Evidence gathering for network security and forensics

被引:12
|
作者
Divakaran, Dinil Mon [1 ]
Fok, Kar Wai [1 ]
Nevat, Ido [1 ]
Thing, Vrizlynn L. L. [1 ]
机构
[1] ASTAR Inst Infocomm Res I2R, Cyber Secur Cluster, 1 Fusionopolis Way,# 21-01 Connexis South Tower, Singapore 138632, Singapore
基金
新加坡国家研究基金会;
关键词
Forensics; Security; Network; Traffic; Regression; ANOMALY DETECTION;
D O I
10.1016/j.diin.2017.02.001
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Any machine exposed to the Internet today is at the risk of being attacked and compromised. Detecting attack attempts, be they successful or not, is important for securing networks (servers, end-hosts and other assets) as well as for forensic analysis. In this context, we focus on the problem of evidence gathering by detecting fundamental patterns in network traffic related to suspicious activities. Detecting fundamental anomalous patterns is necessary for a solution to be able to detect as many types of attacks and malicious activities as possible. Our evidence gathering framework correlates multiple patterns detected, thereby increasing the confidence of detection, and resulting in increase in accuracy and decrease in false positives. We demonstrate the effectiveness of our framework by evaluating on a dataset consisting of normal traffic as well as traffic from a number of malwares. (C) 2017 The Author(s). Published by Elsevier Ltd on behalf of DFRWS.
引用
收藏
页码:S56 / S65
页数:10
相关论文
共 50 条
  • [41] Currency security and forensics: a survey
    J. Chambers
    W. Yan
    A. Garhwal
    M. Kankanhalli
    Multimedia Tools and Applications, 2015, 74 : 4013 - 4043
  • [42] The role of effective connectivity between the task-positive and task-negative network for evidence gathering [Evidence gathering and connectivity]
    Andreou, Christina
    Steinmann, Saskia
    Kolbeck, Katharina
    Rauh, Jonas
    Leicht, Gregor
    Moritz, Steffen
    Mulert, Christoph
    NEUROIMAGE, 2018, 173 : 49 - 56
  • [43] Gathering Evidence
    Hughes, Caoillinn
    POETRY WALES, 2013, 49 (03): : 23 - 23
  • [44] GATHERING EVIDENCE
    Montefiore, Jan
    TLS-THE TIMES LITERARY SUPPLEMENT, 2015, (5853): : 25 - 25
  • [45] Gathering Evidence
    Ings, Simon
    NEW SCIENTIST, 2023, 246 (3443) : 30 - 30
  • [46] F-IDS: A Technique for Simplifying Evidence Collection in Network Forensics
    Saari, Eviyanti
    Jantan, Aman
    SOFTWARE ENGINEERING AND COMPUTER SYSTEMS, PT 3, 2011, 181 : 693 - 701
  • [47] A framework for cloud forensics evidence collection and analysis using security information and event management
    Irfan, Muhammad
    Abbas, Haider
    Sun, Yunchuan
    Sajid, Anam
    Pasha, Maruf
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (16) : 3790 - 3807
  • [48] 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - Computer Network Forensics Research Workshop 2005 "Defining network forensics"
    2005 Workshop of the 1st Intl Conference on Security and Privacy for Emerging Areas in Communication Networks - SECURECOMM, 2005, : 1 - 1
  • [49] Cloud Security: A Gathering Storm
    Nanavati, Mihir
    Colp, Patrick
    Aiello, Bill
    Warfield, Andrew
    COMMUNICATIONS OF THE ACM, 2014, 57 (05) : 69 - 79
  • [50] Challenges in Network forensics
    Buric, J.
    Delija, D.
    2015 8TH INTERNATIONAL CONVENTION ON INFORMATION AND COMMUNICATION TECHNOLOGY, ELECTRONICS AND MICROELECTRONICS (MIPRO), 2015, : 1382 - 1386