Metrics for network forensics conviction evidence

Ahmad R. Amran, Raphael C.W. Phan, David J. Parish

Research output: Chapter in Book/Report/Conference proceedingConference PaperResearchpeer-review

6 Citations (Scopus)

Abstract

Evaluation of forensics evidence is an essential step in proving the malicious intents of an attacker or adversary and the severity of the damages caused to any network. This paper takes a step forward showing how security metrics can be used to sustain a sense of credibility to network evidence gathered as an elaboration and extension to an embedded feature of Network Forensic Readiness (NFR) - Redress that is defined as holding intruders responsible. We propose a procedure of evidence acquisition in network forensics where we then analyse sample of packet data in order to extract useful information as evidence through a formalised intuitive model, based on capturing adversarial behaviour and layer analysis. We then apply the Common Vulnerability Scoring System (CVSS) metrics to show that a forensics metrics system could assess the severity of network attacks committed, thus giving a degree of credibility to the evidence gathered. This way, hard evidence could be objectively collected to lend support to the resource-intensive process of investigation and litigation, leading to successful conviction, while reducing effort expended on the process.

Original languageEnglish
Title of host publicationInternational Conference for Internet Technology and Secured Transactions, ICITST 2009
Publication statusPublished - 2009
Externally publishedYes
EventInternational Conference for Internet Technology and Secured Transactions (ICITST) 2009 - London, United Kingdom
Duration: 9 Nov 200912 Nov 2009
Conference number: 4th
https://ieeexplore.ieee.org/xpl/conhome/5393958/proceeding (Proceedings)

Conference

ConferenceInternational Conference for Internet Technology and Secured Transactions (ICITST) 2009
Abbreviated titleICITST 2009
Country/TerritoryUnited Kingdom
CityLondon
Period9/11/0912/11/09
Internet address

Cite this