首页> 外文OA文献 >A graph oriented approach for network forensic analysis
【2h】

A graph oriented approach for network forensic analysis

机译:网络取证分析的面向图的方法

代理获取
本网站仅为用户提供外文OA文献查询和代理获取服务,本网站没有原文。下单后我们将采用程序或人工为您竭诚获取高质量的原文,但由于OA文献来源多样且变更频繁,仍可能出现获取不到、文献不完整或与标题不符等情况,如果获取不到我们将提供退款服务。请知悉。

摘要

Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex multi-stage intrusions.This dissertation presents a novel graph based network forensic analysis system. The evidence graph model provides an intuitive representation of collected evidence as well as the foundation for forensic analysis. Based on the evidence graph, we develop a set of analysis components in a hierarchical reasoning framework. Local reasoning utilizes fuzzy inference to infer the functional states of an host level entity from its local observations. Global reasoning performs graph structure analysis to identify the set of highly correlated hosts that belong to the coordinated attack scenario. In global reasoning, we apply spectral clustering and Pagerank methods for generic and targeted investigationrespectively. An interactive hypothesis testing procedure is developed to identify \u22hidden attackers\u22 from non-explicit-malicious evidence. Finally, we introduce the notion of target-oriented effective event sequence (TOEES) to semantically reconstruct stealthy attack scenarios with less dependency on ad-hoc expert knowledge. Well established computation methods used in our approach provide the scalability needed to performpost-incident analysis in large networks. We evaluate the techniques with a number of intrusion detection datasets and the experiment results show that our approach is effective in identifying complex multi-stage attacks.
机译:网络取证分析是对从网络环境中捕获的入侵证据进行分析以识别可疑实体和攻击场景中的逐步措施的过程。不幸的是,安全传感器的大量输出和低质量的输出使分析人员难以获得对复杂的多阶段入侵的简洁的高级视图。本文提出了一种基于图的新型网络取证分析系统。证据图模型提供了收集到的证据的直观表示以及法医分析的基础。基于证据图,我们在层次推理框架中开发了一组分析组件。局部推理利用模糊推理从其本地观测值推断主机级别实体的功能状态。全局推理执行图结构分析,以识别属于协同攻击场景的高度相关的主机集。在全局推理中,我们分别将谱聚类和Pagerank方法应用于一般研究和目标研究。开发了一种交互式假设测试程序,以从非明确的恶意证据中识别出“隐藏的攻击者”。最后,我们介绍了面向目标的有效事件序列(TOEES)的概念,以语义方式重建隐身攻击场景,而对临时专家知识的依赖性则较小。我们的方法中使用的完善的计算方法提供了在大型网络中执行事后分析所需的可伸缩性。我们使用大量入侵检测数据集评估了该技术,实验结果表明我们的方法可以有效地识别复杂的多阶段攻击。

著录项

  • 作者

    Wang, Wei;

  • 作者单位
  • 年度 2010
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利
代理获取

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号