Entry Wang:2008:GBA from tissec.bib

Last update: Sun Oct 15 02:58:48 MDT 2017                Valid HTML 3.2!

Index sections

Top | Symbols | Numbers | Math | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z

BibTeX entry

@Article{Wang:2008:GBA,
  author =       "Wei Wang and Thomas E. Daniels",
  title =        "A Graph Based Approach Toward Network Forensics
                 Analysis",
  journal =      j-TISSEC,
  volume =       "12",
  number =       "1",
  pages =        "4:1--4:??",
  month =        oct,
  year =         "2008",
  CODEN =        "ATISBQ",
  DOI =          "https://doi.org/10.1145/1410234.1410238",
  ISSN =         "1094-9224 (print), 1557-7406 (electronic)",
  ISSN-L =       "1094-9224",
  bibdate =      "Tue Nov 11 15:54:06 MST 2008",
  bibsource =    "http://portal.acm.org/;
                 http://www.math.utah.edu/pub/tex/bib/tissec.bib",
  abstract =     "In this article we develop a novel graph-based
                 approach toward network forensics analysis. Central to
                 our approach is the evidence graph model that
                 facilitates evidence presentation and automated
                 reasoning. Based on the evidence graph, we propose a
                 hierarchical reasoning framework that consists of two
                 levels. Local reasoning aims to infer the functional
                 states of network entities from local observations.
                 Global reasoning aims to identify important entities
                 from the graph structure and extract groups of densely
                 correlated participants in the attack scenario. This
                 article also presents a framework for interactive
                 hypothesis testing, which helps to identify the
                 attacker's nonexplicit attack activities from secondary
                 evidence. We developed a prototype system that
                 implements the techniques discussed. Experimental
                 results on various attack datasets demonstrate that our
                 analysis mechanism achieves good coverage and accuracy
                 in attack group and scenario extraction with less
                 dependence on hard-coded expert knowledge.",
  acknowledgement = ack-nhfb,
  articleno =    "4",
  fjournal =     "ACM Transactions on Information and System Security",
  journal-URL =  "http://portal.acm.org/browse_dl.cfm?idx=J789",
  keywords =     "evidence graph; hierarchical reasoning; network
                 forensics",
}

Related entries