An Evidential Network Forensics Analysis Model with Adversarial Capability and Layering

被引:0
|
作者
Amran, Ahmad Roshidi [1 ]
Saad, Amna [2 ]
机构
[1] Univ Kuala Lumpur, British Malaysian Inst, Commun Technol Sect, Kuala Lumpur, Malaysia
[2] Univ Kuala Lumpur, Malaysia Inst Informat Technol, Syst & Networking Sect, Kuala Lumpur, Malaysia
关键词
adversarial capability; evidence; layers; models; network forensics analysis; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With increasing crimes and attacks being committed online by adversaries from remote sites, it is vital for law enforcement and public security that forensics investigation into the nature and source of these network attacks be effective and successful in bringing the criminals to justice. The network forensics investigation process is complex and processing-intensive such as sifting through network traffic and examining them for evidence, thus it is desirable to approach this task systematically and efficiently with as much structure as is feasible. This paper proposes a model for network forensics analysis that captures appropriately defined adversarial capability and structured by a layered approach to investigation. The former approach eliminates the need to presume on the adversarys behaviour and is independent of specific attack styles, thus is generic; while the latter approach facilitates a more network-intuitive and modular investigation process. We discuss the layered approach and propose the forensics model by defining adversarial capabilities and the experiment setting played between an adversary, a collection of node instances and a forensics analyst. We apply the model in our investigation against samples of traffic captured and show the feasibility of this model on two common network attack instances. Results of evidence collected and conclusions confirm that analysis based on this model is objectively done, and trustworthy evidence successfully gathered and produced.
引用
收藏
页数:9
相关论文
共 50 条
  • [1] An Evidential Network Forensics Analysis with Metrics for Conviction Evidence
    Amran, Ahmad Roshidi
    Sand, Amna
    Abd Razak, Mohd Raziff
    [J]. 2014 4TH INTERNATIONAL CONFERENCE ON ENGINEERING TECHNOLOGY AND TECHNOPRENEURSHIP (ICE2T), 2014, : 73 - 78
  • [2] Attack Intention Analysis Model for Network Forensics
    Rasmi, M.
    Jantan, Aman
    [J]. SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 2, 2011, 180 : 403 - 411
  • [3] Evidential classification for defending against adversarial attacks on network traffic
    Beechey, Matthew
    Lambotharan, Sangarapillai
    Kyriakopoulos, Konstantinos G.
    [J]. INFORMATION FUSION, 2023, 92 : 115 - 126
  • [4] A MODEL FOR NFAA-NETWORK FORENSICS ATTACK ANALYSIS
    Rasmi, M.
    Jantan, Aman
    [J]. THIRD INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND TECHNOLOGY (ICCET 2011), 2011, : 739 - 746
  • [5] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    [J]. IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [6] Social Network Forensics Analysis Model Based on Network Representation Learning
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    [J]. ENTROPY, 2024, 26 (07)
  • [7] A Generative Adversarial Network Framework for JPEG Anti-Forensics
    Wu, Jianyuan
    Liu, Li
    Kang, Xiangui
    Sun, Wei
    [J]. 2020 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA ASC), 2020, : 1442 - 1447
  • [8] Satisfaction analysis of public services using Evidential Network model
    Jiang, Jiang
    You, Yaqian
    Sun, Jianbin
    Li, Xuan
    [J]. 2020 IEEE 15TH INTERNATIONAL CONFERENCE OF SYSTEM OF SYSTEMS ENGINEERING (SOSE 2020), 2020, : 105 - 109
  • [9] Poster: A Logic Based Network Forensics Model for Evidence Analysis
    Singhal, Anoop
    Liu, Changwei
    Wijesekera, Duminda
    [J]. CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1677 - 1677
  • [10] Accident analysis model based on Bayesian Network and Evidential Reasoning approach
    Wang, Yan Fu
    Xie, Min
    Chin, Kwai-Sang
    Fu, Xiu Ju
    [J]. JOURNAL OF LOSS PREVENTION IN THE PROCESS INDUSTRIES, 2013, 26 (01) : 10 - 21