Network forensics is an extension of the network security model, which traditionally emphasizes prevention and detection of network attacks. It addresses the need for dedicated investigative capabilities for investigation of malicious behavior in networks. Modern-day attackers tend to use sophisticated multi-stage, multihost attack techniques and anti-forensics tools to cover their attack traces. Due to the current limitations of intrusion detection and forensic analysis tools, reconstructing attack scenarios from evidence left behind by the attackers of an enterprise system is challenging. In particular, reconstructing attack scenarios by using the information from IDS alerts and system logs that have a large number of false positives is a big challenge. Many researchers have proposed to aggregate redundant alerts and correlate them to determine multi-step attacks [1]. This method is non-automated and rather ad-hoc. As an improvement, Wang at el. [7] proposed automating the process by using a fuzzy-rule based hierarchical reasoning framework to correlate alerts using so-called local rules and group them using so-called global rules. However, this approach falls apart when evidence is destroyed, and it does not assess the potential of the evidences admissibility so that the constructed attack scenario presented to a judge or jury has legal standing. In this talk, we will present a model [4] that systematically addresses how to resolve the above problems to reconstruct the attack scenario. These problems include a large amount of data including non-relevant data, missing evidence or evidence destroyed by anti-forensic techniques. Our system is based on a Prolog reasoning system MulVAL [6] using known vulnerability databases and an antiforensics database that we plan to extend to a standardized database like the NIST National Vulnerability Database (NVD). In this model, we use different methods, including mapping the evidence to system vulnerabilities, inductive reasoning and abductive reasoning to reconstruct attack scenarios. Besides, for the legal purpose, we codified the federal rules to this tool, aiming to help judge whether the evidence that is used to reconstruct the attack scenarios could be admissible in the court [5]. In addition, in order to help the investigators to quantify the probability of an attack path we use Bayesian Network to calculate the cumulative likelihood of the evidences. The goal of this research is to provide a tool that can reduce the investigators' time and effort in reaching definite conclusion about how an attack occurred. Also, this tool can be used to assist judge/jury or law students to better understand a multi-step, multihost attack towards an enterprise network by using a visual graph and probabilities. Our experimental results indicate that such a reasoning system can be useful for network forensics analysis.