Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

被引:4
|
作者
He, Jingsha [1 ,2 ]
Chang, Chengyue [1 ,2 ]
He, Peng [3 ]
Pathan, Muhammad Salman [1 ,2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Technol, Beijing Engn Res Ctr IoT Software & Syst, Beijing 100124, Peoples R China
[3] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
来源
FUTURE INTERNET | 2016年 / 8卷 / 04期
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
network forensics; evidence graph; vulnerability reasoning; vulnerability evidence reasoning algorithm;
D O I
10.3390/fi8040054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.
引用
收藏
页数:18
相关论文
共 50 条
  • [21] GRANEF: Utilization of a Graph Database for Network Forensics
    Cermak, Milan
    Sramkova, Denisa
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 785 - 790
  • [22] Poster: A Logic Based Network Forensics Model for Evidence Analysis
    Singhal, Anoop
    Liu, Changwei
    Wijesekera, Duminda
    CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, : 1677 - 1677
  • [23] A Graph Neural Network-Based Smart Contract Vulnerability Detection Method with Artificial Rule
    Wei, Ziyue
    Zheng, Weining
    Su, Xiaohong
    Tao, Wenxin
    Wang, Tiantian
    ARTIFICIAL NEURAL NETWORKS AND MACHINE LEARNING, ICANN 2023, PT IV, 2023, 14257 : 241 - 252
  • [24] Vulnerability Mining Method Based on Program Feature Graph
    Sun, Ruihan
    Zhuang, Yi
    2024 5TH INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND APPLICATION, ICCEA 2024, 2024, : 187 - 192
  • [25] Graph-based Global Reasoning Network for Crowd Counting
    Wang, Li
    Zhao, Huailin
    Nie, Zhen
    Li, Yaoyao
    PROCEEDINGS OF THE 2020 INTERNATIONAL CONFERENCE ON ARTIFICIAL LIFE AND ROBOTICS (ICAROB2020), 2020, : 611 - 615
  • [26] A graph-based system for network-vulnerability analysis
    Phillips, C
    Swiler, LP
    NEW SECURITY PARADIGMS WOEKSHOP, PROCEEDINGS, 1999, : 71 - 79
  • [27] A Graph-Based Model for Transmission Network Vulnerability Analysis
    Yang, Shenhao
    Chen, Weirong
    Zhang, Xuexia
    Liang, Chenguang
    Wang, Haifeng
    Cui, Wei
    IEEE SYSTEMS JOURNAL, 2020, 14 (01): : 1447 - 1456
  • [28] AdaProp: Learning Adaptive Propagation for Graph Neural Network based Knowledge Graph Reasoning
    Zhang, Yongqi
    Zhou, Zhanke
    Yao, Quanming
    Chu, Xiaowen
    Han, Bo
    PROCEEDINGS OF THE 29TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, KDD 2023, 2023, : 3446 - 3457
  • [29] Evidence gathering for network security and forensics
    Divakaran, Dinil Mon
    Fok, Kar Wai
    Nevat, Ido
    Thing, Vrizlynn L. L.
    DIGITAL INVESTIGATION, 2017, 20 : S56 - S65
  • [30] Graph Intention Neural Network for Knowledge Graph Reasoning
    Jiang, Weihao
    Fu, Yao
    Zhao, Hong
    Wan, Junhong
    Pu, Shiliang
    2022 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN), 2022,