2015 7th International Conference on Information Technology in Medicine and Education (ITME) 2015
DOI: 10.1109/itme.2015.94
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensics Scenario Reconstruction Method Based on Hidden Markov Models

Abstract: Reconstruction Method of Network Forensics Scenario has grown into a mature and rich technology that provides advanced skills to get the chain of evidence. Using statistical methods to analyze intrusion logs in order to present evidentiary values in court are often refuted as baseless and inadmissible evidences which is not considering the input spent. These spendings is to generate the reports no matter they are well-grounded evidences or not.Thus, this paper presents the Scenario Reconstruction Method combin… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(4 citation statements)
references
References 2 publications
(2 reference statements)
0
4
0
Order By: Relevance
“…One example of the sequence of transactions can be shown as llmhmlhm. The types of purchases such [13], [27], [43], [86], [93], [101], [107] [2], [34], [39], [50], [59], [113], [118] [30], [41], [77], [83] [4], [8], [17], [36], [38], [42] [6], [7], [18], [48], [74], [92] [28], [33], [40], [47], [53], [67], [71], [97], [105], [114], [116], [119] [54], [55], [112] [15], [70], [77], [95], [99], [102] [10], [44], [66] [41], [53], [56], [74],…”
Section: Credit Card Fraud Detectionmentioning
confidence: 99%
See 1 more Smart Citation
“…One example of the sequence of transactions can be shown as llmhmlhm. The types of purchases such [13], [27], [43], [86], [93], [101], [107] [2], [34], [39], [50], [59], [113], [118] [30], [41], [77], [83] [4], [8], [17], [36], [38], [42] [6], [7], [18], [48], [74], [92] [28], [33], [40], [47], [53], [67], [71], [97], [105], [114], [116], [119] [54], [55], [112] [15], [70], [77], [95], [99], [102] [10], [44], [66] [41], [53], [56], [74],…”
Section: Credit Card Fraud Detectionmentioning
confidence: 99%
“…Research on alert correlating and predicting systems based on the HMM include [28,33,40,47,53,61,67,71,97,105,114,116,119] which aim to extract and track multistep attack scenarios by analyzing the correlation between alerts created by IDS. As a detailed example, ref.…”
Section: Multistep Attack Detection and Predictionmentioning
confidence: 99%
“…Prevention of Malice Software a 12 Media Processing and Security a 13 Operation Program and Duty a 14 Network Management a 15 Information and Software, Hardware Exchange a 21 Management of Network Access a 22 Management of User's Access a 23 Management of Application Access a 24 System Access and Monitoring of Usage a 31 Effect on Tangible Assets a 32 Effect on Intangible Assets…”
Section: Criteria Description Of the Criteriamentioning
confidence: 99%
“…Besides, many studies have researched the security of computer networks because of the emergence of a large number of cyber crimes, which are researched in many studies [9,10]. To combat cyber crimes vigorously, studies regarding computer forensics [11,12], virus prevention technologies [13], security visualization for computer network logs [14], intrusion detection [15], etc., have been performed in recent years. In addition, approaches of computer network security risk assessment are also of great significance to improve computer network security.…”
Section: Introductionmentioning
confidence: 99%