Digitala Vetenskapliga Arkivet

Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Forensic strategies and methods in advanced software-defined networks
Kriminalpolizei Kempten, Germany; Hochschule Wismar, Germany.
Karlstad University, Faculty of Health, Science and Technology (starting 2013), Department of Mathematics and Computer Science (from 2013).
Hochschule Wismar, Germany.
2024 (English)In: Lecture Notes in Informatics (LNI), Proceedings - Series of the Gesellschaft fur Informatik (GI), Gesellschaft fur Informatik (GI) , 2024, Vol. 352, p. 331-341Conference paper, Published paper (Refereed)
Abstract [en]

When it comes to network forensics in modern cloud-edge-systems, network forensics has become an urgent yet challenging field of work. Especially forensics of software-defined networks (SDN) poses some unique challenges that need to be addressed. This article hence addresses the methodological and strategic challenges of network forensics in modern complex software-defined networks using the ZeroTier Network as a practical example. In this context, detailed strategies and methods for clarification and preservation of evidence in SDN after common IT security incidents are derived from existing best practices in digital forensics. In addition, typical technical and legal issues and obstacles for forensic work in SDN are addressed in connection with IT security measures, and possible solution approaches are presented. Using an advanced SDN example, characteristic workflows of network forensics in SDN are discussed. The result of the work is ultimately a presentation of adapted and individually adaptable strategies and methods for applying targeted digital forensics in advanced SDN. 

Place, publisher, year, edition, pages
Gesellschaft fur Informatik (GI) , 2024. Vol. 352, p. 331-341
Keywords [en]
Computer forensics, Electronic crime countermeasures, Forensic engineering, Advanced softwares, Complex software, IT security, Methodology, Security incident, Software-defined networkings, Software-defined networks, Strategic challenges, Strategy, Systems networks, Social software
National Category
Computer Sciences
Research subject
Computer Science
Identifiers
URN: urn:nbn:se:kau:diva-103358DOI: 10.18420/inf2024_23Scopus ID: 2-s2.0-85216081176OAI: oai:DiVA.org:kau-103358DiVA, id: diva2:1939849
Conference
Lock-in or log out? Wie digitale Souveranitat gelingt, INFORMATIK, Wiesbaden, Germany, September 24-26, 2024.
Available from: 2025-02-24 Created: 2025-02-24 Last updated: 2025-02-24Bibliographically approved

Open Access in DiVA

fulltext(341 kB)59 downloads
File information
File name FULLTEXT01.pdfFile size 341 kBChecksum SHA-512
de342ec573043529d60b604374d82a8922757d5b38eb36b5bb65e8032baca5c8d3b39e24510c4538acabe9ec5e35c191dc295e00602a2d670561060354eb5bc2
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Jensen, Meiko
By organisation
Department of Mathematics and Computer Science (from 2013)
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 59 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 193 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf