An Evidential Network Forensics Analysis Model with Adversarial Capability and Layering

被引:0
|
作者
Amran, Ahmad Roshidi [1 ]
Saad, Amna [2 ]
机构
[1] Univ Kuala Lumpur, British Malaysian Inst, Commun Technol Sect, Kuala Lumpur, Malaysia
[2] Univ Kuala Lumpur, Malaysia Inst Informat Technol, Syst & Networking Sect, Kuala Lumpur, Malaysia
关键词
adversarial capability; evidence; layers; models; network forensics analysis; SECURE;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With increasing crimes and attacks being committed online by adversaries from remote sites, it is vital for law enforcement and public security that forensics investigation into the nature and source of these network attacks be effective and successful in bringing the criminals to justice. The network forensics investigation process is complex and processing-intensive such as sifting through network traffic and examining them for evidence, thus it is desirable to approach this task systematically and efficiently with as much structure as is feasible. This paper proposes a model for network forensics analysis that captures appropriately defined adversarial capability and structured by a layered approach to investigation. The former approach eliminates the need to presume on the adversarys behaviour and is independent of specific attack styles, thus is generic; while the latter approach facilitates a more network-intuitive and modular investigation process. We discuss the layered approach and propose the forensics model by defining adversarial capabilities and the experiment setting played between an adversary, a collection of node instances and a forensics analyst. We apply the model in our investigation against samples of traffic captured and show the feasibility of this model on two common network attack instances. Results of evidence collected and conclusions confirm that analysis based on this model is objectively done, and trustworthy evidence successfully gathered and produced.
引用
收藏
页数:9
相关论文
共 50 条
  • [41] Adversarial Attacks on Graph Neural Network Based on Local Influence Analysis Model
    Wu Yiteng
    Liu Wei
    Yu Hongtao
    Cao Xiaochun
    [J]. JOURNAL OF ELECTRONICS & INFORMATION TECHNOLOGY, 2022, 44 (07) : 2576 - 2583
  • [42] Introduction to a Network Forensics System for Cyber Incidents Analysis
    Choi, Yangseo
    Lee, Joo-Young
    Choi, Sunoh
    Kim, Jong-Hyum
    Kim, Ikkyun
    [J]. 2016 18TH INTERNATIONAL CONFERENCE ON ADVANCED COMMUNICATIONS TECHNOLOGY (ICACT) - INFORMATION AND COMMUNICATIONS FOR SAFE AND SECURE LIFE, 2016, : 50 - 55
  • [43] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    [J]. INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [44] A Graph Based Approach Toward Network Forensics Analysis
    Wang, Wei
    Daniels, Thomas E.
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
  • [45] An embedded Bayesian Network hidden Markov Model for digital forensics
    De Vel, Olivier
    Liu, Nianjun
    Caelli, Terry
    Caetano, Tiberio S.
    [J]. INTELLIGENCE AND SECURITY INFORMATICS, PROCEEDINGS, 2006, 3975 : 459 - 465
  • [46] Adversarial queueing model for continuous network dynamics
    Blesa, MJ
    Calzada, D
    Fernández, A
    López, L
    Martínez, AL
    Santos, A
    Serna, M
    [J]. MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2005, PROCEEDINGS, 2005, 3618 : 144 - 155
  • [47] Adversarial Queueing Model for Continuous Network Dynamics
    Maria Blesa
    Daniel Calzada
    Antonio Fernández
    Luis López
    Andrés L. Martínez
    Agustín Santos
    Maria Serna
    Christopher Thraves
    [J]. Theory of Computing Systems, 2009, 44 : 304 - 331
  • [48] Adversarial Queueing Model for Continuous Network Dynamics
    Blesa, Maria
    Calzada, Daniel
    Fernandez, Antonio
    Lopez, Luis
    Martinez, Andres L.
    Santos, Agustin
    Serna, Maria
    Thraves, Christopher
    [J]. THEORY OF COMPUTING SYSTEMS, 2009, 44 (03) : 304 - 331
  • [49] Secret Status and Forensics Analysis System Model
    Wang, Xiao Jing
    [J]. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V, 2015, : 591 - 596
  • [50] Improving Analysis Phase in Network Forensics By Using Attack Intention Analysis
    Rasmi, Mohammad
    Al-Qawasmi, Khaled E.
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2016, 10 (05): : 297 - 307