DocumentCode :
263871
Title :
An evidential network forensics analysis model with adversarial capability and layering
Author :
Amran, Ahmad Roshidi ; Saad, Ahmed
Author_Institution :
British Malaysian Inst., Univ. Kuala Lumpur, Kuala Lumpur, Malaysia
fYear :
2014
fDate :
17-19 Jan. 2014
Firstpage :
1
Lastpage :
9
Abstract :
With increasing crimes and attacks being committed online by adversaries from remote sites, it is vital for law enforcement and public security that forensics investigation into the nature and source of these network attacks be effective and successful in bringing the criminals to justice. The network forensics investigation process is complex and processing-intensive such as sifting through network traffic and examining them for evidence, thus it is desirable to approach this task systematically and efficiently with as much structure as is feasible. This paper proposes a model for network forensics analysis that captures appropriately defined adversarial capability and structured by a layered approach to investigation. The former approach eliminates the need to presume on the adversarys behaviour and is independent of specific attack styles, thus is generic; while the latter approach facilitates a more network-intuitive and modular investigation process. We discuss the layered approach and propose the forensics model by defining adversarial capabilities and the experiment setting played between an adversary, a collection of node instances and a forensics analyst. We apply the model in our investigation against samples of traffic captured and show the feasibility of this model on two common network attack instances. Results of evidence collected and conclusions confirm that analysis based on this model is objectively done, and trustworthy evidence successfully gathered and produced.
Keywords :
computer crime; computer network security; digital forensics; telecommunication traffic; evidential network forensics analysis model; forensics analyst; law enforcement; network attack instances; network forensics investigation process; network traffic; network-intuitive investigation process; online attacks; online crimes; public security; sifting; Servers; adversarial capability; evidence; layers; models; network forensics analysis;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Computer Applications and Information Systems (WCCAIS), 2014 World Congress on
Conference_Location :
Hammamet
Print_ISBN :
978-1-4799-3350-1
Type :
conf
DOI :
10.1109/WCCAIS.2014.6916615
Filename :
6916615
Link To Document :
بازگشت