Attack Intention Analysis Model for Network Forensics

被引:0
|
作者
Rasmi, M. [1 ]
Jantan, Aman [1 ]
机构
[1] Univ Sci Malaysia, Sch Comp Sci, George Town 11800, Malaysia
关键词
attacks intention; network forensics investigation; D-S theory; causal network;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In network forensics, attack intentions analyses play a major role to help and accelerate decision-making for apprehending the real perpetrator. In fact, attack intention analysis is a prediction factor to help investigators to conclude a case with high accuracy. However, current techniques in attack intention analysis only focus on recognizing an alert correlation for certain evidence and predicting future attacks. In reality, more prediction factors should be used by the investigators to come to a more concise decision such as attack intention, incident path ... , etc. This paper will propose an attack intention analysis model, which focus on reasoning of attacks under uncertainty intention. A new model will be introduced using a combination of a mathematical Dempster-Shafer (D-S) evidence theory with a probabilistic technique through a causal network to predict an attack intention. We found that by analyzing the attacker's intention, forensic investigation agents will be able to audit and perform evidence in an efficient way. Experiments were performed on samples of probability of attack intentions to evaluate the proposed model. Arguably, attack intention analysis model may produce a clear and impact factor for investigator decision-making.
引用
收藏
页码:403 / 411
页数:9
相关论文
共 50 条
  • [31] Packet analysis for network forensics: A comprehensive survey
    Sikos, Leslie F.
    [J]. FORENSIC SCIENCE INTERNATIONAL-DIGITAL INVESTIGATION, 2020, 32
  • [32] Network Forensics: An Analysis of Techniques, Tools, and Trends
    Hunt, Ray
    Zeadally, Sherali
    [J]. COMPUTER, 2012, 45 (12) : 36 - 43
  • [33] Rating behavior evaluation and abnormality forensics analysis for injection attack detection
    Yang, Zhihai
    Sun, Qindong
    Liu, Zhaoli
    Yan, Jinpei
    Zhang, Yaling
    [J]. JOURNAL OF INTELLIGENT INFORMATION SYSTEMS, 2022, 59 (01) : 93 - 119
  • [34] Rating behavior evaluation and abnormality forensics analysis for injection attack detection
    Zhihai Yang
    Qindong Sun
    Zhaoli Liu
    Jinpei Yan
    Yaling Zhang
    [J]. Journal of Intelligent Information Systems, 2022, 59 : 93 - 119
  • [35] An intrusion intention analysis algorithm based on attack graph
    Zhu, Zhen
    Chai, Guofei
    [J]. International Journal of Circuits, Systems and Signal Processing, 2021, 15 : 643 - 650
  • [36] Effectively designing collaborative network electronic forensics model
    [J]. Xia, J., 1600, Northwestern Polytechnical University (31):
  • [37] A Secure Storage Model to Preserve Evidence in Network Forensics
    Ibrahim, Mohd Izham
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 391 - 402
  • [38] Research on Attack Model for Cognitive Network based on Scientific Analysis of Network Material System
    Sun, Yan
    Zhou, XueGuang
    [J]. ADVANCED RESEARCH ON MECHANICAL ENGINEERING, INDUSTRY AND MANUFACTURING ENGINEERING, PTS 1 AND 2, 2011, 63-64 : 911 - 914
  • [39] Formal knowledge model for online social network forensics
    Arshad, Humaira
    Jantan, Aman
    Hoon, Gan Keng
    Abiodun, Isaac Oludare
    [J]. COMPUTERS & SECURITY, 2020, 89
  • [40] Network Security Situation Evaluation Method Based on Attack Intention Recognition
    Wang Kun
    Qiu Hui
    Yang Haopu
    Hou Di
    [J]. PROCEEDINGS OF 2015 4TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2015), 2015, : 919 - 924