메뉴 건너뛰기




Volumn 12, Issue 1, 2008, Pages

A graph based approach toward network forensics analysis

Author keywords

Evidence graph; Hierarchical reasoning; Network forensics

Indexed keywords

AUTOMATA THEORY;

EID: 56349109092     PISSN: 10949224     EISSN: 15577406     Source Type: Journal    
DOI: 10.1145/1410234.1410238     Document Type: Article
Times cited : (82)

References (38)
  • 1
    • 7544240929 scopus 로고    scopus 로고
    • Defining event reconstruction of digital crime scenes
    • CARRIER, B. D. AND SPAFFORD, E. H. 2004. Defining event reconstruction of digital crime scenes. J. Forensic Sci.
    • (2004) J. Forensic Sci
    • CARRIER, B.D.1    SPAFFORD, E.H.2
  • 8
    • 56349169788 scopus 로고    scopus 로고
    • DARPA intrusion detection scenario specific datasets. Retrieved from
    • DARPA. MIT Lincoln Lab 2000 DARPA intrusion detection scenario specific datasets. Retrieved from http://www.ll.mit.edu/IST/ideval/data/2000/index.html.
    • (2000) MIT Lincoln Lab
  • 9
    • 10844277649 scopus 로고    scopus 로고
    • A revised taxonomy for intrusion-detection systems
    • DEBAR, H., DACER, M., AND WESPI, A. 1999. A revised taxonomy for intrusion-detection systems. In IBM Research Report.
    • (1999) IBM Research Report
    • DEBAR, H.1    DACER, M.2    WESPI, A.3
  • 13
    • 56349092250 scopus 로고    scopus 로고
    • eTrust. eTrust Network Forensics Solution. Available at http://www3.ca.com/.
    • eTrust. eTrust Network Forensics Solution. Available at http://www3.ca.com/.
  • 14
    • 56349086876 scopus 로고    scopus 로고
    • Retrieved from
    • Flowtools. flow-tools. Retrieved from http://www.splintered.net/sw/flow- tools/.
    • Flowtools. flow-tools
  • 15
    • 84883099069 scopus 로고    scopus 로고
    • IDMEF, Internet draft available at
    • IDMEF. Intrusion Detection Message Exchange Format. Internet draft available at http://www.ietf.org/internet-drafts/draft-ietf-idwg-idmef-xml-14. txt.
    • Intrusion Detection Message Exchange Format
  • 16
    • 33645762914 scopus 로고    scopus 로고
    • INSTITUTE FOR SECURITY TECHNOLOGY STUDIES, Gap analysis report. Retrieved from
    • INSTITUTE FOR SECURITY TECHNOLOGY STUDIES. 2004. Law enforcement tools and technologies for investigating cyber attacks: Gap analysis report. Retrieved from http://www.ists.dartmouth. edu.
    • (2004) Law enforcement tools and technologies for investigating cyber attacks
  • 19
    • 3142623031 scopus 로고    scopus 로고
    • Clustering intrusion detection alarms to support root cause analysis
    • JULISCH, K. 2003. Clustering intrusion detection alarms to support root cause analysis. In ACM Trans. Inf. Syst. Secur. 443-471.
    • (2003) ACM Trans. Inf. Syst. Secur , pp. 443-471
    • JULISCH, K.1
  • 21
    • 56349140541 scopus 로고    scopus 로고
    • LEDA, Retrieved from
    • LEDA. LEDA graph library. Retrieved from http://www.algorithmic- solutions.com/enleda.htm.
    • LEDA graph library
  • 23
    • 84858486361 scopus 로고    scopus 로고
    • Available at
    • NetDetector. Available at http://www.niksun.com/Products-NetDetector.htm.
    • NetDetector
  • 24
  • 27
    • 14544283296 scopus 로고    scopus 로고
    • Hypothesizing and reasoning about attacks missed by intrusion detection systems
    • NING, P. AND XU, D. 2004. Hypothesizing and reasoning about attacks missed by intrusion detection systems. ACM Trans. Inf. Syst. Secur. 7, 4, 591-627.
    • (2004) ACM Trans. Inf. Syst. Secur , vol.7 , Issue.4 , pp. 591-627
    • NING, P.1    XU, D.2
  • 32
    • 0033718255 scopus 로고    scopus 로고
    • Using model checking to analyze network vulnerabilities
    • Washington, DC. Safeback. SafeBack Bit Stream Backup Software. Available at
    • RITCHEY, R. W. AND AMMANN, P. 2000. Using model checking to analyze network vulnerabilities. In Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP'00). Washington, DC. Safeback. SafeBack Bit Stream Backup Software. Available at http://www.forensics-intl.com/ safeback.html.
    • (2000) Proceedings of the 2000 IEEE Symposium on Security and Privacy (SP'00)
    • RITCHEY, R.W.1    AMMANN, P.2
  • 36
    • 56349142437 scopus 로고    scopus 로고
    • SIRAJ, A., M.BRIDGES, S., AND B.VAUGHN, R. 2001. Fuzzy cognitive maps for decision support in an intelligent intrusion detection system. Tech. rep., Department of Computer Science, Mississippi State University.
    • SIRAJ, A., M.BRIDGES, S., AND B.VAUGHN, R. 2001. Fuzzy cognitive maps for decision support in an intelligent intrusion detection system. Tech. rep., Department of Computer Science, Mississippi State University.
  • 37
    • 56349158294 scopus 로고    scopus 로고
    • Retrieved from
    • Softflowd. Retrieved from http://www.mindrot.com/softflowd.html.
    • Softflowd


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.