• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
搜索

Author:

He, Jingsha (He, Jingsha.) (Scholars:何泾沙) | Chang, Chengyue (Chang, Chengyue.) | He, Peng (He, Peng.) | Pathan, Muhammad Salman (Pathan, Muhammad Salman.)

Indexed by:

EI Scopus

Abstract:

As the Internet becomes larger in scale, more complex in structure and more diversified in traffic, the number of crimes that utilize computer technologies is also increasing at a phenomenal rate. To react to the increasing number of computer crimes, the field of computer and network forensics has emerged. The general purpose of network forensics is to find malicious users or activities by gathering and dissecting firm evidences about computer crimes, e.g., hacking. However, due to the large volume of Internet traffic, not all the traffic captured and analyzed is valuable for investigation or confirmation. After analyzing some existing network forensics methods to identify common shortcomings, we propose in this paper a new network forensics method that uses a combination of network vulnerability and network evidence graph. In our proposed method, we use vulnerability evidence and reasoning algorithm to reconstruct attack scenarios and then backt rack the network packets to find the original evidences. Our proposed method can reconstructattack scenarios effectively and then identify multi-staged attacks through evidential reasoning. Results of experiments show that the evidence graph constructed using our method is more complete and credible while possessing the reasoning capability. © 2016 by the authors.

Keyword:

Digital forensics Computer crime Computer forensics Graph algorithms Crime Personal computing Network security

Author Community:

  • [ 1 ] [He, Jingsha]Faculty of Information Technology, Beijing Engineering Research Center for IoT Software and Systems, Beijing University of Technology, Beijing; 100124, China
  • [ 2 ] [Chang, Chengyue]Faculty of Information Technology, Beijing Engineering Research Center for IoT Software and Systems, Beijing University of Technology, Beijing; 100124, China
  • [ 3 ] [He, Peng]College of Computer and Information Technology, China Three Gorges University, Yichang; 443002, China
  • [ 4 ] [Pathan, Muhammad Salman]Faculty of Information Technology, Beijing Engineering Research Center for IoT Software and Systems, Beijing University of Technology, Beijing; 100124, China

Reprint Author's Address:

  • [chang, chengyue]faculty of information technology, beijing engineering research center for iot software and systems, beijing university of technology, beijing; 100124, china

Show more details

Related Keywords:

Related Article:

Source :

Future Internet

Year: 2016

Issue: 4

Volume: 8

Cited Count:

WoS CC Cited Count:

SCOPUS Cited Count: 11

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 6

Online/Total:1142/10634620
Address:BJUT Library(100 Pingleyuan,Chaoyang District,Beijing 100124, China Post Code:100124) Contact Us:010-67392185
Copyright:BJUT Library Technical Support:Beijing Aegean Software Co., Ltd.