Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning

被引:4
|
作者
He, Jingsha [1 ,2 ]
Chang, Chengyue [1 ,2 ]
He, Peng [3 ]
Pathan, Muhammad Salman [1 ,2 ]
机构
[1] Beijing Univ Technol, Fac Informat Technol, Beijing 100124, Peoples R China
[2] Beijing Univ Technol, Beijing Engn Res Ctr IoT Software & Syst, Beijing 100124, Peoples R China
[3] China Three Gorges Univ, Coll Comp & Informat Technol, Yichang 443002, Peoples R China
来源
FUTURE INTERNET | 2016年 / 8卷 / 04期
基金
北京市自然科学基金; 中国国家自然科学基金;
关键词
network forensics; evidence graph; vulnerability reasoning; vulnerability evidence reasoning algorithm;
D O I
10.3390/fi8040054
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backtrack the network packets to find the original evidences. Our proposed method can reconstruct attack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] A Protocol Vulnerability Analysis Method Based on Logical Attack Graph
    Zhang, Chunrui
    Wang, Shen
    Zhan, Dechen
    ADVANCES IN INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, PT II, 2018, 82 : 309 - 317
  • [42] A Method to Construct Vulnerability Knowledge Graph based on Heterogeneous Data
    Sun, Yizhen
    Lin, Dandan
    Song, Hong
    Yan, Minjia
    Cao, Linjing
    2020 16TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING (MSN 2020), 2020, : 740 - 745
  • [43] Object detection by crossing relational reasoning based on graph neural network
    You, XiuTing
    Liu, He
    Wang, Tao
    Feng, Songhe
    Lang, Congyan
    MACHINE VISION AND APPLICATIONS, 2022, 33 (01)
  • [44] Research on the Knowledge Association Reasoning of Financial Reports Based on a Graph Network
    Liang, Zhuoqian
    Pan, Ding
    Deng, Yuan
    SUSTAINABILITY, 2020, 12 (07)
  • [45] Network security assessment using a semantic reasoning and graph based approach
    Wu, Songyang
    Zhang, Yong
    Cao, Wei
    COMPUTERS & ELECTRICAL ENGINEERING, 2017, 64 : 96 - 109
  • [46] Graph-based relational reasoning network for video question answering
    Tan, Tao
    Sun, Guanglu
    MACHINE VISION AND APPLICATIONS, 2025, 36 (01)
  • [47] Object detection by crossing relational reasoning based on graph neural network
    XiuTing You
    He Liu
    Tao Wang
    Songhe Feng
    Congyan Lang
    Machine Vision and Applications, 2022, 33
  • [48] Triple-based graph neural network for encoding event units in graph reasoning problems
    Tang, Hao
    Ji, Donghong
    Zhou, Qiji
    Information Sciences, 2021, 544 : 168 - 182
  • [49] Gated Tree-based Graph Attention Network (GTGAT) for medical knowledge graph reasoning
    Jiang, Jingchi
    Wang, Tao
    Wang, Boran
    Ma, Linjiang
    Guan, Yi
    ARTIFICIAL INTELLIGENCE IN MEDICINE, 2022, 130
  • [50] A multitype software buffer overflow vulnerability prediction method based on a software graph structure and a self-attentive graph neural network
    Zheng, Zhangqi
    Liu, Yongshan
    Zhang, Bing
    Liu, Xinqian
    He, Hongyan
    Gong, Xiang
    INFORMATION AND SOFTWARE TECHNOLOGY, 2023, 160