首页> 外文学位 >A graph oriented approach for network forensic analysis.
【24h】

A graph oriented approach for network forensic analysis.

机译:网络取证分析的一种面向图形的方法。

获取原文
获取原文并翻译 | 示例

摘要

Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex multi-stage intrusions.;This dissertation presents a novel graph based network forensic analysis system. The evidence graph model provides an intuitive representation of collected evidence as well as the foundation for forensic analysis. Based on the evidence graph, we develop a set of analysis components in a hierarchical reasoning framework. Local reasoning utilizes fuzzy inference to infer the functional states of an host level entity from its local observations. Global reasoning performs graph structure analysis to identify the set of highly correlated hosts that belong to the coordinated attack scenario. In global reasoning, we apply spectral clustering and Pagerank methods for generic and targeted investigation respectively. An interactive hypothesis testing procedure is developed to identify "hidden attackers" from non-explicit-malicious evidence. Finally, we introduce the notion of target-oriented effective event sequence(TOEES) to semantically reconstruct stealthy attack scenarios with less dependency on ad-hoc expert knowledge. Well established computation methods used in our approach provide the scalability needed to perform post-incident analysis in large networks. We evaluate the techniques with a number of intrusion detection datasets and the experiment results show that our approach is effective in identifying complex multi-stage attacks.
机译:网络取证分析是对从网络环境中捕获的入侵证据进行分析以识别可疑实体和攻击场景中的逐步措施的过程。不幸的是,安全传感器的大量输出和低质量的输出使分析人员难以获得对复杂的多阶段入侵的简洁的高级视图。;本文提出了一种基于图的新型网络取证分析系统。证据图模型提供了收集到的证据的直观表示以及法医分析的基础。基于证据图,我们在层次推理框架中开发了一组分析组件。局部推理利用模糊推理从其本地观测值推断主机级别实体的功能状态。全局推理执行图结构分析,以识别属于协同攻击场景的高度相关的主机集。在全局推理中,我们分别将频谱聚类和Pagerank方法应用于一般研究和目标研究。开发了一种交互式的假设测试程序,以从非明确的恶意证据中识别“隐藏的攻击者”。最后,我们引入了面向目标的有效事件序列(TOEES)的概念,以语义方式重建隐身攻击场景,而对临时专家知识的依赖性较小。我们的方法中使用的完善的计算方法提供了在大型网络中执行事后分析所需的可伸缩性。我们使用大量入侵检测数据集评估了该技术,实验结果表明我们的方法可以有效地识别复杂的多阶段攻击。

著录项

  • 作者

    Wang, Wei.;

  • 作者单位

    Iowa State University.;

  • 授予单位 Iowa State University.;
  • 学科 Engineering Computer.;Information Technology.
  • 学位 Ph.D.
  • 年度 2010
  • 页码 122 p.
  • 总页数 122
  • 原文格式 PDF
  • 正文语种 eng
  • 中图分类
  • 关键词

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号