
Shade, P., (2012) 'Network forensics analysis - a new paradigm in network security', SHARKFEST Conference, Berkeley, California. OpenLogic (2008) How to Use Filters with Wireshark, Google Scholar. NetworkUpTime (2004) ICMP Address Mask Ping Operation, Available at: Google Scholar. Microsoft (2013) Microsoft Security Intelligence Report, Google Scholar. (2009) 'Building a wireless capturing tool for WiFi', (Wiley Journal of) Security and Communication Networks, Vol. (2003) Detection and Characterization of Port Scan Attacks, PhD dissertation, University of California, San Diego. (2005) TCP Window Size Adjustment and Flow Control, Google Scholar IT Cornell (2015) Browsers and Drive-by-downloads, Google Scholar. (2007) 'A BitTorrent-driven distributed denial-of-service attack', 3rd International Conference on Security and Privacy in Communication Networks, Orlando, FL.
(2010) ICMP Attacks Against TCP, RFC5927, Google Scholar (2003) OS Fingerprinting with ICMP, Protocol Analysis Institute, /ftp1/pub/hpcp/newsletter_nov2003/os_fingerprinting_with_icmp.pdf Google Scholar
Camber (2005) ICMP Packet filtering and ICMP Attacks, Google Scholar. (2004) 'IP covert timing channels: design and detection', Proceedings of the 11th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, pp.178-187. (1989) Requirements for Internet Hosts and Communication Layers, Google Scholar This paper suggests a methodology for investigation and analysis of the protocol to assist in the control of data flow across security perimeters. The ability to replicate data without oversight introduces risk of abuse by users as well as difficulties for forensic investigators. While lacking the economies brought about by scale, complete control over data access has made this a popular solution. This utility replicates files stored in shares to remote peers with access controlled by keys and permissions.
One option is BitTorrent Sync, a cloudless synchronisation utility provides data availability and redundancy. These events have caused users to assess their own security practices and the level of trust placed in third party storage services. Recent concerns over unauthorised access to third party systems and large scale exposure of private data have made an alternative solution desirable. Cloud architecture allows the provisioning of storage space with ``always-on'' access. This model of use is facilitated by cloud based file synchronisation services such as Dropbox, OneDrive, Google Drive and Apple iCloud.
A popular solution is to have a central repository which each device accesses after centrally managed authentication.
Users are increasingly dependant on devices that consume and produce data in ever increasing volumes. High availability is no longer just a business continuity concern.