Abstract
Over the past decade, wireless mobile communications technology based on IEEE 802.11 wireless local area networks (WLANs) has been adopted worldwide on a massive scale. However, as the number of wireless users has soared, so has the possibility of cyber crime, where criminals deliberately and actively break into WLANs with the intent to cause harm or access sensitive information. WLAN digital forensics is seen not only as a response to cyber crime in wireless environments, but also as a means to stem the increase of cyber crime in WLANs. The challenge in WLAN digital forensics is to intercept and preserve all the communications generated by the mobile devices and conduct a proper digital forensic investigation. This paper attempts to address this issue by proposing a wireless forensic readiness model designed to help monitor, log and preserve wireless network traffic for digital forensic investigations. A prototype implementation of the wireless forensic readiness model is presented as a proof of concept.
Chapter PDF
Similar content being viewed by others
References
J. Broadway, B. Turnbull and J. Slay, Improving the analysis of lawfully intercepted network packet data captured for forensic analysis, Proceedings of the Third International Conference on Availability, Reliability and Security, pp. 1361–1368, 2008.
E. Casey (Ed.), Handbook of Computer Crime Investigation: Forensic Tools and Technology, Academic Press, San Diego, California, 2002.
Coensys, AnyLogic 6: Multi-Paradigm Simulation Software, Cherry Hill, New Jersey (www.coensys.com/anylogic.htm).
B. Endicott-Popovsky, D. Frincke and C. Taylor, A theoretical framework for organizational network forensic readiness, Journal of Computers, vol. 2(3), pp. 1–11, 2007.
G. Francia and K. Clinton, Computer forensics laboratory and tools, Journal of Computing Sciences in Colleges, vol. 20(6), pp. 143–150, 2005.
R. Newman, Computer Forensics: Evidence Collection and Management, Auerbach Publications, Boca Raton, Florida, 2007.
R. Rowlingson, A ten step process for forensic readiness, International Journal of Digital Evidence, vol. 2(3), 2004.
K. Scarfone, D. Dicoi, M. Sexton and C. Tibbs, Guide to Securing Legacy IEEE 802.11 Wireless Networks, NIST Special Publication 800-48, Revision 1, National Institute of Standards and Technology, Gaithersburg, Maryland, 2008.
R. Siles, Wireless forensics: Tapping the air – Part one, Symantec Corporation, Mountain View, California (www.securityfocus.com/infocus/1884), 2007.
J. Tan, Forensic readiness: Strategic thinking on incident response, presented at the Second Annual CanSecWest Conference, 2001.
C. Then, Examining wireless access points and associated devices, Forensic Focus (www.forensicfocus.com/downloads/examining-wireless-access-points.pdf), 2006.
B. Turnbull and J. Slay, The 802.11 technology gap – Case studies in crime, Proceedings of the IEEE Region 10 Conference, 2005.
B. Turnbull and J. Slay, Wireless forensic analysis tools for use in the electronic evidence collection process, Proceedings of the Fortieth Annual Hawaii International Conference on Systems Sciences, 2007.
B. Turnbull and J. Slay, Wi-Fi network signals as a source of digital evidence: Wireless network forensics, Proceedings of the Third International Conference on Availability, Reliability and Security, pp. 1355–1360, 2008.
E. Velasco, W. Chen, P. Ji and R. Hsieh, Wireless forensics: A new radio frequency based location system, Proceedings of the Pacific-Asia Workshop on Cybercrime and Computer Forensics, pp. 272–277, 2008.
D. Yim, J. Lim, S. Yun, S. Lim, O. Yi and J. Lim, The evidence collection of DoS attack in WLAN by using WLAN forensic profiling system, Proceedings of the International Conference on Information Science and Security, pp. 197–204, 2008.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 International Federation for Information Processing
About this paper
Cite this paper
Ngobeni, S., Venter, H., Burke, I. (2010). A Forensic Readiness Model for Wireless Networks. In: Chow, KP., Shenoi, S. (eds) Advances in Digital Forensics VI. DigitalForensics 2010. IFIP Advances in Information and Communication Technology, vol 337. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15506-2_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-15506-2_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15505-5
Online ISBN: 978-3-642-15506-2
eBook Packages: Computer ScienceComputer Science (R0)