메뉴 건너뛰기




Volumn 32, Issue 17, 2009, Pages 1881-1892

Network forensics based on fuzzy logic and expert system

Author keywords

Expert system; Fuzzy logic; Intrusion detection system; Network forensics; Vulnerability scanning

Indexed keywords

ANALYZING SYSTEM; CLASSIFICATION RATES; DAMAGED SYSTEMS; DETECTION SENSORS; DIGITAL EVIDENCE; EXISTING METHOD; EXPERIMENTAL COMPARISON; EXPERT KNOWLEDGE; FORENSIC INFORMATION; IN-NETWORK; INTRUSION DETECTION SYSTEM; NETWORK FORENSICS; NETWORK TRAFFIC; RESEARCH AREAS; SHARP INCREASE; VULNERABILITY SCANNING;

EID: 69249213464     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2009.07.013     Document Type: Article
Times cited : (51)

References (51)
  • 3
    • 69249225336 scopus 로고    scopus 로고
    • Available from
    • Safeback. Available from: .
    • Safeback
  • 4
    • 69249246231 scopus 로고    scopus 로고
    • Available from
    • Encase. Available from: .
    • Encase
  • 5
    • 69249242618 scopus 로고    scopus 로고
    • Institute for Security Technology Studies. Available from
    • Institute for Security Technology Studies. Available from: .
  • 7
    • 56549083676 scopus 로고    scopus 로고
    • A.B. Ashfaq, M.J. Robert, A. Mumtaz, M.Q. Ali, A. Sajjad, S.A. Khayam, A comparative evaluation of anomaly detectors under portscan attacks, in: Recent Advances in Intrusion Detection (RAID 2008), 2008, pp. 351-371.
    • A.B. Ashfaq, M.J. Robert, A. Mumtaz, M.Q. Ali, A. Sajjad, S.A. Khayam, A comparative evaluation of anomaly detectors under portscan attacks, in: Recent Advances in Intrusion Detection (RAID 2008), 2008, pp. 351-371.
  • 10
    • 69249225335 scopus 로고    scopus 로고
    • The Honeynet Project and Research Alliance. Available from:, October 2008
    • The Honeynet Project and Research Alliance. Available from: , October 2008.
  • 12
    • 66449123983 scopus 로고    scopus 로고
    • Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS
    • Sy Bon K. Integrating intrusion alert information to aid forensic explanation: An analytical intrusion detection framework for distributive IDS. Information Fusion 10 4 (2009) 325-341
    • (2009) Information Fusion , vol.10 , Issue.4 , pp. 325-341
    • Sy Bon, K.1
  • 13
    • 61749083929 scopus 로고    scopus 로고
    • McPAD: a multiple classifier system for accurate payload-based anomaly detection
    • Perdisci R., Ariu D., Fogla P., Giacinto G., and Lee W. McPAD: a multiple classifier system for accurate payload-based anomaly detection. Computer Networks 53 (2009) 864-881
    • (2009) Computer Networks , vol.53 , pp. 864-881
    • Perdisci, R.1    Ariu, D.2    Fogla, P.3    Giacinto, G.4    Lee, W.5
  • 14
  • 16
    • 37049002837 scopus 로고    scopus 로고
    • Processing of massive audit data streams for real-time anomaly intrusion detection
    • Wang W., Guan X.H., and Zhang X.L. Processing of massive audit data streams for real-time anomaly intrusion detection. Computer Communications 31 (2008) 58-72
    • (2008) Computer Communications , vol.31 , pp. 58-72
    • Wang, W.1    Guan, X.H.2    Zhang, X.L.3
  • 17
    • 40749162512 scopus 로고    scopus 로고
    • Legal methods of using computer forensics techniques for computer crime analysis and investigation
    • Thomas D.S., and Forcht K. Legal methods of using computer forensics techniques for computer crime analysis and investigation. Issues in Information System 5 2 (2004) 693
    • (2004) Issues in Information System , vol.5 , Issue.2 , pp. 693
    • Thomas, D.S.1    Forcht, K.2
  • 18
    • 35948933896 scopus 로고    scopus 로고
    • Fuzzy decision tree based inference techniques for network forensic analysis
    • Liu Z.Q., Lin D.D., and Feng D.G. Fuzzy decision tree based inference techniques for network forensic analysis. Journal of Software 18 10 (2007) 2635-2644
    • (2007) Journal of Software , vol.18 , Issue.10 , pp. 2635-2644
    • Liu, Z.Q.1    Lin, D.D.2    Feng, D.G.3
  • 20
    • 40749151829 scopus 로고    scopus 로고
    • A framework for post-event timeline reconstruction using neural networks
    • Khan M.N.A., Chatwin C.R., and Young R.C.D. A framework for post-event timeline reconstruction using neural networks. Digital Investigation 4 (2007) 146-157
    • (2007) Digital Investigation , vol.4 , pp. 146-157
    • Khan, M.N.A.1    Chatwin, C.R.2    Young, R.C.D.3
  • 22
    • 1542492748 scopus 로고    scopus 로고
    • Identifying significant features for network forensic analysis using artificial intelligent techniques
    • Mukkamala S., and Sung A.H. Identifying significant features for network forensic analysis using artificial intelligent techniques. International Journal of Digital Evidence 1 4 (2003) 1-7
    • (2003) International Journal of Digital Evidence , vol.1 , Issue.4 , pp. 1-7
    • Mukkamala, S.1    Sung, A.H.2
  • 23
    • 33646852634 scopus 로고    scopus 로고
    • A fuzzy logic based expert system as a network forensic
    • Proc. ICCSA
    • J.S. Kim, D.G. Kim, B.N. Noh, A fuzzy logic based expert system as a network forensic, in: Proc. ICCSA 2004. LNCS 3043, 2004, pp. 175-182.
    • (2004) LNCS , vol.3043 , pp. 175-182
    • Kim, J.S.1    Kim, D.G.2    Noh, B.N.3
  • 24
    • 0342471739 scopus 로고    scopus 로고
    • Diagnosis of safety culture in safety management audits
    • Grote G., and Künzler C. Diagnosis of safety culture in safety management audits. Safety Science 34 (2000) 131-150
    • (2000) Safety Science , vol.34 , pp. 131-150
    • Grote, G.1    Künzler, C.2
  • 25
    • 0034028034 scopus 로고    scopus 로고
    • The nature of safety culture: are view of theory and research
    • Guldenmund F.W. The nature of safety culture: are view of theory and research. Safety Science 34 (2000) 215-257
    • (2000) Safety Science , vol.34 , pp. 215-257
    • Guldenmund, F.W.1
  • 27
    • 51549104043 scopus 로고    scopus 로고
    • Design and implementation of a fuzzy expert system for performance assessment of an integrated health safety environment (HSE) and ergonomics system: the case of a gas refinery
    • Azadeha A., Famb I.M., Khoshnouda M., and Nikafrouz M. Design and implementation of a fuzzy expert system for performance assessment of an integrated health safety environment (HSE) and ergonomics system: the case of a gas refinery. Information Sciences 78 (2008) 4280-4300
    • (2008) Information Sciences , vol.78 , pp. 4280-4300
    • Azadeha, A.1    Famb, I.M.2    Khoshnouda, M.3    Nikafrouz, M.4
  • 28
    • 56349166784 scopus 로고    scopus 로고
    • Risk evaluation in failure mode and effects analysis using fuzzy weighted geometric mean
    • Wang Y.M., Chin K.S., Poon G.K.K., and Wang J.B. Risk evaluation in failure mode and effects analysis using fuzzy weighted geometric mean. Expert Systems with Applications 36 (2009) 1195-1207
    • (2009) Expert Systems with Applications , vol.36 , pp. 1195-1207
    • Wang, Y.M.1    Chin, K.S.2    Poon, G.K.K.3    Wang, J.B.4
  • 29
    • 56349139644 scopus 로고    scopus 로고
    • International distribution center selection from a foreign market perspective using a weighted fuzzy factor rating system
    • Ou C.W., and Chou S.Y. International distribution center selection from a foreign market perspective using a weighted fuzzy factor rating system. Expert Systems with Applications 36 (2009) 1773-1782
    • (2009) Expert Systems with Applications , vol.36 , pp. 1773-1782
    • Ou, C.W.1    Chou, S.Y.2
  • 32
    • 33748600128 scopus 로고    scopus 로고
    • Inference and learning methodology of belief-rule-based expert system for pipeline leak detection
    • Xu D.L., Liu J., Yang J.B., Liu G.P., Wang J., et al. Inference and learning methodology of belief-rule-based expert system for pipeline leak detection. Expert Systems with Applications 32 1 (2007) 103-113
    • (2007) Expert Systems with Applications , vol.32 , Issue.1 , pp. 103-113
    • Xu, D.L.1    Liu, J.2    Yang, J.B.3    Liu, G.P.4    Wang, J.5
  • 33
    • 56349089259 scopus 로고    scopus 로고
    • Research of the dynamical rule generation for intrusion detection system
    • (in Chinese)
    • Liao N.D., and Tian S.F. Research of the dynamical rule generation for intrusion detection system. Journal of Beijing Jiaotong University 32 5 (2008) 116-120 (in Chinese)
    • (2008) Journal of Beijing Jiaotong University , vol.32 , Issue.5 , pp. 116-120
    • Liao, N.D.1    Tian, S.F.2
  • 34
    • 0019585325 scopus 로고
    • A procedure for ordering fuzzy subsets of the unit interval
    • Yager R.R. A procedure for ordering fuzzy subsets of the unit interval. Information Sciences 24 (1981) 143-161
    • (1981) Information Sciences , vol.24 , pp. 143-161
    • Yager, R.R.1
  • 35
    • 0013136898 scopus 로고    scopus 로고
    • A hierarchy fuzzy MCDM method for studying electronic marketing strategies in the information service industry
    • Tang M.T., Tzeng G.H., and Wang S.W. A hierarchy fuzzy MCDM method for studying electronic marketing strategies in the information service industry. Journal of International Information Management 8 1 (1999) 1-22
    • (1999) Journal of International Information Management , vol.8 , Issue.1 , pp. 1-22
    • Tang, M.T.1    Tzeng, G.H.2    Wang, S.W.3
  • 36
    • 0000247057 scopus 로고    scopus 로고
    • Evaluating tourist risks from fuzzy perspectives
    • Tsaur S.H., Tzeng G.H., and Wang G.C. Evaluating tourist risks from fuzzy perspectives. Annals of Tourism Research 24 4 (1997) 796-812
    • (1997) Annals of Tourism Research , vol.24 , Issue.4 , pp. 796-812
    • Tsaur, S.H.1    Tzeng, G.H.2    Wang, G.C.3
  • 37
    • 1642335463 scopus 로고    scopus 로고
    • Models for a fuzzy inventory of two replaceable merchandises without backorder based on the signed distance of fuzzy sets
    • Yao J.S.L., Ouyang Y., and Chang H.C. Models for a fuzzy inventory of two replaceable merchandises without backorder based on the signed distance of fuzzy sets. European Journal of Operational research 150 (2003) 601-616
    • (2003) European Journal of Operational research , vol.150 , pp. 601-616
    • Yao, J.S.L.1    Ouyang, Y.2    Chang, H.C.3
  • 38
    • 69249241461 scopus 로고    scopus 로고
    • Available from
    • DARPA. Available from: .
  • 39
    • 35248857893 scopus 로고    scopus 로고
    • M. Mahoney, P. Chan, An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection, in: Recent Advances in Intrusion Detection (RAID 2004), 2004, pp. 220-237.
    • M. Mahoney, P. Chan, An analysis of the 1999 DARPA/Lincoln Laboratory evaluation data for network anomaly detection, in: Recent Advances in Intrusion Detection (RAID 2004), 2004, pp. 220-237.
  • 40
    • 33846910249 scopus 로고    scopus 로고
    • Language models for detection of unknown attacks in network traffic
    • Riech K., and Laskov P. Language models for detection of unknown attacks in network traffic. Journal in Computer Virology 2 (2007) 243-256
    • (2007) Journal in Computer Virology , vol.2 , pp. 243-256
    • Riech, K.1    Laskov, P.2
  • 42
    • 61849175333 scopus 로고    scopus 로고
    • Efficient deterministic method for detecting new U2R attacks
    • Beghdad R. Efficient deterministic method for detecting new U2R attacks. Computer Communications 32 (2009) 1104-1110
    • (2009) Computer Communications , vol.32 , pp. 1104-1110
    • Beghdad, R.1
  • 45
    • 84894426674 scopus 로고    scopus 로고
    • Available from
    • Tcpreplay. Available from: .
    • Tcpreplay
  • 46
    • 0031269184 scopus 로고    scopus 로고
    • On the optimality of the simple Bayesian classification under zero-one class loss
    • Domingos P., and Pazzaini M. On the optimality of the simple Bayesian classification under zero-one class loss. Machine Learning 29 203 (1997) 103-130
    • (1997) Machine Learning , vol.29 , Issue.203 , pp. 103-130
    • Domingos, P.1    Pazzaini, M.2
  • 50
    • 69249246230 scopus 로고    scopus 로고
    • Available from
    • Strace. Available from: .
    • Strace


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.