According to the CHFI v11 curriculum underNetwork ForensicsandAnalyzing Network Attacks, the primary purpose of usingnetwork log analysis toolsduring a suspectedDistributed Denial-of-Service (DDoS) attackis toidentify the source and nature of the attack traffic. DDoS attacks overwhelm network resources by flooding them with a massive volume of malicious traffic originating from multiple compromised systems.
By analyzing firewall logs, IDS/IPS logs, router logs, and server access logs, investigators can detect abnormal traffic patterns such as unusually high connection rates, repeated requests from multiple IP addresses, malformed packets, or protocol misuse. These indicators help forensic investigatorstrace the origin of attack traffic, identify botnet behavior, determine attack vectors (e.g., SYN flood, UDP flood, HTTP flood), and assess the scope and impact of the attack.
Option A refers to long-term security improvements, which may result from the investigation but are not the immediate goal. Option C focuses on performance tuning rather than forensic detection. Option D is unrelated to incident response or attack investigation.
The CHFI v11 Exam Blueprint emphasizeslog analysis for detecting DoS and DDoS attacks, including identifying malicious traffic sources and correlating events across network devices. Therefore, the correct and exam-aligned purpose of network log analysis in this scenario isidentifying the source of the cyberattack