DocumentCode :
3516615
Title :
Log Analyzer for Network Forensics and Incident Reporting
Author :
Nehinbe, Joshua Ojo
Author_Institution :
Univ. of Essex, Colchester, UK
fYear :
2010
fDate :
27-29 Jan. 2010
Firstpage :
356
Lastpage :
361
Abstract :
Network intrusion detection systems are used in network forensics and network auditing to log suspicious activities that potentially signify security violations on the networks as alerts. However, the efficacies of intrusion aggregations to succinctly process audit logs that are gaining wider acceptability in computer security are flawed because the methods frequently require high level of expertise to validate each alert and the methods only focus on interesting events. Thus, deceptive attacks that are intentionally launched to be uninteresting events frequently elude detections. Consequently, aggregated alerts are not seriously considered for litigation and incident handling exercises. Therefore, this paper presents extensive investigations of these problems. We deployed Snort to sniff offline datasets in intrusion detection mode and we clustered the alerts of each dataset with several filtering criteria. Furthermore, the results obtained have established how to detect various kinds of interesting and uninteresting attacks that frequently elude detections.
Keywords :
computer forensics; computer network security; pattern clustering; Snort; alert clustering; deceptive attacks; filtering criteria; incident handling exercise; incident reporting; litigation exercise; log analyzer; network auditing; network forensics; network intrusion detection system; security violation; Analytical models; Computer networks; Computer security; Detectors; Event detection; Filtering; Forensics; Intelligent networks; Intelligent systems; Intrusion detection; Alerts; aggregation; interesting alerts; uninteresting alerts;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Intelligent Systems, Modelling and Simulation (ISMS), 2010 International Conference on
Conference_Location :
Liverpool
Print_ISBN :
978-1-4244-5984-1
Type :
conf
DOI :
10.1109/ISMS.2010.71
Filename :
5416066
Link To Document :
بازگشت