Evidence gathering for network security and forensics

被引:12
|
作者
Divakaran, Dinil Mon [1 ]
Fok, Kar Wai [1 ]
Nevat, Ido [1 ]
Thing, Vrizlynn L. L. [1 ]
机构
[1] ASTAR Inst Infocomm Res I2R, Cyber Secur Cluster, 1 Fusionopolis Way,# 21-01 Connexis South Tower, Singapore 138632, Singapore
基金
新加坡国家研究基金会;
关键词
Forensics; Security; Network; Traffic; Regression; ANOMALY DETECTION;
D O I
10.1016/j.diin.2017.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Any machine exposed to the Internet today is at the risk of being attacked and compromised. Detecting attack attempts, be they successful or not, is important for securing networks (servers, end-hosts and other assets) as well as for forensic analysis. In this context, we focus on the problem of evidence gathering by detecting fundamental patterns in network traffic related to suspicious activities. Detecting fundamental anomalous patterns is necessary for a solution to be able to detect as many types of attacks and malicious activities as possible. Our evidence gathering framework correlates multiple patterns detected, thereby increasing the confidence of detection, and resulting in increase in accuracy and decrease in false positives. We demonstrate the effectiveness of our framework by evaluating on a dataset consisting of normal traffic as well as traffic from a number of malwares. (C) 2017 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S56 / S65
页数:10
相关论文
共 50 条
  • [21] Developing the information security risk index using network gathering data
    Park, Jin Woo
    Yun, Seokhoon
    Kim, Jinheum
    Jeong, Hyeong Chul
    KOREAN JOURNAL OF APPLIED STATISTICS, 2016, 29 (07) : 1173 - 1183
  • [22] Forensics chain for evidence preservation system: An evidence preservation forensics framework for internet of things-based smart city security using blockchain
    Kamal, Randa
    Hemdan, Ezz El-Din
    El-Fishway, Nawal
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (21):
  • [23] Poster: A Logic Based Network Forensics Model for Evidence Analysis
    Singhal, Anoop
    Liu, Changwei
    Wijesekera, Duminda
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1677 - 1677
  • [24] Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
    He, Jingsha
    Chang, Chengyue
    He, Peng
    Pathan, Muhammad Salman
    FUTURE INTERNET, 2016, 8 (04):
  • [25] Achieving Critical Infrastructure Protection through the Interaction of Computer Security and Network Forensics
    Hunt, Ray
    Slay, Jill
    PST 2010: 2010 EIGHTH INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2010, : 23 - 30
  • [26] Towards Fine-grained Network Security Forensics and Diagnosis in the SDN Era
    Wang, Haopei
    Yang, Guangliang
    Chinprutthiwong, Phakpoom
    Xu, Lei
    Zhang, Yangyong
    Gu, Guofei
    PROCEEDINGS OF THE 2018 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (CCS'18), 2018, : 3 - 16
  • [27] Enhancing the Security of IOT in Forensics
    Banday, Mehroush
    2017 INTERNATIONAL CONFERENCE ON COMPUTING AND COMMUNICATION TECHNOLOGIES FOR SMART NATION (IC3TSN), 2017, : 193 - 198
  • [28] Embedded Device Forensics and Security
    Choo, Kim-Kwang Raymond
    Fei, Yunsi
    Xiang, Yang
    Yu, Yu
    ACM TRANSACTIONS ON EMBEDDED COMPUTING SYSTEMS, 2017, 16 (02)
  • [29] Analysis for Technology of Network Economy Illegal Investigation and Evidence Gathering
    Tang Xingyan
    Lin Zhiming
    Chenhong
    Jianjie
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 5366 - +
  • [30] Quality standards in the forensics and security
    Lauer, Von Josef
    KRIMINALISTIK, 2008, 62 (06): : 363 - 364