Poster: A Logic Based Network Forensics Model for Evidence Analysis

被引:2
|
作者
Singhal, Anoop [1 ]
Liu, Changwei [2 ]
Wijesekera, Duminda [1 ,2 ]
机构
[1] NIST, Gaithersburg, MD 20899 USA
[2] George Mason Univ, Fairfax, VA 22030 USA
关键词
Network forensics; cybercrime; digital evidence; Prolog reasoning; network attack scenario; evidence graph; admissibility;
D O I
10.1145/2810103.2810106
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network forensics is an extension of the network security model, which traditionally emphasizes prevention and detection of network attacks. It addresses the need for dedicated investigative capabilities for investigation of malicious behavior in networks. Modern-day attackers tend to use sophisticated multi-stage, multihost attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack scenarios from evidence left behind by the attackers of an enterprise system is challenging. In particular, reconstructing attack scenarios by using the information from IDS alerts and system logs that have a large number of false positives is a big challenge. Many researchers have proposed to aggregate redundant alerts and correlate them to determine multi-step attacks [1]. This method is non-automated and rather ad-hoc. As an improvement, Wang at el. [7] proposed automating the process by using a fuzzy-rule based hierarchical reasoning framework to correlate alerts using so-called local rules and group them using so-called global rules. However, this approach falls apart when evidence is destroyed, and it does not assess the potential of the evidences admissibility so that the constructed attack scenario presented to a judge or jury has legal standing. In this talk, we will present a model [4] that systematically addresses how to resolve the above problems to reconstruct the attack scenario. These problems include a large amount of data including non-relevant data, missing evidence or evidence destroyed by anti-forensic techniques. Our system is based on a Prolog reasoning system MulVAL [6] using known vulnerability databases and an antiforensics database that we plan to extend to a standardized database like the NIST National Vulnerability Database (NVD). In this model, we use different methods, including mapping the evidence to system vulnerabilities, inductive reasoning and abductive reasoning to reconstruct attack scenarios. Besides, for the legal purpose, we codified the federal rules to this tool, aiming to help judge whether the evidence that is used to reconstruct the attack scenarios could be admissible in the court [5]. In addition, in order to help the investigators to quantify the probability of an attack path we use Bayesian Network to calculate the cumulative likelihood of the evidences. The goal of this research is to provide a tool that can reduce the investigators' time and effort in reaching definite conclusion about how an attack occurred. Also, this tool can be used to assist judge/jury or law students to better understand a multi-step, multihost attack towards an enterprise network by using a visual graph and probabilities. Our experimental results indicate that such a reasoning system can be useful for network forensics analysis.
引用
收藏
页码:1677 / 1677
页数:1
相关论文
共 50 条
  • [1] A LOGIC-BASED NETWORK FORENSIC MODEL FOR EVIDENCE ANALYSIS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    [J]. ADVANCES IN DIGITAL FORENSICS XI, 2015, 462 : 129 - 145
  • [2] Social Network Forensics Analysis Model Based on Network Representation Learning
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    [J]. ENTROPY, 2024, 26 (07)
  • [3] Network forensics based on fuzzy logic and expert system
    Liao, Niandong
    Tian, Shengfeng
    Wang, Tinghua
    [J]. COMPUTER COMMUNICATIONS, 2009, 32 (17) : 1881 - 1892
  • [4] A fuzzy logic based expert system as a network forensics
    Kim, JS
    Kim, DG
    Noh, BN
    [J]. 2004 IEEE INTERNATIONAL CONFERENCE ON FUZZY SYSTEMS, VOLS 1-3, PROCEEDINGS, 2004, : 879 - 884
  • [5] Building evidence graphs for network forensics analysis
    Wang, W
    Daniels, TE
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 229 - 239
  • [6] A Secure Storage Model to Preserve Evidence in Network Forensics
    Ibrahim, Mohd Izham
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
  • [7] Network Forensics Attack-Analysis Model Based on Similarity of Intention
    Rasmi, Mohammad
    Jantan, Aman
    Ahmed, Abdulghani Ali
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 110 - 113
  • [8] Attack Intention Analysis Model for Network Forensics
    Rasmi, M.
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
  • [9] An Evidential Network Forensics Analysis with Metrics for Conviction Evidence
    Amran, Ahmad Roshidi
    Sand, Amna
    Abd Razak, Mohd Raziff
    [J]. 2014 4TH INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND TECHNOPRENEURSHIP (ICE2T), 2014, : 73 - 78
  • [10] Computer Forensics Model Based on Evidence Ring and Evidence Chain
    Ma, Guofu
    Wang, Zixian
    Zou, Likun
    Zhang, Qian
    [J]. CEIS 2011, 2011, 15