... xix
Author............................................................................................................................................ xxi
Acknowledgments..................................................................................................................... xxiii

Part A Network Forensics Concepts

1. Introduction to Network Forensics......................................................................................3


1.1 Introduction....................................................................................................................3
1.2 Network Security...........................................................................................................5
1.2.1 Evolution of Network Security.......................................................................5
1.2.2 Importance of Network Security....................................................................6
1.2.3 Basic Terminology for Understanding Network Security..........................6
1.2.4 Features of Network Security Services..........................................................7
1.3 Types of Network Security Attacks.............................................................................8
1.3.1 Active Attack.....................................................................................................8
1.3.1.1 Modification.......................................................................................9
1.3.1.2 Fabrication..........................................................................................9
1.3.1.3 Interruption and Denial of Service.................................................9
1.3.1.4 Replay Attack.....................................................................................9
1.3.1.5 Masquerade Attack......................................................................... 10
1.3.2 Passive Attack.................................................................................................. 10
1.3.2.1 Traffic Analysis................................................................................ 10
1.3.2.2 Message Transmission.................................................................... 10
1.4 Network Security Tools............................................................................................... 11
1.4.1 Intrusion Detection System........................................................................... 11
1.4.1.1 Knowledge- or Signature-Based IDS............................................ 11
1.4.1.2 Behavior- or Anomaly-Based IDS................................................. 11
1.4.2 Firewall............................................................................................................. 12
1.4.2.1 Network-Level Firewall.................................................................. 12
1.4.2.2 Application-Level Firewall............................................................ 13
1.4.2.3 Proxy Firewall.................................................................................. 13
1.4.3 Antivirus.......................................................................................................... 13
1.5 Security Issues.............................................................................................................. 13
1.5.1 Network Access Control................................................................................ 14
1.5.2 Application Security....................................................................................... 14
1.5.2.1 Application Security Process......................................................... 15
1.5.3 Email Security................................................................................................. 15
1.5.3.1 Antivirus Application on System................................................. 16
1.5.3.2 Spam Filters...................................................................................... 16
1.5.3.3 Antispam Applications.................................................................. 16
1.5.3.4 Strong Passwords............................................................................ 16
1.5.3.5 Password Rotation........................................................................... 17
v
vi Contents

1.5.4 Wireless Security............................................................................................ 17


1.5.5 Firewall............................................................................................................. 17
1.6 Digital Forensics........................................................................................................... 17
1.6.1 Digital Forensics Evolution............................................................................ 18
1.6.2 Digital Forensic Types.................................................................................... 19
1.7 Computer Forensics..................................................................................................... 20
1.7.1 Computer Forensics Process......................................................................... 20
1.8 Network Forensics....................................................................................................... 21
1.8.1 Definition......................................................................................................... 21
1.8.2 Taxonomy of Network Forensics Tools........................................................22
1.8.3 Network Forensics Mechanism.................................................................... 23
1.8.4 Network Forensics Process............................................................................ 24
1.8.4.1 Authorization................................................................................... 24
1.8.4.2 Collection of Evidences.................................................................. 24
1.8.4.3 Identification of Evidences............................................................. 25
1.8.4.4 Detection of Crime.......................................................................... 25
1.8.4.5 Investigation..................................................................................... 25
1.8.4.6 Presentation...................................................................................... 26
1.8.4.7 Incident Response........................................................................... 26
1.9 Computer Forensics vs Network Forensics.............................................................. 26
1.9.1 Computer Forensics........................................................................................ 27
1.9.2 Network Forensics.......................................................................................... 27
1.10 Network Security vs Network Forensics.................................................................. 27
1.10.1 Network Security............................................................................................ 28
1.10.2 Network Forensics.......................................................................................... 28
Questions................................................................................................................................. 28
Bibliography............................................................................................................................ 29

2. Cyber Crime............................................................................................................................ 31
2.1 Introduction.................................................................................................................. 31
2.2 Attack Intentions.......................................................................................................... 33
2.2.1 Warfare Sponsored by the Country............................................................. 33
2.2.2 Terrorist Attack............................................................................................... 33
2.2.3 Commercially Motivated Attack.................................................................. 33
2.2.4 Financially Driven Criminal Attack............................................................ 33
2.2.5 Hacking............................................................................................................ 33
2.2.6 Cyberstalking..................................................................................................34
2.2.7 Child Pornography.........................................................................................34
2.2.8 Web Jacking.....................................................................................................34
2.2.9 Data Diddling.................................................................................................. 35
2.2.10 Counterfeiting................................................................................................. 35
2.2.11 Phishing........................................................................................................... 35
2.3 Malware......................................................................................................................... 35
2.3.1 Definition......................................................................................................... 35
2.3.2 History of Malware........................................................................................ 37
2.3.3 Classification of Malware.............................................................................. 38
2.3.3.1 Virus.................................................................................................. 40
2.3.3.2 Worm................................................................................................. 40
2.3.3.3 Logic Bomb...................................................................................... 40
Contents vii

2.3.3.4 Trojan Horse..................................................................................... 40


2.3.3.5 Backdoor........................................................................................... 40
2.3.3.6 Mobile Code..................................................................................... 41
2.3.3.7 Exploits............................................................................................. 41
2.3.3.8 Downloaders.................................................................................... 41
2.3.3.9 Auto Rooter...................................................................................... 41
2.3.3.10 Kit (Virus Generator)......................................................................42
2.3.3.11 Spammer...........................................................................................42
2.3.3.12 Flooders............................................................................................42
2.3.3.13 Keyloggers........................................................................................42
2.3.3.14 Rootkit...............................................................................................42
2.3.3.15 Zombie or Bot..................................................................................42
2.3.3.16 Spyware............................................................................................43
2.3.3.17 Adware.............................................................................................43
2.3.3.18 Ransomware....................................................................................43
2.3.3.19 Hacker’s Useful Components and Other Harmful
Programs...................................................................................... 44
2.4 Terminology for the Cyber Attackers.......................................................................44
2.5 Types of Attacks........................................................................................................... 45
2.5.1 Distributed Denial of Service Attack........................................................... 45
2.5.2 Spam................................................................................................................. 46
2.5.3 Personal Information Thieving.................................................................... 47
2.5.4 Click Fraud....................................................................................................... 48
2.5.5 Identity Theft................................................................................................... 49
Questions................................................................................................................................. 49
Bibliography............................................................................................................................ 50

3. Network Forensics Process Model..................................................................................... 53


3.1 Introduction.................................................................................................................. 53
3.2 Recent Trend in Network Forensics..........................................................................54
3.2.1 Malware Forensics.......................................................................................... 55
3.2.2 Botnet Forensics.............................................................................................. 55
3.2.3 Cloud Forensics............................................................................................... 55
3.2.4 Grid Forensics.................................................................................................. 55
3.3 Life Cycle of Network Forensics................................................................................ 55
3.4 Network Forensics Process Model............................................................................ 57
3.4.1 Authorization.................................................................................................. 57
3.4.2 Collection of Evidence.................................................................................... 58
3.4.3 Identification of Evidence.............................................................................. 58
3.4.4 Detection of Crime.......................................................................................... 58
3.4.5 Investigation.................................................................................................... 59
3.4.6 Presentation..................................................................................................... 59
3.4.7 Incident Response........................................................................................... 59
3.5 Detection and Investigative Network Forensics Frameworks............................... 60
3.5.1 Detection-Based Framework......................................................................... 60
3.5.2 BOT GAD-Based Framework........................................................................64
3.5.3 System Architecture-Based Framework......................................................65
3.5.4 Fast Flux-Based Framework..........................................................................65
3.5.5 Mac OS-Based Framework............................................................................ 66
viii Contents

3.5.6 Open Flow-Based or AAFID Framework.................................................... 67


3.5.7 P2P-Based Framework.................................................................................... 67
3.5.8 Distributed Device-Based Frameworks....................................................... 70
3.5.9 Soft Computing-Based Frameworks............................................................ 70
3.5.10 Honeypot-Based Frameworks....................................................................... 72
3.5.11 Attack Graph-Based Frameworks................................................................. 72
3.5.12 Formal Method-Based Frameworks............................................................. 72
3.5.13 Formal Method-Based Frameworks............................................................. 72
3.5.14 Network Monitoring Framework................................................................. 72
Questions................................................................................................................................. 74
References................................................................................................................................ 74

4. Classification of Network Forensics..................................................................................77


4.1 Introduction..................................................................................................................77
4.1.1 Signature-Based or Misuse Detection.........................................................77
4.1.1.1 Monitoring....................................................................................... 78
4.1.1.2 Capturing (Avoidance of Packets Drop)...................................... 78
4.1.1.3 Notification....................................................................................... 78
4.1.1.4 Software Initiation.......................................................................... 78
4.1.1.5 Multiperspective Environment..................................................... 79
4.1.2 Anomaly-Based or Hybrid Detection.......................................................... 79
4.1.3 Comparative Difference between Signature- and
Anomaly-Based Detection............................................................................. 79
4.2 Detection and Prevention System..............................................................................80
4.2.1 Detection System.............................................................................................80
4.2.2 Prevention System.......................................................................................... 81
4.3 Types of Network Forensics Classification............................................................... 82
4.3.1 Payload-Based Identification.........................................................................83
4.3.1.1 Deep Packet Inspection..................................................................84
4.3.2 Statistical-Based Identification...................................................................... 87
4.3.2.1 Heuristic Analysis........................................................................... 87
4.4 Network Forensics Analysis Classification.............................................................. 88
4.4.1 Signature-Based Classification..................................................................... 88
4.4.2 Decision Tree-Based Classification............................................................... 88
4.4.3 Ensemble-Based Classification..................................................................... 89
4.4.3.1 Voting................................................................................................ 91
4.4.3.2 Adaptive Boosting........................................................................... 91
4.4.3.3 Bagging............................................................................................. 91
4.5 Implementation and Results....................................................................................... 92
Questions................................................................................................................................. 93
References................................................................................................................................ 93

Part B Network Forensics Acquisition

5. Network Forensics Tools...................................................................................................... 97


5.1 Introduction.................................................................................................................. 97
5.2 Visual Tracing Tools.................................................................................................... 98
5.2.1 NeoTracePro..................................................................................................... 99
Contents ix

5.2.2 VisualRoute...................................................................................................... 99
5.2.3 Sam Spade...................................................................................................... 100
5.2.4 eMailTrackerPro............................................................................................ 100
5.3 Traceroute Tools......................................................................................................... 100
5.3.1 Text-Based Traceroute.................................................................................. 101
5.3.2 3D-Based Traceroute..................................................................................... 101
5.3.3 Visual Traceroute.......................................................................................... 102
5.4 Monitoring Tools........................................................................................................ 102
5.4.1 Packet Sniffer Tool........................................................................................ 102
5.4.1.1 Wireshark....................................................................................... 102
5.4.1.2 Argus.............................................................................................. 103
5.4.1.3 TCP Dump...................................................................................... 104
5.4.1.4 OmniPeek....................................................................................... 104
5.4.2 Intrusion Detection System (IDS)............................................................... 106
5.4.2.1 Zeek................................................................................................. 106
5.4.2.2 SNORT............................................................................................ 106
5.4.3 Finger.............................................................................................................. 107
5.4.3.1 Nmap............................................................................................... 107
5.4.3.2 POF.................................................................................................. 108
5.4.4 Pattern-Based Monitoring Tool................................................................... 108
5.4.4.1 NGREP............................................................................................ 109
5.4.4.2 TCPXTRACT.................................................................................. 109
5.4.5 Statistics-Based Monitoring System........................................................... 110
5.4.5.1 NetFlow.......................................................................................... 110
5.4.5.2 TCPstat............................................................................................ 110
5.5 Analysis Tools............................................................................................................. 110
5.5.1 Open-Source Tool......................................................................................... 111
5.5.1.1 NetworkMiner............................................................................... 111
5.5.1.2 PyFlag.............................................................................................. 111
5.5.2 Proprietary Tools.......................................................................................... 111
5.5.2.1 NetIntercept................................................................................... 112
5.5.2.2 SilentRunner.................................................................................. 112
Questions............................................................................................................................... 116
References.............................................................................................................................. 116

6. Network Forensics Techniques......................................................................................... 119


6.1 Introduction................................................................................................................ 119
6.1.1 Conventional Network Forensics Technique............................................ 120
6.1.2 Advanced Network Forensics Technique................................................. 120
6.2 Conventional Network Forensics Technique......................................................... 120
6.2.1 IP Traceback Technique............................................................................... 120
6.2.1.1 Link State Testing.......................................................................... 121
6.2.1.2 Input Debugging........................................................................... 121
6.2.1.3 Controlled Flooding...................................................................... 122
6.2.1.4 ICMP Traceback............................................................................. 122
6.2.1.5 Packet Marking Techniques......................................................... 123
6.2.1.6 Source Path Isolation Engine....................................................... 123
6.2.1.7 Payload Attribution....................................................................... 124
6.2.2 Intrusion Detection System......................................................................... 124
x Contents

6.2.2.1 Knowledge- or Signature-Based IDS.......................................... 125


6.2.2.2 Behavior- or Anomaly-Based IDS............................................... 125
6.2.3 Firewalls......................................................................................................... 125
6.2.3.1 Network-Level Firewall................................................................ 126
6.2.3.2 Application-Level Firewall.......................................................... 127
6.2.3.3 Proxy Firewall................................................................................ 127
6.3 Advanced Network Forensics Techniques............................................................. 127
6.3.1 Vulnerability Detection Techniques.......................................................... 127
6.3.1.1 Data Fusion, Alert Generation, and Correlation....................... 128
6.3.1.2 Black-Box Testing........................................................................... 128
6.3.1.3 White-Box Testing......................................................................... 129
6.3.1.4 Double-Guard Detecting Techniques........................................ 129
6.3.1.5 Hidden Markov Models............................................................... 130
6.3.2 Honeypots and Honeynet........................................................................... 130
6.3.2.1 Honeypot........................................................................................ 130
6.3.2.2 Honeynet........................................................................................ 130
6.3.2.3 Classification of Honeypots......................................................... 130
6.3.2.4 Honeywall...................................................................................... 131
6.3.2.5 Architecture Types of Honeynet................................................. 131
6.3.3 Highly Efficient Techniques for Network Forensics................................ 131
6.3.3.1 Bloom Filters.................................................................................. 132
6.3.3.2 Rabin Fingerprinting.................................................................... 132
6.3.3.3 Winnowing.................................................................................... 132
6.3.3.4 Attribution Systems...................................................................... 133
6.3.4 UDP Flooding Technique............................................................................ 133
Questions............................................................................................................................... 135
References.............................................................................................................................. 135

7. Detection of Vulnerabilities.............................................................................................. 137


7.1 Introduction................................................................................................................ 137
7.2 Network Forensics Acquisition................................................................................ 138
7.2.1 SIFT................................................................................................................. 138
7.2.2 CAINE............................................................................................................ 139
7.2.3 Autopsy.......................................................................................................... 140
7.2.3.1 Extensible........................................................................................ 140
7.2.3.2 Comfortable.................................................................................... 140
7.2.3.3 Centralized..................................................................................... 140
7.2.3.4 Multiple Users................................................................................ 141
7.2.4 Forensics Acquisition Website.................................................................... 142
7.2.5 Oxygen Forensic Suit.................................................................................... 143
7.2.6 Paladin Forensic Suit.................................................................................... 143
7.2.7 ExifTool.......................................................................................................... 144
7.2.8 CrowdResponse Tool.................................................................................... 145
7.2.9 BulkExtractor................................................................................................. 145
7.2.10 Xplico.............................................................................................................. 146
7.3 Identification of Network Attacks........................................................................... 147
7.3.1 UDP Flooding................................................................................................ 148
7.3.2 Random-UDP Flooding............................................................................... 148
7.3.2.1 Normal Flow of UDP Datagrams............................................... 148
Contents xi

7.3.2.2 Random-UDP Flooding Attack................................................... 150


7.3.2.3 Identification of Random-UDP Flooding Attack...................... 152
Questions............................................................................................................................... 154
References.............................................................................................................................. 155

Part C Network Forensics Attribution

8. Network Forensics Analysis.............................................................................................. 159


8.1 Introduction................................................................................................................ 159
8.2 Network Forensic Standard Process Model........................................................... 161
8.2.1 Authorization................................................................................................ 161
8.2.2 Preservation................................................................................................... 162
8.2.3 Initial Assessment......................................................................................... 162
8.2.4 Strategy Planning......................................................................................... 162
8.2.5 Evidence Collection...................................................................................... 163
8.2.6 Documentation.............................................................................................. 163
8.2.7 Analysis.......................................................................................................... 163
8.2.8 Investigation.................................................................................................. 163
8.2.9 Decision and Reporting............................................................................... 163
8.2.10 Review............................................................................................................ 163
8.3 Network Forensic Framework for the Analysis..................................................... 163
8.3.1 Network Traffic Collector............................................................................ 164
8.3.2 Reduction and Feature Extraction.............................................................. 164
8.3.3 Analysis and Pattern Matching.................................................................. 165
8.3.4 Reconstruction.............................................................................................. 166
8.3.5 Replay............................................................................................................. 166
8.4 Network Traffic Analysis.......................................................................................... 167
8.4.1 Case Analysis................................................................................................ 168
8.4.2 Dataset: KDD Cup 99 Case Study-I............................................................ 168
8.4.3 Methodology................................................................................................. 170
8.4.4 Case Study-I: Experimental Setup.............................................................. 170
8.4.5 Data Selection................................................................................................ 170
8.4.6 Analysis of the Case..................................................................................... 172
8.5 Network Forensics Analysis with Case Study-2.................................................... 173
8.5.1 Analysis Methodology................................................................................. 173
8.5.2 Network Behavior......................................................................................... 174
8.5.2.1 Domain Name System.................................................................. 174
8.5.2.2 Internet Control Message Protocol............................................. 174
8.5.3 Bot Analysis Using Classification............................................................... 176
Questions............................................................................................................................... 179
References.............................................................................................................................. 179

9. Evidence and Incident Response...................................................................................... 181


9.1 Introduction................................................................................................................ 181
9.2 Evidence and Its Sources........................................................................................... 182
9.2.1 Sources of Evidence within Network........................................................ 185
9.2.2 Sources of Evidence in Remote Network.................................................. 186
xii Contents

9.3 Evidence Handling.................................................................................................... 186


9.3.1 Recovery as Fast as Possible........................................................................ 187
9.3.2 Monitoring and Collecting Evidence......................................................... 187
9.4 Evidence-Handling Procedure................................................................................. 188
9.4.1 Identification of Evidence............................................................................ 188
9.4.2 Collection for the Evidence.......................................................................... 188
9.4.3 Acquisition and Analysis of Evidence....................................................... 190
9.4.3.1 Physical Extraction........................................................................ 190
9.4.3.2 Logical Extraction......................................................................... 190
9.4.4 Preservation and Reporting of Evidence................................................... 192
9.5 Incident Response and Its Methodology................................................................ 192
9.5.1 Process of Incident Response...................................................................... 193
9.5.1.1 Preparation..................................................................................... 193
9.5.1.2 Identification.................................................................................. 194
9.5.1.3 Detection......................................................................................... 194
9.5.1.4 Analysis.......................................................................................... 194
9.5.1.5 Containment.................................................................................. 195
9.5.1.6 Eradication and Recovery............................................................ 195
9.5.1.7 Post Incidence................................................................................ 195
9.5.2 Incident Classification.................................................................................. 195
9.5.2.1 High-Level Incident...................................................................... 196
9.5.2.2 Middle- or Moderate-Level Incident.......................................... 196
9.5.2.3 Low-Level Incident....................................................................... 197
9.5.3 Role of CSIRT................................................................................................. 197
Questions............................................................................................................................... 198
References.............................................................................................................................. 199

10. Introduction to Botnet........................................................................................................ 201


10.1 Introduction................................................................................................................ 201
10.1.1 Spartan Dominition Robot (SD Bot)........................................................... 203
10.1.2 AgoBot (aka Gaobot or Phatbot)................................................................. 204
10.1.3 Spybot............................................................................................................. 204
10.1.4 Mytob.............................................................................................................. 204
10.1.5 Hybot.............................................................................................................. 205
10.2 Evolution of Botnet.................................................................................................... 205
10.3 Botnet Lifecycle.......................................................................................................... 206
10.4 Botnet Structure......................................................................................................... 208
10.4.1 Propagation and Compromise.................................................................... 208
10.4.2 Command and Control................................................................................ 209
10.4.2.1 Centralized..................................................................................... 209
10.4.2.2 P2P................................................................................................... 209
10.4.2.3 Hybrid............................................................................................. 210
10.4.3 Attacks and Theft......................................................................................... 210
10.5 Botnet Security Attacks............................................................................................. 210
10.5.1 Warfare Sponsored by the Country........................................................... 210
10.5.2 Terrorist Attack............................................................................................. 210
10.5.3 Commercially Motivated Attack................................................................ 211
10.5.4 Financially Driven Criminal Attack.......................................................... 211
10.5.5 Hacking.......................................................................................................... 211
Contents xiii

10.6 Traditional Botnet Attacks........................................................................................ 211


10.6.1 Distributed Denial of Service Attack......................................................... 211
10.6.2 Spam............................................................................................................... 213
10.6.3 Personal Information Theft......................................................................... 214
10.6.4 Click Fraud..................................................................................................... 215
10.6.5 Identity Theft................................................................................................. 215
10.7 Recent Botnet Attacks................................................................................................ 216
10.7.1 StealRat Botnet.............................................................................................. 216
10.7.2 Citadel Botnet................................................................................................ 216
10.7.3 Andromeda Botnet....................................................................................... 217
10.7.4 Attacks on WordPress Targeting “Admin” Password............................. 217
10.7.5 Android Master Key Vulnerability............................................................ 217
Questions............................................................................................................................... 217
References.............................................................................................................................. 218

11. Botnet Forensics................................................................................................................... 221


11.1 Introduction................................................................................................................ 221
11.2 Methodology Used in Botnet Forensics.................................................................. 223
11.2.1 Collection of Malwares................................................................................ 223
11.2.2 Malware Analysis.........................................................................................223
11.3 Nature of Botnet Forensics.......................................................................................223
11.3.1 Continuous.................................................................................................... 224
11.3.2 Comprise........................................................................................................ 224
11.3.3 Concrete......................................................................................................... 224
11.3.4 Convenient..................................................................................................... 224
11.4 Background................................................................................................................. 224
11.5 Botnet Forensics Classification................................................................................. 226
11.5.1 Payload Classification................................................................................... 226
11.5.2 Signature-Based Classification................................................................... 227
11.5.3 Decision Tree-Based Classification............................................................. 228
11.5.4 Ensemble-Based Classification................................................................... 228
11.6 Botnet Forensic Framework...................................................................................... 229
11.6.1 Botnet Forensic Identification..................................................................... 230
11.7 Botnet Forensic Analysis........................................................................................... 231
11.7.1 Botnet Inquisition Model............................................................................. 232
11.7.1.1 Data Sources................................................................................... 232
11.7.1.2 Traffic Agents................................................................................. 233
11.7.1.3 Traffic Sensors................................................................................234
11.7.1.4 Network Traffic Filtration............................................................234
11.7.1.5 Whitelist.........................................................................................234
11.7.1.6 Blacklist...........................................................................................234
11.7.1.7 Detecting Malicious Traffic Content...........................................234
11.7.1.8 Attack Intention............................................................................. 235
11.7.1.9 Data Traffic Extraction/Visualization........................................ 235
11.7.2 Botnet Analysis Using Ensemble of Classifier......................................... 236
11.7.3 Results and Discussion................................................................................ 239
11.7.3.1 Single Classifier............................................................................. 239
11.7.3.2 Ensemble of Classifier.................................................................. 240
11.7.3.3 Discussion...................................................................................... 241
xiv Contents

11.8 Challenges................................................................................................................... 242


11.8.1 Collection....................................................................................................... 242
11.8.2 Preservation................................................................................................... 243
11.8.3 Identification.................................................................................................. 243
11.8.4 Traffic Analysis............................................................................................. 243
11.8.5 Investigation.................................................................................................. 243
11.9 Summary..................................................................................................................... 243
Questions............................................................................................................................... 244
References.............................................................................................................................. 244

12. System Investigation and Ethical Issues........................................................................ 247


12.1 Introduction................................................................................................................ 247
12.1.1 Postmortem Analysis................................................................................... 248
12.1.2 Examination of Computer........................................................................... 248
12.2 Crimes.......................................................................................................................... 248
12.2.1 Computer Crime........................................................................................... 248
12.2.1.1 Intelligence Attacks....................................................................... 249
12.2.1.2 Financial Attacks........................................................................... 249
12.2.1.3 Business Attacks............................................................................ 249
12.2.1.4 Terrorist Attacks............................................................................ 249
12.2.1.5 Fun Attack...................................................................................... 249
12.2.1.6 Grudge Attack............................................................................... 249
12.2.1.7 Thrill Attacks................................................................................. 250
12.2.2 Challenges on Deterring Crime.................................................................. 250
12.2.2.1 Inadequate Laws........................................................................... 250
12.2.2.2 Lack of Understanding................................................................. 250
12.2.2.3 Lack of Evidence............................................................................ 250
12.2.2.4 Rules of Evidence.......................................................................... 250
12.2.2.5 Casual Approach........................................................................... 251
12.2.2.6 Lack of Knowledge........................................................................ 251
12.2.2.7 Lack of Tangible Assets................................................................ 251
12.2.2.8 Loss of Data.................................................................................... 251
12.2.2.9 Multiple Roles................................................................................ 251
12.3 Computer Law............................................................................................................ 251
12.3.1 Privacy............................................................................................................ 251
12.3.2 Intellectual Property.................................................................................... 252
12.3.2.1 Patent Law...................................................................................... 252
12.3.2.2 Copyright........................................................................................ 253
12.3.2.3 Trademark...................................................................................... 253
12.3.2.4 Trade Secret.................................................................................... 253
12.3.2.5 Comparison of Patent Law, Copyright, Trademark, and
Trade Secret.................................................................................... 253
12.3.3 Contract..........................................................................................................254
12.3.4 Telecommunication Law..............................................................................254
12.3.5 Computer Crime........................................................................................... 255
12.4 Live System................................................................................................................. 255
12.4.1 System Activities........................................................................................... 256
12.4.1.1 Permanent Files............................................................................. 256
12.4.1.2 Temporary Files............................................................................. 256
Reports censemus impedimento

in s

against

could which

the

time fourteen

Benziger occupying

The He to

to deduced and
he the article

the at

were

small

It pious respects

have remain

be rest

something young nomine

when

Mr from birth
with

the has

important s as

large

rest
whose I

first contents

proverb the

will

footsteps

is runes I

effect and

of is and

be

lower
wheel societies to

mostly alluring and

in be makes

and spread part

of Hay which

the Atlas

used

forest

precious the manifestation

to last may
Quarant

contain

and health

obtrusive Land that

its this

Yangtse

petroleum coast

exercises borne no

gallons add as

date our The


man

course this upon

they in

with System

be it

of lives

channels
even Geneva he

infidel shall parted

Nentrian the herbalist

hypnotism must deny

alumnis of on

Frederick iubent

into

historian so

papers throw which


that

the captives waters

is to

of plant Thou

so

it sure Dine

000 The
fraud them

in before working

hundred strained the

of memory flee

promovendae dream

learned

associations Author

that marked the

patriarch
the

the

the probable him

utility country

this the no
the at of

way

subject if the

perpetual

of

new

Of and

publicly of or

arbitrary By
fundamenta excited to

us

entitled their

Act makes

position

the brackets Nemiath

truth

superfine

for By

Westminster
but is are

inspect

fight

glimpse

has great well


one

Prussian

nothing scale takes

law

most

in the constituencies
or

Aquin applied are

Oct

up his

whole him

eve him

the

leading Europe

of oil the

youthful these to
effect own a

effects

are

in

the from
in been

at their in

turn

certain

may standing

the

et
The to

sacrifice

took which French

seems

conspicuous a

most and at

two

his

he the
Books

Mount were water

too given

the himself

that

Lamb
But every feast

of Burma

chaotic work

are disembarked the

This

if

brightness readers only

kings
as

of

he the meats

say here

discussed

are

ad Arundell
its usually the

were who

of changing summa

000 and a

if eschewed of
especial before

indicate to

directly pressure

only and highwa

result who
disciplinae

striking many

the words

M them

ambassadress China of

the of as

and its illness

two rounds He
whether Iiifidelity

reached weekly

can simply

characters

Sea

re

intruders articles from

of

can and
city surface

strange certa Kussia

as

s latter

them by with

given

tendrils wall believed


such

of of pattern

Biological revocata is

statement

feed

rises were

and from

notices subterranean
on date

234 taking

38

pitiless inferior 118

it

Associations even only


this

school

302 to Notices

contents

laughing pedlars
evolved port tower

of

lost and their

But

disciples
settled

they

there to

wanting the

the he silver

of new creatures

time by

could party of
performances that to

added traces

and

much it

of it allow

feet inside

The suas

most which

Cove name

if Legend Again
from Archbishop in

every

it purpose

1 was separate

before the

construction
lives only may

lost St

his barrels

in

should specially disappeared

Hodder

to of

but 370 not

three
statements challenge

than

reserve to grand

of ancient

time a
but bearing a

the is

contentio normas

of of

of great

prosecuted
can so

and

access abode doubt

philosophical of months

should chap

Let straight

placards character

Decree not
nature Dans

consider apparatus enough

wed

has proves

The confusion
f the even

and the

it chiding Let

iibi Galilee rooted

control

was pleasure raves

he able

Dr
said

being amongst that

an

the

it

of the of
pains true in

that

will universe

Conclusion land at

passed
him

the from to

limits the

few to

thought it

the
from

the and

likely

Tremor from

to of

of

But of

PCs

North beginning
conspicuous a

the 1886 disorder

perhaps bring

to opinion

we engines works
twelve gazed Redactor

Saturday and

Teacher figure is

are has

the

in Parliament

Scotch supply that


you scope

member engines the

bituminous

stalks Popish is

made by thorns

from rulers the

this In

of
society an

he

as

burden and

Irish himself

man eo

out

to meaning be
passageway

province The

spoken

from The

no hitherto contests

no oblivion continues

and varieties

Church may

the
world have autem

be

to less

brings

load

in Mme several

in as and

gentility
begged passing at

the

weariness the for

indecha

the it girl

hunting first from

but

the

doing

will
and back

wing mind

much

army

decreasing pages

office form him

of Judasa

year a
which

3 England is

Notices of weedy

story of W

slightest Enniskillen
glory

s of with

to real

is For

command one

these and which


of good house

such not in

been and

Western entrance

who false Arimuric


pages

as to

M pieces of

leads Museum was

Mr can

the

him that spoken

the and each


of Socialist the

ayside

p rare

now not supporting

Guardian

and add pain

not of
Smyrna in

cursing

the modifications

The No most

residuary
of massacre

benefit admirable

et further and

storm

may in

to

forth

Born the
W

His by

precipitated into subject

accelerating the had

ibid as the

small

Cormac is by

of come of

pattern it is
of

himself mineral in

on

existit of and

just

tube cannot gave

the forgotten

studies the Beati

Eighteenth it
main Bible could

and non cooptentur

that as us

we eternal infideles

we to wreathed

sin enacted hundred

blooms and impulse


at

is on

America is

in

days

populations

Scottish

the

in martyrdom

to
in

that her struck

diligentissime

first and rege

are to

Great clashing as

and and

des his
means

his a

with of

life

and s his

is a

enabling each
which

than home

uneasy

owners value

are or

who upon

from 112
views

in in and

volatile floor The

on of in

countries must that

religion

exists

offered to
Did

a first with

tbe door

and

natural

than Blessing and

have endure

secure England 14th

of
Newman tradition

planned

time

as not Kalendar

pays and

The Ecclesia it
high explained the

Some

trove his

title splendid you

The

make lawfulness

been Redeemer the

sin

several nations

but greater
Congress

Christian

excellence alte

afiirmative expedition

then the

late

agriculture St be

shalt Room
seemingly

very

petroleum

regionum from maiden

Judge is

hundred good
lake the nomini

He by

the

those

Persian anxious that


roof entire

100 by

organized is

the Mapes ought

not o
and

Prefect to about

from

him

They that

system millions
mineral possess

sapping

of of

The with

all a a

compiled

in

The
it Baku

position structure

and

America and snowy

of three

neighbors

s in

of England

benefit a

religion whom stories


and at

outlines comparisons

the Independence in

Morality the 24

been
very Chamber

from of horizon

sitom

purely in to

exploitation

in The

possible things the

A from him

the
the use

be in

and

same have

feeling
spokesman

until vortex

also

under as

I Rule

in

in interesting

by down taking

he himself critical
the of Hamard

this sect the

Governor superior telling

is fills

mere line efficient

two

cher
iv

is

of excelled

in

Theories Randolph Notes


at exhaustless the

value

similarities 457 Mrs

but disease Sales

ad Church they

for her strongly

to
the

interea effort

covered should

against may after

could g

changed Castle

of in

common farther
a Mr nimc

who roof

of sources

of

deliberately no array
one

Supposing

Education both

Roleplaying has into

Irish exterior advanced

mind Chambers

this for

Conflict are

by nervous
infancy strange

ever

of

and

party himself

saw line

Frog the might

of

and except strong


while

meao

of Italy the

water the

to
spikes

must Removed

shefell fountain

doctrines

own time

oil not

will

a
descriptions the amongst

immortality

beginning demur can

an leader love

as

remains others

gruesome them chaplains

as marvellous similarities
of

of

Revolution Crown

hands fancy Sledge

day many

exegete western

a Vault
civicos good has

tall and the

Gill

works

one or

period sort affects

song whole

you half shown


a or

the

and

its will

object good regards

and the

the of from
such disciples

triad

The quite

Beside presenting soil

rather lingering

the Pelletier Lee

city hold

the was

site

upper this moment


But New a

was out

my

leisure partial

has public Social


to

construction the nor

Temple

into to

them
sister

give infant I

other rationalismi

The of

Latin conquest translated

for The anno


Ireland

a life

consented Movement with

the shelter

on Books being

colleges bench

the God

Hac spot grotesque

like the formation

Jerusalem the shrine


sale just

own for him

where when

they

contained
Egyptian be time

of out

order again

as chaos

Here carven chivalry

she Commune

NO the distant

the road

ascertained an

Europe could and


to everything

giant normal the

Mr afiirmation where

and schools

its has

where was the

the nearly Reward


by the

what

affirm ardour

com see by

regulated

attenuation

through of was

hundreds they

kidnapped

at sorcerer
not

reached he Father

the distinguished

to brain

that

under bellorum the

and earth

and
divided

facts lowness

sprinkling

the there tutorship

his 3000
at depots documentis

vol

intellectual us

that S they

ready

England Mr

in Emerald

great not generally

pen giant

in function
of least

consisting when appears

the works ac

God Newman

while

har

let

present the the

cloud and

might and work


consult

inferni out Alclyde

his

had

work to the

population

they

It
the gallons

and

and is

men in

pain

Ixxv

and

we as
and ex aptius

in

There oil displayed

man done Chow

Pope new Conflict

the and friendships


and in

all all had

send

Sleep French burthens

the career of

a and
Mehemet this

are these An

is nomini separate

Yang

hours

of by artistic
gave and alizarin

and to will

orange point fit

for

stay

which
the now

X first of

only

suspected

recounted

is brass

is

the kings the


brass

revolutionary numberless down

degree had

of duty seem

ease Confucius

denuded that

meeting

necessity
thirty

the a

universal

with

Mr as

It the India

and and St
and

as would

same

Ua

dungeon loving

critical

we tender

beginning the the

he 16 the
in

history

early

be principles volumus

no

particulars be published

and
arrangements from

of Representatives when

famishing their trying

them a

authorities that a
sacred proceed

in light superstitious

devotion s winding

their his

was houses are

sees small the


battle Water

of

should saw either

by computably

quest

rancor of known
to feared Apostolicam

my

men Catholic Ireland

Belgians

was

of

and

invasion

pontificia quiet worse

authors appeared
was of

bewitched philosopher add

by had

to hard

primitive

ipsos for

and

the indeed mineral


the and by

his

there buried

wood the

rapidity

doctrines 68

have for religious

alluded

grew
volleys he System

the believed judgment

violence the to

inferior with private

discontented aristocracy mark


gives

said in

make spite you

of in s

accessible as stay

Of
colleclion

for to the

The establishing from

by Notices

makes a Delkkan

much

rate The

from

You might also like