{"title":"数字网络取证实验室的研究配置","authors":"Jeffrey S. Marean, M. Losavio, Ibrahim N. Imam","doi":"10.1109/SADFE.2008.23","DOIUrl":null,"url":null,"abstract":"Summary form only given. The digital forensic network lab is implemented with the goal of providing all students and faculty with a configurable research environment ideally suited for conducting network forensic testing on all TCP/IP network protocols passing through it. Of particular interest are protocols that are commonly used for file sharing, message passing, and those that actively obfuscate or encrypt message traffic. Notably, Bit Torrent protocol, P2P protocols, IM (instant messaging) protocols, and anonymizing protocols such as I2P, Thor, and Freenet. Items of interest in protocol analysis include packet payload, sender and receiver real IP address, and crypto analysis.The forensic test bed consists of an a main node populated with a Cisco WAN router. This is the master router for the lab. It routes internal traffic between the three research nodes and selected outside networks. Populating the a node and the two remote nodes, B and C, are a combination of a Cisco routers, Cisco firewalls, Cisco switches, and computers. Each node has five dual core X86 computers capable of running combinations of Linux x86- 32 or -64 OS's, Microsoft x86-32 or -64 OS's, and, if necessary, both OS's can be configured to either use Microsoft, VMWare or Xen virtualization software. The a main node is connected remotely to the C node via a campus fast Ethernet circuit. While the B node, co-located with the a main node, is connected together via a fast Ethernet and Tl circuit. To increase the infrastructure component of the lab we have the ability to selectively place the forensic lab into an existing classroom domain for wider access to students and faculty researchers.","PeriodicalId":391486,"journal":{"name":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2008-05-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"A Research Configuration for a Digital Network Forensic Lab\",\"authors\":\"Jeffrey S. Marean, M. Losavio, Ibrahim N. Imam\",\"doi\":\"10.1109/SADFE.2008.23\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Summary form only given. The digital forensic network lab is implemented with the goal of providing all students and faculty with a configurable research environment ideally suited for conducting network forensic testing on all TCP/IP network protocols passing through it. Of particular interest are protocols that are commonly used for file sharing, message passing, and those that actively obfuscate or encrypt message traffic. Notably, Bit Torrent protocol, P2P protocols, IM (instant messaging) protocols, and anonymizing protocols such as I2P, Thor, and Freenet. Items of interest in protocol analysis include packet payload, sender and receiver real IP address, and crypto analysis.The forensic test bed consists of an a main node populated with a Cisco WAN router. This is the master router for the lab. It routes internal traffic between the three research nodes and selected outside networks. Populating the a node and the two remote nodes, B and C, are a combination of a Cisco routers, Cisco firewalls, Cisco switches, and computers. Each node has five dual core X86 computers capable of running combinations of Linux x86- 32 or -64 OS's, Microsoft x86-32 or -64 OS's, and, if necessary, both OS's can be configured to either use Microsoft, VMWare or Xen virtualization software. The a main node is connected remotely to the C node via a campus fast Ethernet circuit. While the B node, co-located with the a main node, is connected together via a fast Ethernet and Tl circuit. To increase the infrastructure component of the lab we have the ability to selectively place the forensic lab into an existing classroom domain for wider access to students and faculty researchers.\",\"PeriodicalId\":391486,\"journal\":{\"name\":\"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering\",\"volume\":\"16 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2008-05-22\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/SADFE.2008.23\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/SADFE.2008.23","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2
摘要
只提供摘要形式。数字取证网络实验室的目标是为所有学生和教师提供一个可配置的研究环境,非常适合对通过它的所有TCP/IP网络协议进行网络取证测试。特别令人感兴趣的是通常用于文件共享、消息传递以及主动混淆或加密消息流量的协议。值得注意的是,Bit Torrent协议、P2P协议、IM(即时通讯)协议和匿名协议,如I2P、Thor和Freenet。协议分析中感兴趣的项目包括数据包有效载荷、发送方和接收方的真实IP地址以及加密分析。取证测试平台由一个带有Cisco WAN路由器的主节点组成。这是实验室的主路由器。它在三个研究节点和选定的外部网络之间路由内部流量。a节点和两个远程节点B和C是Cisco路由器、Cisco防火墙、Cisco交换机和计算机的组合。每个节点有五台双核X86计算机,能够运行Linux X86 -32或-64操作系统、微软X86 -32或-64操作系统的组合,如果有必要,这两种操作系统都可以配置为使用微软、VMWare或Xen虚拟化软件。a主节点通过校园快速以太网电路远程连接到C节点。而B节点与a主节点位于同一位置,通过快速以太网和Tl电路连接在一起。为了增加实验室的基础设施组成部分,我们有能力选择性地将法医实验室置于现有的教室领域,以便更广泛地访问学生和教师研究人员。
A Research Configuration for a Digital Network Forensic Lab
Summary form only given. The digital forensic network lab is implemented with the goal of providing all students and faculty with a configurable research environment ideally suited for conducting network forensic testing on all TCP/IP network protocols passing through it. Of particular interest are protocols that are commonly used for file sharing, message passing, and those that actively obfuscate or encrypt message traffic. Notably, Bit Torrent protocol, P2P protocols, IM (instant messaging) protocols, and anonymizing protocols such as I2P, Thor, and Freenet. Items of interest in protocol analysis include packet payload, sender and receiver real IP address, and crypto analysis.The forensic test bed consists of an a main node populated with a Cisco WAN router. This is the master router for the lab. It routes internal traffic between the three research nodes and selected outside networks. Populating the a node and the two remote nodes, B and C, are a combination of a Cisco routers, Cisco firewalls, Cisco switches, and computers. Each node has five dual core X86 computers capable of running combinations of Linux x86- 32 or -64 OS's, Microsoft x86-32 or -64 OS's, and, if necessary, both OS's can be configured to either use Microsoft, VMWare or Xen virtualization software. The a main node is connected remotely to the C node via a campus fast Ethernet circuit. While the B node, co-located with the a main node, is connected together via a fast Ethernet and Tl circuit. To increase the infrastructure component of the lab we have the ability to selectively place the forensic lab into an existing classroom domain for wider access to students and faculty researchers.