158 Views Original Article
This research aims to evaluate the optimization of network security forensic tools on virtual router (VR) traffic. The methodology used includes the selection of several forensic tools on the Windows operating system such as Wireshark, Windump, and Network Miner, with testing in a virtual network environment. Testing, includes simulating various attack scenarios to assess the effectiveness of threat detection, performance of forensic tools, and impact on network performance. The main results show that the tools have varying detection capabilities with variations in resource usage and impact on network latency. Network traffic has been successfully recorded using the Win-dump tool in the static-forensics method, the Wireshark tool and Network Miner in the live-forensics method. The evaluation results of the meta-router network forensic recording tool recommend Win-dump as a recording tool that does not burden the Windows operating system with memory usage of 1696 kb while the Wireshark and Network Miner applications are recorded at more than 20MB. Based on this research, the static forensic method which have been built with meta-router objects can be used by investigators to detect cyber attacks. Proper selection and configuration of forensic tools is critical to achieving a balance between security and network performance, and specific adjustments to network requirements can increase the effectiveness of threat detection and mitigation.
Views: 1.2K
Views: 1.1K
Views: 1.1K