1st International ICST Workshop on Computer Network Forensics Research Workshop

Research Article

Trusted Internet forensics: design of a network forensics appliance

  • @INPROCEEDINGS{10.1109/SECCMW.2005.1588292,
        author={Danilo Bruschi and Mattia  Monga and Emilia Rosti},
        title={Trusted Internet forensics: design of a network forensics appliance},
        proceedings={1st International ICST Workshop on Computer Network Forensics Research Workshop},
        publisher={IEEE},
        proceedings_a={CNFR},
        year={2006},
        month={2},
        keywords={},
        doi={10.1109/SECCMW.2005.1588292}
    }
    
  • Danilo Bruschi
    Mattia Monga
    Emilia Rosti
    Year: 2006
    Trusted Internet forensics: design of a network forensics appliance
    CNFR
    ICST
    DOI: 10.1109/SECCMW.2005.1588292
Danilo Bruschi1,*, Mattia Monga2, Emilia Rosti2
  • 1: Informatica e Comunicazione, Universitadegli Studi di Milano
  • 2: Universita degli Studi di Milano
*Contact email: bruschi@dico.unimi.it

Abstract

With the spreading of cyber-crime, computer forensics has emerged as a new discipline in the system security arena. Some work is being done towards the definition of methodologies for the collection of digital evidences from storage devices that can withstand legal analysis in court. On the contrary, the collection of network evidences that allows for a selection of the traffic and guarantees legal admissibility is still an open field. In this paper we present the architecture of TIF, trusted Internet forensics, a network appliance that collects data from the network for forensics purposes. Such an appliance relies on a trusted computing platform in order to allow for the verification of the computational chain so that the data collected could be used as evidence in court.