Creating Integrated Evidence Graphs for Network Forensics

作者: Changwei Liu , Anoop Singhal , Duminda Wijesekera

DOI: 10.1007/978-3-642-41148-9_16

关键词:

摘要: Probabilistic evidence graphs can be used to model network intrusion and the underlying dependencies support forensic analysis. The provide a means for linking probabilities associated with different attack paths available evidence. However, current work focused on assumes that all expressed using single, small graph. This paper presents an algorithm merging or without corresponding application of file server database scenario yields integrated graph shows global scope attack. provides broader context better understandability than multiple local graphs.

参考文章(12)
Vaibhav Mehta, Constantinos Bartzis, Haifeng Zhu, Edmund Clarke, Jeannette Wing, Ranking Attack Graphs Lecture Notes in Computer Science. pp. 127- 144 ,(2006) , 10.1007/11856214_7
Lingyu Wang, Tania Islam, Tao Long, Anoop Singhal, Sushil Jajodia, An Attack Graph-Based Probabilistic Security Metric Proceeedings of the 22nd annual IFIP WG 11.3 working conference on Data and Applications Security. ,vol. 5094, pp. 283- 296 ,(2008) , 10.1007/978-3-540-70567-3_22
John Homer, Ashok Varikuti, Xinming Ou, Miles A. McQueen, Improving Attack Graph Visualization through Data Reduction and Attack Grouping visualization for computer security. pp. 68- 79 ,(2008) , 10.1007/978-3-540-85933-8_7
Wei Wang, Thomas E. Daniels, A Graph Based Approach Toward Network Forensics Analysis ACM Transactions on Information and System Security. ,vol. 12, pp. 1- 33 ,(2008) , 10.1145/1410234.1410238
Paul Ammann, Duminda Wijesekera, Saket Kaushik, Scalable, graph-based network vulnerability analysis Proceedings of the 9th ACM conference on Computer and communications security - CCS '02. pp. 217- 224 ,(2002) , 10.1145/586110.586140
Kyle Ingols, Richard Lippmann, Keith Piwowarski, Practical Attack Graph Generation for Network Defense annual computer security applications conference. pp. 121- 130 ,(2006) , 10.1109/ACSAC.2006.39
Xinming Ou, Wayne F Boyer, Miles A McQueen, A scalable approach to attack graph generation Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 336- 345 ,(2006) , 10.1145/1180405.1180446
O. Sheyner, J. Haines, S. Jha, R. Lippmann, J.M. Wing, Automated generation and analysis of attack graphs ieee symposium on security and privacy. pp. 273- 284 ,(2002) , 10.1109/SECPRI.2002.1004377
S. Jha, O. Sheyner, J. Wing, Two formal analyses of attack graphs ieee computer security foundations symposium. pp. 49- 63 ,(2002) , 10.1109/CSFW.2002.1021806
Changwei Liu, Anoop Singhal, Duminda Wijesekera, Mapping evidence graphs to attack graphs international workshop on information forensics and security. pp. 121- 126 ,(2012) , 10.1109/WIFS.2012.6412636