Network Forensic Analysis via Vulnerability Evidence Reasoning

被引:0
|
作者
Chang, Cheng-Yue [1 ]
He, Jing-Sha
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
network forensics; evidence graph; event vector; vulnerability evidence reasoning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article, we propose a novel method that uses vulnerability evidence reasoning in network forensics analysis. Central to our method is the evidence graph model to support evidence presentation and reasoning. Based on the evidence graph, we propose a network forensics method that built the evidence graph on the basis of the network system vulnerabilities and environmental information. At the same time, the proposed method can realize the reconstruction of attack scenarios with high efficiency and with the capability of identifying multi-staged at-tacks through evidence reasoning. Results of the experiment that we conducted would show that the proposed method is complete and credible with certain reasoning ability, which can be a powerful tool for rapid and effective network forensic analysis.
引用
收藏
页码:245 / 249
页数:5
相关论文
共 50 条
  • [21] IDENTIFYING EVIDENCE FOR CLOUD FORENSIC ANALYSIS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    ADVANCES IN DIGITAL FORENSICS XIII, 2017, 511 : 111 - 130
  • [22] Hair analysis as evidence in forensic cases
    Moeller, MR
    THERAPEUTIC DRUG MONITORING, 1996, 18 (04) : 444 - 449
  • [23] HAIR ANALYSIS AS EVIDENCE IN FORENSIC CASES
    MOELLER, MR
    FEY, P
    SACHS, H
    FORENSIC SCIENCE INTERNATIONAL, 1993, 63 (1-3) : 43 - 53
  • [24] Forensic Identification Science Evidence Since Daubert: Part II-Judicial Reasoning in Decisions to Exclude Forensic Identification Evidence on Grounds of Reliability
    Page, Mark
    Taylor, Jane
    Blenkin, Matt
    JOURNAL OF FORENSIC SCIENCES, 2011, 56 (04) : 913 - 917
  • [25] Network Forensic Evidence Acquisition (NFEA) With Packet Marking
    Kim, Hyung Seok
    Kim, Huy Kang
    2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 388 - 393
  • [26] Network Forensic Evidence Generation and Verification Scheme (NFEGVS)
    Kim, Hyungseok
    Kim, Eunjin
    Kang, Seungmo
    Kim, Huy Kang
    TELECOMMUNICATION SYSTEMS, 2015, 60 (02) : 261 - 273
  • [27] Using search engines to acquire network forensic evidence
    McGrew, Robert
    Vaughn, Rayford
    ADVANCES IN DIGITAL FORENSIC III, 2007, 242 : 247 - +
  • [28] Network Analysis of Psychopathy in Forensic Patients
    Preszler, Jonathan
    Marcus, David K.
    Edens, John F.
    McDermott, Barbara E.
    JOURNAL OF ABNORMAL PSYCHOLOGY, 2018, 127 (02) : 171 - 182
  • [29] Network Forensic Evidence Generation and Verification Scheme (NFEGVS)
    Hyungseok Kim
    Eunjin Kim
    Seungmo Kang
    Huy Kang Kim
    Telecommunication Systems, 2015, 60 : 261 - 273
  • [30] Network Forensic Analysis by Correlation of Attacks with Network Attributes
    Kaushik, Atul Kant
    Pilli, Emmanuel S.
    Joshi, R. C.
    INFORMATION AND COMMUNICATION TECHNOLOGIES, 2010, 101 : 124 - 128