Inicio  /  Future Internet  /  Vol: 8 Par: 4 (2016)  /  Artículo
ARTÍCULO
TITULO

Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

Jingsha He    
Chengyue Chang    
Peng He and Muhammad Salman Pathan    

Resumen

As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.

 Artículos similares

       
 
Aminollah Khormali and Jiann-Shiun Yuan    
Recent advancements of Generative Adversarial Networks (GANs) pose emerging yet serious privacy risks threatening digital media?s integrity and trustworthiness, specifically digital video, through synthesizing hyper-realistic images and videos, i.e., Dee... ver más

 
Konstantinos Demertzis, Nikos Tziritas, Panayiotis Kikiras, Salvador Llopis Sanchez and Lazaros Iliadis    
A Security Operations Center (SOC) is a central technical level unit responsible for monitoring, analyzing, assessing, and defending an organization?s security posture on an ongoing basis. The SOC staff works closely with incident response teams, securit... ver más

 
Nikolaos Serketzis, Vasilios Katos, Christos Ilioudis, Dimitrios Baltatzis and Georgios Pangalos    
The complication of information technology and the proliferation of heterogeneous security devices that produce increased volumes of data coupled with the ever-changing threat landscape challenges have an adverse impact on the efficiency of information s... ver más
Revista: Future Internet

 
Konstantinos Demertzis, Panayiotis Kikiras, Nikos Tziritas, Salvador Llopis Sanchez and Lazaros Iliadis    
A Security Operations Center (SOC) can be defined as an organized and highly skilled team that uses advanced computer forensics tools to prevent, detect and respond to cybersecurity incidents of an organization. The fundamental aspects of an effective SO... ver más

 
Jingsha He, Chengyue Chang, Peng He and Muhammad Salman Pathan    
Revista: Future Internet