An Evidential Network Forensics Analysis with Metrics for Conviction Evidence

被引:0
|
作者
Amran, Ahmad Roshidi [1 ,3 ]
Sand, Amna [2 ,4 ]
Abd Razak, Mohd Raziff [1 ,3 ]
机构
[1] Univ Kuala Lumpur, Commun Technol Sect, Kuala Lumpur, Malaysia
[2] Univ Kuala Lumpur, Syst & Networking Sect, Kuala Lumpur, Malaysia
[3] Univ Kuala Lumpur, British Malaysian Inst, Kuala Lumpur, Malaysia
[4] Univ Kuala Lumpur, Malaysian Inst Informat Technol, Kuala Lumpur, Malaysia
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Analysing forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper presents how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) - Redress that is defined as holding intruders responsible. We apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.
引用
收藏
页码:73 / 78
页数:6
相关论文
共 50 条
  • [21] THE EVIDENTIAL BASIS FOR OLD-ENGLISH METRICS
    DUGGAN, HN
    [J]. STUDIES IN PHILOLOGY, 1988, 85 (02) : 145 - 163
  • [22] Reliability analysis with linguistic data: An evidential network approach
    Zhang, Xiaoge
    Mahadevan, Sankaran
    Deng, Xinyang
    [J]. RELIABILITY ENGINEERING & SYSTEM SAFETY, 2017, 162 : 111 - 121
  • [23] The Research of Electronic Evidence Admissibility and Evidential Power Based on Bayesian Network
    Wu, Shaobing
    Wang, Changmei
    Li, Hongtu
    Cui, Ying
    Zhao, Qingshan
    Jia, Xueming
    Wang, Lan
    [J]. 2011 7TH INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2011,
  • [24] An Email Forensics Analysis Method Based on Social Network Analysis
    Liu, YanHua
    Chen, GuoLong
    Xie, Lili
    [J]. 2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 563 - 569
  • [25] Wi-Fi network signals as a source of digital evidence: Wireless network forensics
    Turnbull, B.
    Slay, J.
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1355 - 1360
  • [26] Social Network Forensics Analysis Model Based on Network Representation Learning
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    [J]. ENTROPY, 2024, 26 (07)
  • [27] Behavioural Evidence Analysis: A Paradigm Shift in Digital Forensics
    Shree, Barkha
    Dhaliwal, Parneeta
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2021, 13 (05) : 20 - 42
  • [28] EVIDENTIAL CONCEPT AND EVIDENTIAL VALUE IN TECHNICAL EXPERT EVIDENCE
    LEBRECHT, L
    [J]. ELEKTROTECHNISCHE ZEITSCHRIFT B-AUSGABE, 1971, 23 (10): : M57 - &
  • [29] Introduction to a Network Forensics System for Cyber Incidents Analysis
    Choi, Yangseo
    Lee, Joo-Young
    Choi, Sunoh
    Kim, Jong-Hyum
    Kim, Ikkyun
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55
  • [30] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50