• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Chang, Cheng-Yue (Chang, Cheng-Yue.) | He, Jing-Sha (He, Jing-Sha.) (学者:何泾沙)

收录:

CPCI-S

摘要:

In this article, we propose a novel method that uses vulnerability evidence reasoning in network forensics analysis. Central to our method is the evidence graph model to support evidence presentation and reasoning. Based on the evidence graph, we propose a network forensics method that built the evidence graph on the basis of the network system vulnerabilities and environmental information. At the same time, the proposed method can realize the reconstruction of attack scenarios with high efficiency and with the capability of identifying multi-staged at-tacks through evidence reasoning. Results of the experiment that we conducted would show that the proposed method is complete and credible with certain reasoning ability, which can be a powerful tool for rapid and effective network forensic analysis.

关键词:

event vector evidence graph network forensics vulnerability evidence reasoning

作者机构:

  • [ 1 ] [Chang, Cheng-Yue]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China
  • [ 2 ] [Chang, Cheng-Yue]Beijing Univ Technol, Beijing Engn Res Ctr IoT Software & Syst, Beijing 100124, Peoples R China

通讯作者信息:

  • [Chang, Cheng-Yue]Beijing Univ Technol, Sch Software Engn, Beijing 100124, Peoples R China

查看成果更多字段

相关关键词:

来源 :

PROCEEDINGS OF THE 2016 INTERNATIONAL CONFERENCE ON COMPUTER ENGINEERING AND INFORMATION SYSTEMS

ISSN: 2352-538X

年份: 2016

卷: 52

页码: 245-249

语种: 英文

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次:

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

在线人数/总访问数:837/2992899
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司