Evidence gathering for network security and forensics

被引:12
|
作者
Divakaran, Dinil Mon [1 ]
Fok, Kar Wai [1 ]
Nevat, Ido [1 ]
Thing, Vrizlynn L. L. [1 ]
机构
[1] ASTAR Inst Infocomm Res I2R, Cyber Secur Cluster, 1 Fusionopolis Way,# 21-01 Connexis South Tower, Singapore 138632, Singapore
基金
新加坡国家研究基金会;
关键词
Forensics; Security; Network; Traffic; Regression; ANOMALY DETECTION;
D O I
10.1016/j.diin.2017.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Any machine exposed to the Internet today is at the risk of being attacked and compromised. Detecting attack attempts, be they successful or not, is important for securing networks (servers, end-hosts and other assets) as well as for forensic analysis. In this context, we focus on the problem of evidence gathering by detecting fundamental patterns in network traffic related to suspicious activities. Detecting fundamental anomalous patterns is necessary for a solution to be able to detect as many types of attacks and malicious activities as possible. Our evidence gathering framework correlates multiple patterns detected, thereby increasing the confidence of detection, and resulting in increase in accuracy and decrease in false positives. We demonstrate the effectiveness of our framework by evaluating on a dataset consisting of normal traffic as well as traffic from a number of malwares. (C) 2017 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S56 / S65
页数:10
相关论文
共 50 条
  • [31] On the Security of Image Manipulation Forensics
    Cao, Gang
    Wang, Yongbin
    Zhao, Yao
    Ni, Rongrong
    Lin, Chunyu
    ADVANCES IN MULTIMEDIA INFORMATION PROCESSING - PCM 2015, PT I, 2015, 9314 : 97 - 105
  • [32] It security forensics: Promises and shortcomings
    Malek, Manu
    ICE-B 2006: Proceedings of the International Conference on e-Business, 2006, : IS17 - IS17
  • [33] IT security forensics: Promises and shortcomings
    Malek, Manu
    WINSYS 2006: Proceedings of the International Conference on Wireless Information Networks and Systems, 2006, : IS17 - IS17
  • [34] Multimedia in Forensics, Security, and Intelligence
    Battiato, Sebastiano
    Emmanuel, Sabu
    Ulges, Adrian
    Worring, Marcel
    IEEE MULTIMEDIA, 2012, 19 (01) : 17 - 19
  • [35] Wi-Fi network signals as a source of digital evidence: Wireless network forensics
    Turnbull, B.
    Slay, J.
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1355 - 1360
  • [36] Currency security and forensics: a survey
    Chambers, J.
    Yan, W.
    Garhwal, A.
    Kankanhalli, M.
    MULTIMEDIA TOOLS AND APPLICATIONS, 2015, 74 (11) : 4013 - 4043
  • [37] Security: Expand nuclear forensics
    Klaus Mayer
    Nature, 2013, 503 : 461 - 462
  • [38] It security forensics: Promises and shortcomings
    Malek, Manu
    SIGMAP 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING AND MULTIMEDIA APPLICATIONS, 2006, : IS17 - IS17
  • [39] Research on Metaverse Security and Forensics
    Liang, Guangjun
    Xin, Jianfang
    Wang, Qun
    Ni, Xueli
    Guo, Xiangmin
    Chen, Pu
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 799 - 825
  • [40] IT security forensics: Promises and shortcomings
    Malek, Manu
    SECRYPT 2006: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2006, : IS17 - IS17