Network forensics based on fuzzy logic and expert system

被引:42
作者
Liao, Niandong [1 ]
Tian, Shengfeng [1 ]
Wang, Tinghua [1 ]
机构
[1] Beijing Jiaotong Univ, Sch Comp & Informat Technol, Beijing 100044, Peoples R China
关键词
Network forensics; Expert system; Fuzzy logic; Intrusion detection system; Vulnerability scanning; SAFETY CULTURE; MODELS; CLASSIFIER;
D O I
10.1016/j.comcom.2009.07.013
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Network forensics is a research area that finds the malicious users by collecting and analyzing the intrusion or infringement evidence of computer crimes such as hacking. In the past, network forensics was only used by means of investigation. However, nowadays, due to the sharp increase of network traffic, not all the information captured or recorded will be useful for analysis or evidence. The existing methods and tools for network forensics show only simple results. The administrators have difficulty in analyzing the state of the damaged system without expert knowledge. Therefore, we need an effective and automated analyzing system for network forensics. In this paper, we firstly guarantee the evidence reliability as far as possible by collecting different forensic information of detection sensors. Secondly, we propose an approach based on fuzzy logic and expert system for network forensics that can analyze computer crimes in network environment and make digital evidences automatically. At the end of the paper, the experimental comparison results between our proposed method and other popular methods are presented. Experimental results show that the system can classify most kinds of attack types (91.5% correct classification rate on average) and provide analyzable and comprehensible information for forensic experts. (C) 2009 Elsevier B.V. All rights reserved.
引用
收藏
页码:1881 / 1892
页数:12
相关论文
共 48 条
[1]  
[Anonymous], strace
[2]  
[Anonymous], P 3 INT C NAT COMP I, DOI DOI 10.1109/ICNC.2007.345
[3]  
[Anonymous], EnCase
[4]  
[Anonymous], 2011, Pei. data mining concepts and techniques
[5]  
[Anonymous], TCPREPLAY
[6]   Analyzing multiple logs for forensic evidence [J].
Arasteh, Ali Reza ;
Debbabi, Mourad ;
Sakha, Assaad ;
Saleh, Mohamed .
DIGITAL INVESTIGATION, 2007, 4 (82-91) :S82-S91
[7]  
Ashfaq AB, 2008, LECT NOTES COMPUT SC, V5230, P351, DOI 10.1007/978-3-540-87403-4_19
[8]  
AZADEHA A, 2008, INFORM SCI, V78, P4280
[9]   Efficient deterministic method for detecting new U2R attacks [J].
Beghdad, Rachid .
COMPUTER COMMUNICATIONS, 2009, 32 (06) :1104-1110
[10]  
BON KS, 2009, INFORM FUSION, V10, P325