Challenges in Network Forensics
Challenges in Network Forensics
I.
INTRODUCTION
II.
NETWORK FORENSICS
1382
Contain Content Addressable Memory (CAM) determines which port on a switch corresponds to
which MAC address.
Routers
IDPSs
Firewalls
Web proxies
x
x
1383
Preservation phase
along with computed
data will be used for
ensure that there is
tampering.
III.
1384
1385
[3]
[4]
[5]
IV.
CONCLUSION
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
LITERATURE
[1]
[2]
[16]
1386
Volatile
data,
http://synjunkie.blogspot.com/2007/10/forensics-volatiledata.html, date published: 6th October 2007, last accessed: 2nd
February, 2015.