Tracking the bad guys: an efficient forensic methodology to trace multi-step attacks using core attack graphs
File(s)FINAL-Camera-Ready--1570382822.pdf (349.71 KB)
Accepted version
Author(s)
Barrere Cambrun, M
Vieira Steiner, R
Mohsen, R
Lupu, E
Type
Conference Paper
Abstract
In this paper, we describe an efficient methodology to guide investigators during network forensic analysis. To this end, we introduce the concept of core attack graph, a compact representation of the main routes an attacker can take towards specific network targets. Such compactness allows forensic investigators to focus their efforts on critical nodes that are more likely to be part of attack paths, thus reducing the overall number of nodes (devices, network privileges) that need to be examined. Nevertheless, core graphs also allow investigators to hierarchically explore the graph in order to retrieve different levels of summarised information. We have evaluated our approach over different network topologies varying parameters such as network size, density, and forensic evaluation threshold. Our results demonstrate that we can achieve the same level of accuracy provided by standard logical attack graphs while significantly reducing the exploration rate of the network.
Date Acceptance
2017-08-29
Citation
2017 13th International Conference on Network and Service Management (CNSM)
ISSN
2165-963X
Publisher
IEEE
Journal / Book Title
2017 13th International Conference on Network and Service Management (CNSM)
Copyright Statement
© 2017 Crown
Sponsor
Engineering & Physical Science Research Council (EPSRC)
Identifier
http://www.imperial.ac.uk/people/m.barrere
Grant Number
EP/L022729/1
Source
13th International Conference on Network and Service Management (CNSM'17)
Subjects
Attack graphs
Core attack graphs
Core graphs
Digital forensics
Network security
Digital evidence
Forensic investigations
Publication Status
Published
Start Date
2017-11-26
Finish Date
2017-11-30
Coverage Spatial
Tokyo, Japan
Date Publish Online
2018-01-15