DocumentCode
3718779
Title
Network attack origin forensics with fuzzy logic
Author
Maryam Rostamipour;Babak Sadeghiyan
Author_Institution
Department of Computer Engineering and Information Technology, Amirkabir University of Technology, Tehran, Iran
fYear
2015
Firstpage
67
Lastpage
72
Abstract
Network forensics is scientifically proven techniques to collect, detect, identify, examine, correlate, analyze, and document digital evidence from multiple sources to identify suspicious entities and stepwise actions. The overwhelming amount and low quality of output from sensors make it difficult for analysts to find the origin of the attack in complex multi-stage intrusions. In this paper, we propose a new expert system, being able to automatically detect the origin of attack in single and multi-stage attacks, with no human involved in the investigations. The main nobility of our forensics system is the development of an expert system based on fuzzy logic, which uses multiple sources to detect the origin of attack and systems involved in it, and then automatically creates evidences. This system is able to indicate the time, origin and scenario of the attack. Experimental results show that our system can detect the origin of attack in single and multi-step attacks and provide useful and comprehensive information for future investigation.
Keywords
"Feature extraction","Reliability","Bayes methods"
Publisher
ieee
Conference_Titel
Computer and Knowledge Engineering (ICCKE), 2015 5th International Conference on
Type
conf
DOI
10.1109/ICCKE.2015.7365863
Filename
7365863
Link To Document