A Graph Based Approach Toward Network Forensics Analysis

被引:32
|
作者
Wang, Wei [1 ]
Daniels, Thomas E. [1 ]
机构
[1] Iowa State Univ, Dept Elect & Comp Engn, Ames, IA 50011 USA
关键词
Security; network forensics; evidence graph; hierarchical reasoning;
D O I
10.1145/1410234.1410238
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this article we develop a novel graph-based approach toward network forensics analysis. Central to our approach is the evidence graph model that facilitates evidence presentation and automated reasoning. Based on the evidence graph, we propose a hierarchical reasoning framework that consists of two levels. Local reasoning aims to infer the functional states of network entities from local observations. Global reasoning aims to identify important entities from the graph structure and extract groups of densely correlated participants in the attack scenario. This article also presents a framework for interactive hypothesis testing, which helps to identify the attacker's nonexplicit attack activities from secondary evidence. We developed a prototype system that implements the techniques discussed. Experimental results on various attack datasets demonstrate that our analysis mechanism achieves good coverage and accuracy in attack group and scenario extraction with less dependence on hard-coded expert knowledge.
引用
收藏
页数:33
相关论文
共 50 条
  • [1] Attack Graph Analysis for Network Anti-Forensics
    Chandran, Rahul
    Yan, Wei Q.
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2014, 6 (01) : 28 - 50
  • [2] Network Forensics Method Based on Evidence Graph and Vulnerability Reasoning
    He, Jingsha
    Chang, Chengyue
    He, Peng
    Pathan, Muhammad Salman
    FUTURE INTERNET, 2016, 8 (04):
  • [3] Network Security Approach for Digital Forensics Analysis
    Achi, H.
    Hellany, A.
    Nagrial, M.
    ICCES: 2008 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING & SYSTEMS, 2007, : 263 - 267
  • [4] A Graph-Based Approach for IP Network Analysis
    Velampalli, Sirisha
    Saxena, Ashutosh
    COMPUTING AND NETWORK SUSTAINABILITY, 2019, 75
  • [5] GRANEF: Utilization of a Graph Database for Network Forensics
    Cermak, Milan
    Sramkova, Denisa
    SECRYPT 2021: PROCEEDINGS OF THE 18TH INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2021, : 785 - 790
  • [6] Network forensics analysis
    Corey, V
    Peterman, C
    Shearin, S
    Greenberg, MS
    Van Bokkelen, J
    IEEE INTERNET COMPUTING, 2002, 6 (06) : 60 - 66
  • [7] An Email Forensics Analysis Method Based on Social Network Analysis
    Liu, YanHua
    Chen, GuoLong
    Xie, Lili
    2013 INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND BIG DATA (CLOUDCOM-ASIA), 2013, : 563 - 569
  • [8] Social Network Forensics Analysis Model Based on Network Representation Learning
    Zhao, Kuo
    Zhang, Huajian
    Li, Jiaxin
    Pan, Qifu
    Lai, Li
    Nie, Yike
    Zhang, Zhongfei
    ENTROPY, 2024, 26 (07)
  • [9] A Graph Neural Network-Based Approach to XANES Data Analysis
    Zhan, Fei
    Yao, Haodong
    Geng, Zhi
    Zheng, Lirong
    Yu, Can
    Han, Xue
    Song, Xueqi
    Chen, Shuguang
    Zhao, Haifeng
    JOURNAL OF PHYSICAL CHEMISTRY A, 2025, 129 (04): : 874 - 884
  • [10] An approach based on mixed hierarchical clustering and optimization for graph analysis in social media network: toward globally hierarchical community structure
    Radhia Toujani
    Jalel Akaichi
    Knowledge and Information Systems, 2019, 60 : 907 - 947