• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

Zhang, Yuqiang (Zhang, Yuqiang.) | He, Jingsha (He, Jingsha.) (学者:何泾沙) | Xu, Jing (Xu, Jing.)

收录:

CPCI-S Scopus

摘要:

Network forensics investigations aims to find a chain of evidences that helps reconstructing the alleged attack scenario. This often requires the check of timestamps of the logs to reconstruct the event. Yet, it is relatively easy for criminals to tamper with the event logs, which results in the evidence graph with falsified timestamps and hence hinders the event reconstruction. The aim of this work paper is to propose an algorithm detects these falsified timestamps and re-creates the true evidence graph. Our algorithm relies on attack graphs of the system environment which models known vulnerability sequences that were exploited to launch the attack. We demonstrate the effectiveness and performance of our algorithm via a possible attack scenario in a network environment running a file server and a database server.

关键词:

Attack graph Evidence graph Falsified timestamps Network forensic

作者机构:

  • [ 1 ] [Zhang, Yuqiang]Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
  • [ 2 ] [Xu, Jing]Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China
  • [ 3 ] [He, Jingsha]Beijing Univ Technol, Sch Software Engn, Beijing, Peoples R China

通讯作者信息:

  • [Zhang, Yuqiang]Beijing Univ Technol, Coll Comp Sci, Beijing 100124, Peoples R China

查看成果更多字段

相关关键词:

相关文章:

来源 :

2015 8TH INTERNATIONAL SYMPOSIUM ON COMPUTATIONAL INTELLIGENCE AND DESIGN (ISCID), VOL 2

ISSN: 2165-1701

年份: 2015

页码: 369-374

语种: 英文

被引次数:

WoS核心集被引频次: 1

SCOPUS被引频次: 1

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

在线人数/总访问数:847/2995835
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司