Abstract
Network traffic capture is an integral part of network forensics, but current traffic capture techniques are typically passive in nature. Under heavy loads, it is possible for a sniffer to miss packets, which affects the quality of forensic evidence. This paper explores means for active capture of network traffic. In particular, it examines how traffic capture can influence the stream under surveillance so that no data is lost. A tool that forces TCP retransmissions' is presented. The paper also provides a legal analysis-based on United States and South African laws-which shows that few legal obstacles are faced by traffic capture techniques that force attackers to retransmit data.
Author supplied keywords
Cite
CITATION STYLE
Slaviero, M., Granova, A., & Olivier, M. (2006). Active traffic capture for network forensics. IFIP International Federation for Information Processing, 222, 215–228. https://doi.org/10.1007/0-387-36891-4_17
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.