A Model Towards Using Evidence from Security Events for Network Attack Analysis
Changwei Liu, Anoop Singhal, Duminda Wijesekera
Constructing an efficient and accurate model from security events to determine an attack scenario for an enterprise network is challenging. In this paper, we discuss how to use evidence obtained from security events to construct an attack scenario and build an evidence graph. To achieve the accuracy and completeness of the evidence graph, we use Prolog inductive and abductive reasoning to correlate evidence by reasoning the causality, and use an anti-forensics database and a corresponding attack graph to find the missing evidence. In addition, because the constructed scenario and supplied evidence might need to stand up in the court of law, the federal rules of evidence are also taken into account to predetermine the admissibility of the evidence.
WOSIS 2014, International Workshop on Security in Information Systems
, Singhal, A.
and Wijesekera, D.
A Model Towards Using Evidence from Security Events for Network Attack Analysis, WOSIS 2014, International Workshop on Security in Information Systems, Lisbon, PT, [online], https://doi.org/10.5220/0004980300830095, https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=915771
(Accessed February 27, 2024)