An Evidential Network Forensics Analysis with Metrics for Conviction Evidence

被引:0
|
作者
Amran, Ahmad Roshidi [1 ,3 ]
Sand, Amna [2 ,4 ]
Abd Razak, Mohd Raziff [1 ,3 ]
机构
[1] Univ Kuala Lumpur, Commun Technol Sect, Kuala Lumpur, Malaysia
[2] Univ Kuala Lumpur, Syst & Networking Sect, Kuala Lumpur, Malaysia
[3] Univ Kuala Lumpur, British Malaysian Inst, Kuala Lumpur, Malaysia
[4] Univ Kuala Lumpur, Malaysian Inst Informat Technol, Kuala Lumpur, Malaysia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Analysing forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper presents how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) - Redress that is defined as holding intruders responsible. We apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [1] An Evidential Network Forensics Analysis Model with Adversarial Capability and Layering
    Amran, Ahmad Roshidi
    Saad, Amna
    [J]. 2014 WORLD CONGRESS ON COMPUTER APPLICATIONS AND INFORMATION SYSTEMS (WCCAIS), 2014,
  • [2] Building evidence graphs for network forensics analysis
    Wang, W
    Daniels, TE
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 229 - 239
  • [3] Poster: A Logic Based Network Forensics Model for Evidence Analysis
    Singhal, Anoop
    Liu, Changwei
    Wijesekera, Duminda
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1677 - 1677
  • [4] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    [J]. IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [5] Evidence gathering for network security and forensics
    Divakaran, Dinil Mon
    Fok, Kar Wai
    Nevat, Ido
    Thing, Vrizlynn L. L.
    [J]. DIGITAL INVESTIGATION, 2017, 20 : S56 - S65
  • [6] Quality assurance for evidence collection in network forensics
    Cheng, Bo-Chao
    Chen, Huan
    [J]. INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 121 - +
  • [7] CREATING INTEGRATED EVIDENCE GRAPHS FOR NETWORK FORENSICS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    [J]. ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 227 - 241
  • [8] EVIDENCE AND HYPOTHESIS - ANALYSIS OF EVIDENTIAL RELATIONS
    LONGINO, HE
    [J]. PHILOSOPHY OF SCIENCE, 1979, 46 (01) : 35 - 56
  • [9] A Secure Storage Model to Preserve Evidence in Network Forensics
    Ibrahim, Mohd Izham
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
  • [10] Evidential Matrix Metrics as Distances Between Meta-Data Dependent Bodies of Evidence
    Loudahi, Mehena
    Klein, John
    Vannobel, Jean-Marc
    Colot, Olivier
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (01) : 109 - 122