A Logic-Based Network Forensic Model for Evidence Analysis

نویسندگان

  • Changwei Liu
  • Anoop Singhal
  • Duminda Wijesekera
چکیده

Modern-day attackers tend to use sophisticated multi-stage/multi-host attack techniques and anti-forensics tools to cover their attack traces. Due to the limitations of current intrusion detection and forensic anal­ ysis tools, reconstructing attack scenarios from evidence left behind by the attackers of an enterprise system is challenging. In particular, re­ constructing attack scenarios by using intrusion detection system (IDS) alerts and system logs that have too many false positives is a big chal­ lenge. In this paper, we present a model and an accompanying software tool that systematically addresses how to resolve the above problems to reconstruct attack scenarios that could stand up in court. These prob­ lems include a large amount of data including non-relevant data, missing evidence and incomplete evidence destroyed by using anti-forensic tech­ niques. Our system is based on a Prolog system using known vulnera­ bility databases and an anti-forensic database that we plan to extend to a standardized database like the existing NIST National Vulnerability Database (NVD). In this model, we use different methods, including mapping the evi­ dence to system vulnerabilities, inductive reasoning and abductive rea­ soning, to reconstruct attack scenarios. The goal of this work is to reduce the security investigators’ time and effort in reaching definite conclusion about how an attack occurred. Our results indicate that such a reasoning system can be useful for network forensics analysis.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Risk Analysis of Operating Room Using the Fuzzy Bayesian Network Model

To enhance Patient’s safety, we need effective methods for risk management. This work aims to propose an integrated approach to risk management for a hospital system. To improve patient’s safety, we should develop flexible methods where different aspects of risk and type of information are taken into consideration. This paper proposes a fuzzy Bayesian network to model and analyze risk in the op...

متن کامل

UAV attitude Sensor Fault Detection Based On Fuzzy Logic and by Neural Network Model Identification

Fault detection has always been important in aviation systems to prevent many accidents. This process is possible in different ways. In this paper, we first identify the longitudinal axis plane model using neural network approach. Then based on the obtained model and using fuzzy logic, the aircraft status sensor fault detection unit was designed. The simulation results show that the fault detec...

متن کامل

Dynamic Analysis and Optimal Design of FLPSS for Power Network Connected Solid Oxide Fuel Cell Using of PSO

This paper studies the theory and modeling manner of solid oxide fuel cell (SOFC) into power network and its effect on small signal stability. The paper demonstrates the fundamental module, mathematical analysis and small signal modeling of the SOFC connected to single machine infinite bus (SMIB) system. The basic contribution of the study is to attenuate the low frequency oscillations by optim...

متن کامل

Knowledge Representation and Reasoning Based on Logical Formalism for Forensic Evidence Analysis

─Proficiency in decision making is a very important aspect in forensic investigation. Computational intelligence is one of the methods that support the investigation for assisting decision making process. This paper discusses about representing knowledge using logic scheme, it has been developed using Prolog as one of the logic programming language. In order to facilitate forensic evidence anal...

متن کامل

Analyzing Multiple Logs for Forensic Evidence

Information stored in logs of a computer system is of crucial importance to gather forensic evidence of investigated actions or attacks. Analysis of this information should be rigorous and credible, hence it lends itself to formal methods. We propose a model checking approach to the formalization of the forensic analysis of logs. A set of logs is modeled as a tree whose labels are events extrac...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2015