Evidence gathering for network security and forensics

被引:12
|
作者
Divakaran, Dinil Mon [1 ]
Fok, Kar Wai [1 ]
Nevat, Ido [1 ]
Thing, Vrizlynn L. L. [1 ]
机构
[1] ASTAR Inst Infocomm Res I2R, Cyber Secur Cluster, 1 Fusionopolis Way,# 21-01 Connexis South Tower, Singapore 138632, Singapore
基金
新加坡国家研究基金会;
关键词
Forensics; Security; Network; Traffic; Regression; ANOMALY DETECTION;
D O I
10.1016/j.diin.2017.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Any machine exposed to the Internet today is at the risk of being attacked and compromised. Detecting attack attempts, be they successful or not, is important for securing networks (servers, end-hosts and other assets) as well as for forensic analysis. In this context, we focus on the problem of evidence gathering by detecting fundamental patterns in network traffic related to suspicious activities. Detecting fundamental anomalous patterns is necessary for a solution to be able to detect as many types of attacks and malicious activities as possible. Our evidence gathering framework correlates multiple patterns detected, thereby increasing the confidence of detection, and resulting in increase in accuracy and decrease in false positives. We demonstrate the effectiveness of our framework by evaluating on a dataset consisting of normal traffic as well as traffic from a number of malwares. (C) 2017 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S56 / S65
页数:10
相关论文
共 50 条
  • [1] Security issues in Sensor Networks and gathering admissible evidence in Network Forensics
    Nehinbe, Joshua Ojo
    Damuut, Peter
    UKSIM FIFTH EUROPEAN MODELLING SYMPOSIUM ON COMPUTER MODELLING AND SIMULATION (EMS 2011), 2011, : 394 - 399
  • [2] Network monitoring for security and forensics
    Shanmugasundaram, Kulesh
    Memon, Nasir
    INFORMATION SYSTEMS SECURITY, PROCEEDINGS, 2006, 4332 : 56 - +
  • [3] Internet forensics on the basis of evidence gathering with Peep attacks
    Wang, Shiuh-Jeng
    Kao, Da-Yu
    COMPUTER STANDARDS & INTERFACES, 2007, 29 (04) : 423 - 429
  • [4] DIGITAL FORENSICS AND CRIMINAL PROCESS IN SPAIN: EVIDENCE GATHERING IN A CHANGING CONTEXT
    Cuadrado Salinas, Carmen
    REVISTA GENERAL DE DERECHO PROCESAL, 2023, (59):
  • [5] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [6] Design and configuration of a network security and forensics lab
    Harris, B
    Kizza, J
    Ward, M
    ICOMP '05: Proceedings of the 2005 International Conference on Internet Computing, 2005, : 242 - 246
  • [7] Network security and digital forensics in next generation communications
    Park, Jong Hyuk
    Gritzalis, Stefanos
    Jin, Hai
    Wang, Jenlong
    WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2011, 11 (02): : 143 - 145
  • [8] Special section on Statistical Methods for Network Security and Forensics
    Medard, Muriel
    Fragouli, Christine
    Lee, Wenke
    Maxion, Roy A.
    Stolfo, Sal
    Tong, Lang
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (03) : 345 - 346
  • [9] Quality assurance for evidence collection in network forensics
    Cheng, Bo-Chao
    Chen, Huan
    INFORMATION SECURITY APPLICATIONS, 2006, 4298 : 121 - +
  • [10] CREATING INTEGRATED EVIDENCE GRAPHS FOR NETWORK FORENSICS
    Liu, Changwei
    Singhal, Anoop
    Wijesekera, Duminda
    ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 227 - 241