Attack Graph Analysis for Network Anti-Forensics

被引:4
作者
Chandran, Rahul [1 ]
Yan, Wei Q. [2 ,3 ,4 ]
机构
[1] Auckland Univ Technol, Forens Informat Technol, Auckland, New Zealand
[2] Auckland Univ Technol, Auckland, New Zealand
[3] Higher Educ Acad, York, N Yorkshire, England
[4] State Key Lab Informat Secur SKLOIS China, Beijing, Peoples R China
关键词
Anti-Forensics; Attack Graphs; Hackers; Network Attacks; Network Forensics;
D O I
10.4018/ijdcf.2014010103
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
The development of technology in computer networks has boosted the percentage of cyber-attacks today. Hackers are now able to penetrate even the strongest IDS and firewalls. With the help of anti-forensic techniques, attackers defend themselves, from being tracked by destroying and distorting evidences. To detect and prevent network attacks, the main modus of operandi in network forensics is the successful implementation and analysis of attack graph from gathered evidences. This paper conveys the main concepts of attack graphs, requirements for modeling and implementation of graphs. It also contributes the aspect of incorporation of anti- forensic techniques in attack graph which will help in analysis of the diverse possibilities of attack path deviations and thus aids in recommendation of various defense strategies for better security. To the best of our knowledge, this is the first time network anti- forensics has been fully discussed and the attack graphs are employed to analyze the network attacks. The experimental analysis of anti-forensic techniques using attack graphs were conducted in the proposed test-bed which helped to evaluate the model proposed and suggests preventive measures for the improvement of security of the networks.
引用
收藏
页码:28 / 50
页数:23
相关论文
共 30 条
  • [1] Albanese M, 2011, LECT NOTES COMPUT SC, V6879, P416, DOI 10.1007/978-3-642-23822-2_23
  • [2] Epidemic thresholds in real networks
    Chakrabarti, Deepayan
    Wang, Yang
    Wang, Chenxi
    Leskovec, Jurij
    Faloutsos, Christos
    [J]. ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, 2008, 10 (04)
  • [3] Chandran R., THESIS
  • [4] Cheng F, 2011, LECT NOTES COMPUT SC, V6646, P138, DOI 10.1007/978-3-642-20754-9_15
  • [5] Diamah A, 2012, SMART INNOV SYST TEC, V16, P433
  • [6] A planner-based approach to generate and analyze minimal attack graph
    Ghosh, Nirnay
    Ghosh, S. K.
    [J]. APPLIED INTELLIGENCE, 2012, 36 (02) : 369 - 390
  • [7] Harbort Z., 2011, P 7 ANN WORKSH CYB S, DOI [10.1145/2179298.2179383, DOI 10.1145/2179298.2179383]
  • [8] Homer J, 2008, LECT NOTES COMPUT SC, V5210, P68, DOI 10.1007/978-3-540-85933-8_7
  • [9] Extending Attack Graph-Based Security Metrics and Aggregating Their Application
    Idika, Nwokedi
    Bhargava, Bharat
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2012, 9 (01) : 75 - 85
  • [10] Modeling Modern Network Attacks and Countermeasures Using Attack Graphs
    Ingols, Kyle
    Chu, Matthew
    Lippmann, Richard
    Webster, Seth
    Boyer, Stephen
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 117 - 126