Network Forensics Flashcards
(40 cards)
The process of capturing, recording, and analyzing network events to discover the source of security incidents.
Network forensics
A detailed copy of all packets transferred across a network used for forensic analysis.
Packet capture (PCAP)
A tool used for capturing and analyzing live network traffic at the packet level.
Wireshark
The process of reviewing and interpreting traffic after it has been recorded.
Offline network traffic analysis
A log that summarizes communication between devices by showing IPs, ports, byte counts, and durations.
NetFlow log
A forensic approach that identifies anomalies in the volume or direction of network traffic.
Traffic pattern analysis
The technique of tracing traffic to its origin by following packet paths across devices.
Network trace route
A protocol analyzer that provides low-level details of network communications.
Packet sniffer
The term for a complete, raw copy of all traffic on a network segment.
Full packet capture
A type of capture that records only metadata (e.g., headers), not the packet payload.
Header capture
The practice of examining DNS logs to identify malicious domain queries.
DNS forensics
A tool that provides behavioral alerts by comparing traffic against a baseline.
Anomaly-based NIDS
A system that passively monitors network traffic for signs of suspicious activity.
Intrusion Detection System (IDS)
A network-based system that can block malicious traffic in real time.
Intrusion Prevention System (IPS)
The process of identifying and reconstructing application-level content from packet captures.
Protocol decoding
A system used to correlate logs from various sources including firewalls, routers, and endpoints.
Security Information and Event Management (SIEM)
The type of evidence that network logs and PCAPs represent in a legal investigation.
Digital evidence
A key principle that ensures evidence is not altered during analysis.
Chain of custody
The term for viewing sessions and conversations in order to reconstruct attacker activity.
Session reconstruction
A traffic type that is considered a red flag in network forensics when using unusual ports.
Protocol misuse
The process of extracting files or payloads from network packet captures.
Data carving
Logs generated by security appliances such as firewalls, routers, and proxies.
Perimeter device logs
A source of logs that show connection attempts and traffic direction between hosts.
Firewall logs
Logs that help identify abnormal login times, failed attempts, or session hijacking.
Authentication logs