loading
Documents

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Changwei Liu 1 ; Anoop Singhal 2 and Duminda Wijesekera 3

Affiliations: 1 Geroge Mason University, United States ; 2 National Institute of Standards and Technology, United States ; 3 George Mason University, United States

ISBN: 978-989-758-031-4

Keyword(s): Network Forensics, Anti-forensics, Evidence Graph, Attack Graph, Inductive Reasoning, Abductive Reasoning, Admissibility.

Abstract: Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario and build an evidence graph. To achieve the accuracy and completeness of the evidence graph, we use Prolog inductive and abductive reasoning to correlate evidence by reasoning the causality, and use an anti-forensics database and a corresponding attack graph to find the missing evidence. In addition, because the constructed scenario and supplied evidence might need to stand up in the court of law, the federal rules of evidence are also taken into account to predetermine the admissibility of the evidence.

PDF ImageFull Text

Download
Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.234.66.217

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Liu C., Singhal A. and Wijesekera D. (2014). A Model Towards Using Evidence from Security Events for Network Attack Analysis.In Proceedings of the 11th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2014) ISBN 978-989-758-031-4, pages 83-95. DOI: 10.5220/0004980300830095

@conference{wosis14,
author={Changwei Liu and Anoop Singhal and Duminda Wijesekera},
title={A Model Towards Using Evidence from Security Events for Network Attack Analysis},
booktitle={Proceedings of the 11th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2014)},
year={2014},
pages={83-95},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0004980300830095},
isbn={978-989-758-031-4},
}

TY - CONF

JO - Proceedings of the 11th International Workshop on Security in Information Systems - Volume 1: WOSIS, (ICEIS 2014)
TI - A Model Towards Using Evidence from Security Events for Network Attack Analysis
SN - 978-989-758-031-4
AU - Liu C.
AU - Singhal A.
AU - Wijesekera D.
PY - 2014
SP - 83
EP - 95
DO - 10.5220/0004980300830095

Login or register to post comments.

Comments on this Paper: Be the first to review this paper.