• DocumentCode
    3718779
  • Title

    Network attack origin forensics with fuzzy logic

  • Author

    Maryam Rostamipour;Babak Sadeghiyan

  • Author_Institution
    Department of Computer Engineering and Information Technology, Amirkabir University of Technology, Tehran, Iran
  • fYear
    2015
  • Firstpage
    67
  • Lastpage
    72
  • Abstract
    Network forensics is scientifically proven techniques to collect, detect, identify, examine, correlate, analyze, and document digital evidence from multiple sources to identify suspicious entities and stepwise actions. The overwhelming amount and low quality of output from sensors make it difficult for analysts to find the origin of the attack in complex multi-stage intrusions. In this paper, we propose a new expert system, being able to automatically detect the origin of attack in single and multi-stage attacks, with no human involved in the investigations. The main nobility of our forensics system is the development of an expert system based on fuzzy logic, which uses multiple sources to detect the origin of attack and systems involved in it, and then automatically creates evidences. This system is able to indicate the time, origin and scenario of the attack. Experimental results show that our system can detect the origin of attack in single and multi-step attacks and provide useful and comprehensive information for future investigation.
  • Keywords
    "Feature extraction","Reliability","Bayes methods"
  • Publisher
    ieee
  • Conference_Titel
    Computer and Knowledge Engineering (ICCKE), 2015 5th International Conference on
  • Type

    conf

  • DOI
    10.1109/ICCKE.2015.7365863
  • Filename
    7365863