Network Forensic Analysis via Vulnerability Evidence Reasoning

被引:0
|
作者
Chang, Cheng-Yue [1 ]
He, Jing-Sha
机构
[1] Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
关键词
network forensics; evidence graph; event vector; vulnerability evidence reasoning;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In this article, we propose a novel method that uses vulnerability evidence reasoning in network forensics analysis. Central to our method is the evidence graph model to support evidence presentation and reasoning. Based on the evidence graph, we propose a network forensics method that built the evidence graph on the basis of the network system vulnerabilities and environmental information. At the same time, the proposed method can realize the reconstruction of attack scenarios with high efficiency and with the capability of identifying multi-staged at-tacks through evidence reasoning. Results of the experiment that we conducted would show that the proposed method is complete and credible with certain reasoning ability, which can be a powerful tool for rapid and effective network forensic analysis.
引用
收藏
页码:245 / 249
页数:5
相关论文
共 50 条
  • [41] A Methodological Overview of Network Vulnerability Analysis
    Murray, Alan T.
    Matisziw, Timothy C.
    Grubesic, Tony H.
    GROWTH AND CHANGE, 2008, 39 (04) : 573 - 592
  • [42] A New Approach for Network Vulnerability Analysis
    Vu, Hai L.
    Khaw, Kenneth K.
    Chen, T. Y.
    Kuo, Fei-Ching
    2008 IEEE 33RD CONFERENCE ON LOCAL COMPUTER NETWORKS, VOLS 1 AND 2, 2008, : 189 - +
  • [43] Computational complexity of network vulnerability analysis
    Berberler, Murat Ersen
    ACTA UNIVERSITATIS SAPIENTIAE INFORMATICA, 2022, 14 (02) : 199 - 207
  • [44] Vulnerability Analysis of the Optical Network NMS
    Ma, Juntao
    Zhang, Lei
    Zhang, Shaokun
    Yao, Xinlei
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 1185 - 1187
  • [45] Vulnerability Analysis on the Cloud Network Topology
    Chen, Ke
    Zhang, Hua
    PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON MECHATRONICS, MATERIALS, CHEMISTRY AND COMPUTER ENGINEERING 2015 (ICMMCCE 2015), 2015, 39 : 3007 - 3012
  • [46] Vulnerability Analysis of Intelligent Network System
    Yan, Danfeng
    Yang, Fangchun
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 282 - 285
  • [47] Vulnerability analysis of critical infrastructure network
    Kizhakkedath, A.
    Tai, K.
    INTERNATIONAL JOURNAL OF CRITICAL INFRASTRUCTURE PROTECTION, 2021, 35
  • [48] User action representation and automated reasoning for the forensic analysis of mobile devices
    Anglano, Cosimo
    Canonico, Massimo
    Giordano, Laura
    Guazzone, Marco
    Dupre, Daniele Theseider
    ARES 2021: 16TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, 2021,
  • [49] Biomarker analysis via bioaffinity cascades in forensic analysis
    Agudelo, Juliana
    Huynh, Crystal
    Brunelle, Erica
    Halamek, Jan
    ABSTRACTS OF PAPERS OF THE AMERICAN CHEMICAL SOCIETY, 2015, 250
  • [50] Focused digital evidence analysis and forensic distinguishers
    Casey, Eoghan
    DIGITAL INVESTIGATION, 2016, 18 : A1 - A3