Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

被引:4
|
作者
He, Jingsha [1 ,2 ]
Chang, Chengyue [1 ,2 ]
He, Peng [3 ]
Pathan, Muhammad Salman [1 ,2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Technol, Beijing Engn Res Ctr IoT Software & Syst, Beijing 100124, Peoples R China
[3] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
来源
FUTURE INTERNET | 2016年 / 8卷 / 04期
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
network forensics; evidence graph; vulnerability reasoning; vulnerability evidence reasoning algorithm;
D O I
10.3390/fi8040054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] A variable scale case-based reasoning method for evidence location in digital forensics
    Wang, Ai
    Gao, Xuedong
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2021, 122 : 209 - 219
  • [2] Network Forensic Analysis via Vulnerability Evidence Reasoning
    Chang, Cheng-Yue
    He, Jing-Sha
    PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND INFORMATION SYSTEMS, 2016, 52 : 245 - 249
  • [3] A novel network risk assessment method based on vulnerability correlation graph
    Liu Guqing
    Wang Xintong
    Yang Jungang
    Kang Jie
    2014 IEEE WORKSHOP ON ELECTRONICS, COMPUTER AND APPLICATIONS, 2014, : 31 - 34
  • [4] A Graph Based Approach Toward Network Forensics Analysis
    Wang, Wei
    Daniels, Thomas E.
    ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 12 (01)
  • [5] Vulnerability Analysis Method of Network Routing Mechanism based on Knowledge Graph Vulnerability Analysis and Reinforcement Verification Mechanism of Network Routing Mechanism based on Knowledge Graph
    Zhang, Yu
    Zhuang, Yi
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CYBER SECURITY, ARTIFICIAL INTELLIGENCE AND DIGITAL ECONOMY, CSAIDE 2024, 2024, : 39 - 43
  • [6] GRAPH-BASED KINSHIP REASONING NETWORK
    Li, Wanhua
    Zhang, Yingqiang
    Lv, Kangchen
    Lu, Jiwen
    Feng, Jianjiang
    Zhou, Jie
    2020 IEEE INTERNATIONAL CONFERENCE ON MULTIMEDIA AND EXPO (ICME), 2020,
  • [7] A Novel Cascading Faults Graph Based Transmission Network Vulnerability Assessment Method
    Wei, Xiaoguang
    Zhao, Junbo
    Huang, Tao
    Bompard, Ettore
    IEEE TRANSACTIONS ON POWER SYSTEMS, 2018, 33 (03) : 2995 - 3000
  • [8] Novel Method of Assessing Network Security Risks Based on Vulnerability Correlation Graph
    Liang, Li
    Yang, Jungang
    Liu, Guqing
    Zhu, Guangliang
    Yang, Yanfeng
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 1085 - 1090
  • [9] Network Vulnerability Assessment based on Attack Graph
    Wang Huan
    Zhao Jianping
    Liu Dan
    Li Bo
    2017 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS, ELECTRONICS AND CONTROL (ICCSEC), 2017, : 542 - 545
  • [10] Double Graph Attention Network Reasoning Method Based on Filtering and Program-Like Evidence for Table-Based Fact Verification
    Gong, Hongfang
    Wang, Can
    Huang, Xiaofei
    IEEE ACCESS, 2023, 11 : 86859 - 86871