• DocumentCode
    183065
  • Title

    An approach to detect network attacks applied for network forensics

  • Author

    Khoa Nguyen ; Dat Tran ; Wanli Ma ; Sharma, Divya

  • Author_Institution
    Fac. of Educ., Sci., Technol. & Math., Univ. of Canberra, Canberra, ACT, Australia
  • fYear
    2014
  • fDate
    19-21 Aug. 2014
  • Firstpage
    655
  • Lastpage
    660
  • Abstract
    Network forensics is addressed to deal with cybercrime. The main purpose of a network forensics system is reconstructing evidences of network attacks. In order to reconstruct evidence, the network attack is firstly identified. Therefore, network attack detection solutions play an important role in network forensics. There are two main types of network attacks: network level and application level. Network level attack detection solutions focus on the information in the headers of network packets. While, application level attack detection solutions investigate the data fragments carried out in the packet payloads. We propose an approach based on Shannon entropy and machine learning techniques to identify executable content for anomaly-based network attack detection in network forensics systems. Experimental results show that the proposed approach provides very high detection rate.
  • Keywords
    computer network security; digital forensics; entropy; learning (artificial intelligence); Shannon entropy; anomaly-based network attack detection; application level attack detection; cybercrime; data fragments; executable content identification; machine learning techniques; network attack evidence reconstruction; network attack identification; network forensic system; network level attack detection; network packet header information; packet payloads; Accuracy; Data models; Entropy; Feature extraction; Forensics; Support vector machines; Vectors; Entropy; Executable data detection; Machine learning; Network forensics;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Fuzzy Systems and Knowledge Discovery (FSKD), 2014 11th International Conference on
  • Conference_Location
    Xiamen
  • Print_ISBN
    978-1-4799-5147-5
  • Type

    conf

  • DOI
    10.1109/FSKD.2014.6980912
  • Filename
    6980912