首页> 外文会议>International Symposium on Digital Forensics and Security >A four-step method for investigating network worm propagation
【24h】

A four-step method for investigating network worm propagation

机译:一种调查网络蠕虫传播的四步方法

获取原文

摘要

Worm origin identification and propagation path reconstruction are important topics in information security and digital forensics. This information helps forensic investigators to guess initial suspects and do further investigations on the suspicious computers. Network and system administrators also use the information to identify security weaknesses of their systems and networks. The goal of this paper is to identify the origins and to reconstruct the propagation path of preferential scanning worm back-in-time. The main idea of this paper is to use back-to-origin modeling and a step-by-step improvement, to identify the origins and to reconstruct the propagation path after the worm outbreak using information gathered over the network. We construct a probabilistic model to receive features over the network and estimate infection status of nodes. We also developed an algorithm that identifies the origins and reconstructs the propagation path, back-in-time using the learned model. In order to achieve this, we used a 4-step method. The proposed method has acceptable accuracy.
机译:蠕虫来源识别和传播路径重建是信息安全和数字取证的重要主题。此信息可帮助取消调查人员猜测初始嫌疑人,并进一步调查可疑计算机。网络和系统管理员还使用该信息来识别其系统和网络的安全弱点。本文的目标是识别起源并重建优先扫描蠕虫的传播路径。本文的主要思想是使用返回原因建模和逐步改进,以识别起源并在使用通过网络上收集的信息进行蠕虫爆发后重建传播路径。我们构建一个概率模型,以接收网络上的特征并估计节点的感染状态。我们还开发了一种算法,该算法标识起源并使用学习模型重新计算传播路径,回溯。为了实现这一目标,我们使用了4步方法。该方法具有可接受的准确性。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号