Attack Intention Analysis Model for Network Forensics

被引:0
|
作者
Rasmi, M. [1 ]
Jantan, Aman [1 ]
机构
[1] Univ Sci Malaysia, Sch Comp Sci, George Town 11800, Malaysia
关键词
attacks intention; network forensics investigation; D-S theory; causal network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In network forensics, attack intentions analyses play a major role to help and accelerate decision-making for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators to conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing an alert correlation for certain evidence and predicting future attacks. In reality, more prediction factors should be used by the investigators to come to a more concise decision such as attack intention, incident path ... , etc. This paper will propose an attack intention analysis model, which focus on reasoning of attacks under uncertainty intention. A new model will be introduced using a combination of a mathematical Dempster-Shafer (D-S) evidence theory with a probabilistic technique through a causal network to predict an attack intention. We found that by analyzing the attacker's intention, forensic investigation agents will be able to audit and perform evidence in an efficient way. Experiments were performed on samples of probability of attack intentions to evaluate the proposed model. Arguably, attack intention analysis model may produce a clear and impact factor for investigator decision-making.
引用
收藏
页码:403 / 411
页数:9
相关论文
共 50 条
  • [21] Analysis of computer network attack based on the virus propagation model
    He, Yanshan
    Wang, Ting
    Xie, Jianli
    Zhang, Ming
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2020, 2020 (01)
  • [22] Network security analysis model based on the increase in attack ability
    Zhang, Haixia
    Su, Purui
    Feng, Dengguo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2007, 44 (12): : 2012 - 2019
  • [23] Analysis of computer network attack based on the virus propagation model
    Yanshan He
    Ting Wang
    Jianli Xie
    Ming Zhang
    [J]. EURASIP Journal on Wireless Communications and Networking, 2020
  • [24] Complex Network Security Analysis based on Attack Graph Model
    Liu, Zhiming
    Li, Sheng
    He, Jin
    Xie, Di
    Deng, Zhantao
    [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 183 - 186
  • [25] GLOBAL STABILITY ANALYSIS OF A VEISV MODEL FOR NETWORK WORM ATTACK
    Parsamanesh, Mahmood
    [J]. UNIVERSITY POLITEHNICA OF BUCHAREST SCIENTIFIC BULLETIN-SERIES A-APPLIED MATHEMATICS AND PHYSICS, 2017, 79 (04): : 179 - 188
  • [26] An Empirical Study of Network Forensics Analysis Tools
    Ghafarian, Ahmad
    [J]. PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014), 2014, : 366 - 370
  • [27] Understanding Network Forensics Analysis in an Operational Environment
    Raftopoulos, Elias
    Dimitropoulos, Xenofontas
    [J]. IEEE CS SECURITY AND PRIVACY WORKSHOPS (SPW 2013), 2013, : 111 - 118
  • [28] Building evidence graphs for network forensics analysis
    Wang, W
    Daniels, TE
    [J]. 21ST ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2005, : 229 - 239
  • [29] Method Ontology for Intelligent Network Forensics Analysis
    Saad, Sherif
    Traore, Issa
    [J]. PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 7 - 14
  • [30] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    [J]. ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267