首页> 外文会议>International Conference on Anti-Cyber Crimes >Data fusion visualization application for network forensic investigation - a case study
【24h】

Data fusion visualization application for network forensic investigation - a case study

机译:网络法医调查的数据融合与可视化应用 - 以案例研究

获取原文

摘要

Information Security field has seen a paradigm shift from a traditional silo approach to an integrated approach in collection, dissemination and analysis of structured and unstructured information for overall information protection and digital crime investigation goals. Digital crimes have become a big problem due to large number of data access, insufficient threat analysis techniques and growing size of storage capacity for investigating agencies. Since threat detection projects involve processing of large volume of uncertain information and to reduce uncertainties in the detection process, the analyst has to evaluate a large volume of data collected from different sources and network threat related databases. Being a data intensive analysis and detection, for improved analysis and detection, there is a need for these data to be harmonized and integrated along with the visualization technique for displaying large amount of data at once by incorporating information from various sources and variety of threat detection criteria's (e.g., threat types, attacker behavior and motive, effects of the threat on resources). Data Fusion and Integrated visualization of data distribution bars and rules, visualization of behavior and comprehensive analysis, maps allow investigating agencies to analyze different rules and data at different level, with any kind of anomaly. The primary aim of this study deals with have a front end or upstream approach towards an effective dynamic data fusion (DF)-based analysis and detection procedures along with visualization technique for network forensic investigation and threat analysis. Thus such procedures would be able to detect different network trends and patterns and integrate various intrusion datasets from different sources. As a practical approach, the model has been implemented in identification, analysis and detection for IP Spoofing as an illustrative example. The application in this study shows that this approach can increase the efficiency of forensic digital investigation by dynamic data integration and incorporation of existing intrusion detection system based information in the network threat investigation and analysis.
机译:信息安全领域已从传统的筒仓方法中看到范式转变,以集合,传播和分析结构化和非结构化信息的综合方法,了解整体信息保护和数字犯罪调查目标。由于大量数据访问,威胁分析技术不足,储存能力不足,数字犯罪已成为一个大问题。由于威胁检测项目涉及处理大量不确定信息并减少检测过程中的不确定性,分析师必须评估从不同来源和网络威胁相关数据库收集的大量数据。作为一种数据密集分析和检测,为了改善的分析和检测,需要通过结合各种来源和各种威胁检测的信息来统一和集成这些数据以及可视化技术,以及通过从各种来源和各种威胁检测的各种信息显示大量数据标准(例如,威胁类型,攻击者行为和动机,对资源威胁的影响)。数据融合和数据分发栏和规则的集成可视化,行为可视化和综合分析,地图允许调查机构分析不同水平的不同规则和数据,任何类型的异常。该研究的主要目的涉及具有前端或上游方法,朝着基于有效的动态数据融合(DF)的分析和检测程序以及网络法医调查和威胁分析的可视化技术。因此,这种过程能够检测不同的网络趋势和模式,并集成来自不同来源的各种入侵数据集。作为一种实用方法,该模型已经在IP欺骗的识别,分析和检测中实现,作为说明性示例。本研究中的应用表明,这种方法可以通过动态数据集成以及在网络威胁调查和分析中加入现有的入侵检测系统的现有入侵检测系统的法医数字调查效率。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号