Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

被引:4
|
作者
He, Jingsha [1 ,2 ]
Chang, Chengyue [1 ,2 ]
He, Peng [3 ]
Pathan, Muhammad Salman [1 ,2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Technol, Beijing Engn Res Ctr IoT Software & Syst, Beijing 100124, Peoples R China
[3] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
来源
FUTURE INTERNET | 2016年 / 8卷 / 04期
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
network forensics; evidence graph; vulnerability reasoning; vulnerability evidence reasoning algorithm;
D O I
10.3390/fi8040054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.
引用
收藏
页数:18
相关论文
共 50 条
  • [31] A method of network forensics analysis based on frequent sequence mining
    Zhong Xiu-yu
    INTELLIGENT STRUCTURE AND VIBRATION CONTROL, PTS 1 AND 2, 2011, 50-51 : 578 - 582
  • [32] ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention
    Li, Min
    Li, Chunfang
    Li, Shuailou
    Wu, Yanna
    Zhang, Boyang
    Wen, Yu
    INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2021), PT I, 2021, 12918 : 243 - 259
  • [33] An Uncertainty Reasoning Method Based On Evidence Theory
    He, Yan
    Xiong, Caiquan
    Zhan, Yifan
    2013 NINTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION (ICNC), 2013, : 1021 - 1025
  • [34] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [35] A Clustering-Based Evidence Reasoning Method
    Li, Xinde
    Wang, Fengyu
    INTERNATIONAL JOURNAL OF INTELLIGENT SYSTEMS, 2016, 31 (07) : 698 - 721
  • [36] An Email Forensics Analysis Method Based on Social Network Analysis
    Liu, YanHua
    Chen, GuoLong
    Xie, Lili
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 563 - 569
  • [37] BinVuGAL: Binary vulnerability detection method based on graph neural network combined with assembly language model
    Song, Zhihui
    Xu, Jinchen
    PROCEEDINGS OF 2024 3RD INTERNATIONAL CONFERENCE ON CRYPTOGRAPHY, NETWORK SECURITY AND COMMUNICATION TECHNOLOGY, CNSCT 2024, 2024, : 159 - 163
  • [38] An entity-graph based reasoning method for fact verification
    Chen, Chonghao
    Cai, Fei
    Hu, Xuejun
    Zheng, Jianming
    Ling, Yanxiang
    Chen, Honghui
    INFORMATION PROCESSING & MANAGEMENT, 2021, 58 (03)
  • [39] Method based on GSCPN for network vulnerability analysis
    Gao, Xiang
    Zhu, Yue-Fei
    Fei, Jin-Long
    Han, Tao
    Journal of Software, 2013, 8 (08) : 2032 - 2038
  • [40] GEAR: Graph-based Evidence Aggregating and Reasoning for Fact Verification
    Zhou, Jie
    Han, Xu
    Yang, Cheng
    Liu, Zhiyuan
    Wang, Lifeng
    Li, Changcheng
    Sun, Maosong
    57TH ANNUAL MEETING OF THE ASSOCIATION FOR COMPUTATIONAL LINGUISTICS (ACL 2019), 2019, : 892 - 901