DocumentCode :
1727394
Title :
Using Attack Graphs in Forensic Examinations
Author :
Liu, Changwei ; Singhal, Anoop ; Wijesekera, Duminda
Author_Institution :
Dept. of Comput. Sci., George Mason Univ., Fairfax, VA, USA
fYear :
2012
Firstpage :
596
Lastpage :
603
Abstract :
Attack graphs are used to compute potential attackpaths from a system configuration and known vulnerabilities of asystem. Attack graphs can be used to eliminate knownvulnerability sequences that can be eliminated to make attacksdifficult and help forensic examiners in identifying manypotential attack paths. After an attack happens, forensic analysis, including linking evidence with attacks, helps further understandand refine the attack scenario that was launched. Given thatthere are anti-forensic tools that can obfuscate, minimize oreliminate attack footprints, forensic analysis becomes harder. Asa solution, we propose to apply attack graph to forensic analysis. We do so by including anti-forensic capabilities into attackgraphs, so that the missing evidence can be explained by usinglonger attack paths that erase potential evidence. We show thiscapability in an explicit case study involving a database attack.
Keywords :
computer forensics; graph theory; antiforensic tools; attack footprints; attack graphs; attack paths; database attack; forensic analysis; forensic examinations; system configuration; system vulnerability; Databases; Forensics; Internet; Servers; Workstations; anti-forensics; anti-forensics vulnerability database; attack graph; forensic analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Availability, Reliability and Security (ARES), 2012 Seventh International Conference on
Conference_Location :
Prague
Print_ISBN :
978-1-4673-2244-7
Type :
conf
DOI :
10.1109/ARES.2012.58
Filename :
6329236
Link To Document :
بازگشت