Cybercrime is becoming increasingly sophisticated, creating major challenges for cybersecurity and, in particular, network forensics. Network forensics analysts play an essential role in detecting intrusions, investigating incidents, and preventing attacks through the analysis of
...
Cybercrime is becoming increasingly sophisticated, creating major challenges for cybersecurity and, in particular, network forensics. Network forensics analysts play an essential role in detecting intrusions, investigating incidents, and preventing attacks through the analysis of network traffic. Yet the volume and complexity of network data, combined with the limits of current tools, make this work time-consuming and error-prone. This study addresses these challenges by designing and developing a prototype visualisation tool tailored to the needs of network forensics analysts. The research follows a structured four-phase methodology. First, interviews with professional analysts identify key tasks and challenges, forming the basis for the tool’s requirements. Second, the What-Why-How framework maps these tasks to appropriate visualisation techniques. Third, iterative prototyping translates these insights into an interactive prototype tool, refined through user feedback. Finally, an impact analysis assesses effectiveness, intuitiveness, and correctness by evaluating tasks performed by both experienced and inexperienced participants. The evaluation shows that the prototype significantly improves analysis workflows, lowering cognitive load, increasing efficiency, and reducing errors. Both experienced and inexperienced participants performed tasks faster using the prototype, demonstrating both accessibility and a reduced learning curve. The findings also highlight the value of a user-centred, task-oriented approach to visualisation design. This research contributes to network forensics by presenting a structured approach to developing domain-specific visualisation tools. The results highlight their potential to enhance the speed, accuracy, and reliability of analysis, strengthening cybersecurity as a whole.