DocumentCode :
3344025
Title :
Metrics for network forensics conviction evidence
Author :
Amran, A.R. ; Phan, Raphael C.-W ; Parish, D.J.
Author_Institution :
Dept. of Electron. & Electr. Eng., Loughborough Univ., Loughborough, UK
fYear :
2009
fDate :
9-12 Nov. 2009
Firstpage :
1
Lastpage :
8
Abstract :
Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper takes a step forward showing how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) - Redress that is defined as holding intruders responsible. We propose a procedure of evidence acquisition in network forensics where we then analyse sample of packet data in order to extract useful information as evidence through a formalised intuitive model, based on capturing adversarial behaviour and layer analysis. We then apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.
Keywords :
case-based reasoning; computer forensics; computer network security; capturing adversarial behaviour; capturing layer analysis; common vulnerability scoring system; conviction evidence; embedded feature extension; extract useful information; forensics metrics system; formalised intuitive model; holding intruders responsible; leading successful conviction; malicious intents adversary; malicious intents attacker; metrics network forensics; network evidence credibility; network forensic readiness; network severity damage; packet data sample; procedure evidence acquisition; resource intensive process; severity network attacks; Computer crime; Data mining; Digital forensics; Feeds; Information analysis; Law; Legal factors; Productivity; Standards development;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Internet Technology and Secured Transactions, 2009. ICITST 2009. International Conference for
Conference_Location :
London
Print_ISBN :
978-1-4244-5647-5
Type :
conf
DOI :
10.1109/ICITST.2009.5402640
Filename :
5402640
Link To Document :
بازگشت