2008
DOI: 10.1145/1410234.1410238
|View full text |Cite
|
Sign up to set email alerts
|

A Graph Based Approach Toward Network Forensics Analysis

Abstract: In this article we develop a novel graph-based approach toward network forensics analysis. Central to our approach is the evidence graph model that facilitates evidence presentation and automated reasoning. Based on the evidence graph, we propose a hierarchical reasoning framework that consists of two levels. Local reasoning aims to infer the functional states of network entities from local observations. Global reasoning aims to identify important entities from the graph structure and extract groups of densely… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
70
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
5
2

Relationship

0
7

Authors

Journals

citations
Cited by 76 publications
(73 citation statements)
references
References 11 publications
0
70
0
Order By: Relevance
“…The formalized definition can be found in (Wang, and Thomas, 2008;Liu, Singhal, and Wijesekera, 2013). The following is the one defined in Liu, Singhal and Wijesekera.…”
Section: (Probabilistic) Evidence Graphmentioning
confidence: 99%
See 3 more Smart Citations
“…The formalized definition can be found in (Wang, and Thomas, 2008;Liu, Singhal, and Wijesekera, 2013). The following is the one defined in Liu, Singhal and Wijesekera.…”
Section: (Probabilistic) Evidence Graphmentioning
confidence: 99%
“…p(e)=c(e) × w(e) × r(e) × h(e), where "w", "r" and "h" are weight, relevancy and the importance of an evidence edge "e" (Wang, W., and Thomas, E.D., 2008). "c" is the category of evidence, including primary evidence, secondary evidence and hypothesis testing based on expert knowledge.…”
Section: (Probabilistic) Evidence Graphmentioning
confidence: 99%
See 2 more Smart Citations
“…Numerous tutorials are available on internet which provide handful of information about hacking and data theft (Kotenko & Stepashkin, 2006). Another area is the incorporation of anti-forensics such as data hiding, hiding IP, network steganography, data destruction, obfuscation and log cleaning into attacks to hinder the investigation (W. Wang & Daniels, 2008). One of the key drawbacks of network forensics is that they fail to prove the adequacy and integrity of gathered evidence (W. Wang & Daniels, 2008).…”
Section: Background and Motivationmentioning
confidence: 99%