首页> 外文会议>International Workshop on Security in Information Systems >A Model Towards Using Evidence from Security Events for Network Attack Analysis
【24h】

A Model Towards Using Evidence from Security Events for Network Attack Analysis

机译:从安全事件中使用证据进行网络攻击分析的模型

获取原文

摘要

Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario and build an evidence graph. To achieve the accuracy and completeness of the evidence graph, we use Prolog inductive and abductive reasoning to correlate evidence by reasoning the causality, and use an anti-forensics database and a corresponding attack graph to find the missing evidence. In addition, because the constructed scenario and supplied evidence might need to stand up in the court of law, the federal rules of evidence are also taken into account to predetermine the admissibility of the evidence.
机译:从安全事件构建有效和准确的模型,以确定企业网络的攻击方案是具有挑战性的。在本文中,我们讨论如何使用从安全事件获得的证据来构建攻击方案并构建证据图。为了实现证据图的准确性和完整性,我们使用Prolog Incocuctive和Abductive推理来关联证据通过推理因果关系,并使用反对票数据库和相应的攻击图来查找缺失的证据。此外,由于建设的方案和提供的证据可能需要在法庭上站起来,因此也考虑到联邦证据规则,以预先确定证据的可否受理。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号