Repository logo
  • Log In
    Log in via Symplectic to deposit your publication(s).
Repository logo
  • Communities & Collections
  • Research Outputs
  • Statistics
  • Log In
    Log in via Symplectic to deposit your publication(s).
  1. Home
  2. Faculty of Engineering
  3. Faculty of Engineering
  4. A formal approach to analyzing cyber-forensics evidence
 
  • Details
A formal approach to analyzing cyber-forensics evidence
File(s)
KarafiliCV.pdf (434.05 KB)
Accepted version
Author(s)
Karafili, E
Cristani, Matteo
Viganò, Luca
Type
Conference Paper
Abstract
The frequency and harmfulness of cyber-attacks are increasing every day, and with them also the amount of data that the cyber-forensics analysts need to collect and analyze. In this paper, we propose a formal analysis process that allows an analyst to filter the enormous amount of evidence collected and either identify crucial information about the attack (e.g., when it occurred, its culprit, its target) or, at the very least, perform a pre-analysis to reduce the complexity of the problem in order to then draw conclusions more swiftly and efficiently.

We introduce the Evidence Logic EL for representing simple and derived pieces of evidence from different sources. We propose a procedure, based on monotonic reasoning, that rewrites the pieces of evidence with the use of tableau rules,
based on relations of trust between sources and the reasoning behind the derived evidence, and yields a consistent set of pieces of evidence. As proof of concept, we apply our analysis process to a concrete cyber-forensics case study.
Date Issued
2018-08-08
Date Acceptance
2018-06-15
Citation
Lecture Notes in Computer Science, 2018, pp.281-301
URI
http://hdl.handle.net/10044/1/62196
URL
https://link.springer.com/chapter/10.1007%2F978-3-319-99073-6_14
DOI
https://www.dx.doi.org/10.1007/978-3-319-99073-6_14
ISSN
0302-9743
Publisher
Springer Verlag
Start Page
281
End Page
301
Journal / Book Title
Lecture Notes in Computer Science
Copyright Statement
© Springer Nature Switzerland AG 2018. The final publication is available at Springer via https://doi.org/10.1007/978-3-319-99073-6_14
Sponsor
Commission of the European Communities
Identifier
https://link.springer.com/chapter/10.1007%2F978-3-319-99073-6_14
Grant Number
746667
Source
European Symposium on Research in Computer Security (ESORICS) 2018
Subjects
Science & Technology
Technology
Computer Science, Information Systems
Computer Science, Theory & Methods
Computer Science
BELIEF REVISION
ARGUMENTATION
cs.CR
cs.CR
cs.LO
Artificial Intelligence & Image Processing
Publication Status
Published
Start Date
2018-09-03
Finish Date
2018-09-09
Coverage Spatial
Barcelona, Spain
Date Publish Online
2018-08-08
About
Spiral Depositing with Spiral Publishing with Spiral Symplectic
Contact us
Open access team Report an issue
Other Services
Scholarly Communications Library Services
logo

Imperial College London

South Kensington Campus

London SW7 2AZ, UK

tel: +44 (0)20 7589 5111

Accessibility Modern slavery statement Cookie Policy

Built with DSpace-CRIS software - Extension maintained and optimized by 4Science

  • Cookie settings
  • Privacy policy
  • End User Agreement
  • Send Feedback