Attack Intention Analysis Model for Network Forensics

被引:0
|
作者
Rasmi, M. [1 ]
Jantan, Aman [1 ]
机构
[1] Univ Sci Malaysia, Sch Comp Sci, George Town 11800, Malaysia
关键词
attacks intention; network forensics investigation; D-S theory; causal network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In network forensics, attack intentions analyses play a major role to help and accelerate decision-making for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators to conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing an alert correlation for certain evidence and predicting future attacks. In reality, more prediction factors should be used by the investigators to come to a more concise decision such as attack intention, incident path ... , etc. This paper will propose an attack intention analysis model, which focus on reasoning of attacks under uncertainty intention. A new model will be introduced using a combination of a mathematical Dempster-Shafer (D-S) evidence theory with a probabilistic technique through a causal network to predict an attack intention. We found that by analyzing the attacker's intention, forensic investigation agents will be able to audit and perform evidence in an efficient way. Experiments were performed on samples of probability of attack intentions to evaluate the proposed model. Arguably, attack intention analysis model may produce a clear and impact factor for investigator decision-making.
引用
收藏
页码:403 / 411
页数:9
相关论文
共 50 条
  • [1] Network Forensics Attack-Analysis Model Based on Similarity of Intention
    Rasmi, Mohammad
    Jantan, Aman
    Ahmed, Abdulghani Ali
    [J]. 2011 INTERNATIONAL CONFERENCE ON COMPUTER APPLICATION AND EDUCATION TECHNOLOGY (ICCAET 2011), 2011, : 110 - 113
  • [2] Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis
    Rasmi, Mohammad
    Al-Qawasmi, Khaled E.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 297 - 307
  • [3] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    [J]. THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [4] Network intrusion intention analysis model based on Bayesian attack graph
    Luo, Zhiyong
    Yang, Xu
    Liu, Jiahui
    Xu, Rui
    [J]. Tongxin Xuebao/Journal on Communications, 2020, 41 (09): : 160 - 169
  • [5] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [6] Network Forensics Investigation for Botnet Attack
    Sembiring, Irwan
    Nugroho, Yonathan Satrio
    [J]. IT CONVERGENCE AND SECURITY 2017, VOL 2, 2018, 450 : 228 - 236
  • [7] Enhanced neural network-based attack investigation framework for network forensics: Identification, detection, and analysis of the attack
    Bhardwaj, Sonam
    Dave, Mayank
    [J]. COMPUTERS & SECURITY, 2023, 135
  • [8] Analysis of Cyber Attack Traceback Techniques from the Perspective of Network Forensics
    Liu, Xue-Hua
    Ding, Li-Ping
    Zheng, Tao
    Wu, Jing-Zheng
    Li, Yan-Feng
    [J]. Ruan Jian Xue Bao/Journal of Software, 2021, 32 (01): : 194 - 217
  • [9] Reconstruction of Potential Attack Scenarios of the OpenID Protocol Towards Network Forensics Analysis
    Ji, Dongyao
    Liu, Junliang
    Yao, Gang
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2015, 2015, 557 : 101 - 113
  • [10] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    [J]. IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66