• 综合
  • 标题
  • 关键词
  • 摘要
  • 学者
  • 期刊-刊名
  • 期刊-ISSN
  • 会议名称
搜索

作者:

He, Jingsha (He, Jingsha.) (学者:何泾沙) | Chang, Chengyue (Chang, Chengyue.) | He, Peng (He, Peng.) | Pathan, Muhammad Salman (Pathan, Muhammad Salman.)

收录:

EI Scopus

摘要:

As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backt rack the network packets to find the original evidences. Our proposed method can reconstructattack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability. © 2016 by the authors.

关键词:

Computer crime Computer forensics Crime Digital forensics Graph algorithms Network security Personal computing

作者机构:

  • [ 1 ] [He, Jingsha]Faculty of Information Technology, Beijing Engineering Research Center for IoT Software and Systems, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Chang, Chengyue]Faculty of Information Technology, Beijing Engineering Research Center for IoT Software and Systems, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [He, Peng]College of Computer and Information Technology, China Three Gorges University, Yichang; 443002, China
  • [ 4 ] [Pathan, Muhammad Salman]Faculty of Information Technology, Beijing Engineering Research Center for IoT Software and Systems, Beijing University of Technology, Beijing; 100124, China

通讯作者信息:

  • [chang, chengyue]faculty of information technology, beijing engineering research center for iot software and systems, beijing university of technology, beijing; 100124, china

电子邮件地址:

查看成果更多字段

相关关键词:

相关文章:

来源 :

Future Internet

年份: 2016

期: 4

卷: 8

被引次数:

WoS核心集被引频次: 0

SCOPUS被引频次: 8

ESI高被引论文在榜: 0 展开所有

万方被引频次:

中文被引频次:

近30日浏览量: 2

归属院系:

在线人数/总访问数:1063/2990401
地址:北京工业大学图书馆(北京市朝阳区平乐园100号 邮编:100124) 联系我们:010-67392185
版权所有:北京工业大学图书馆 站点建设与维护:北京爱琴海乐之技术有限公司