33,972 research outputs found
Forensic analysis of xbox one and playstation 4 gaming consoles
© 2016 IEEE. This paper highlights the challenges faced due to non-Availability of trusted specialized forensic tools for conducting investigation on gaming consoles. We have developed a framework to examine existing state-of-The-Art forensic acquisition and analysis tools by exploring their applicability to eighth generation gaming consoles such as the Xbox One and PlayStation 4. The framework is used to validate the acquired images, compare the retrieved artifacts before and after restoring the console to the factory settings, and to conduct network forensics on both devices. The paper reveals the need of specialized forensic tools for forensic analysis of these devices
ASAP : automatic semantics-aware analysis of network payloads
Automatic inspection of network payloads is a prerequisite for
effective analysis of network communication. Security research has largely
focused on network analysis using protocol specifications, for example for
intrusion detection, fuzz testing and forensic analysis. The specification of
a protocol alone, however, is often not sufficient for accurate analysis of
communication, as it fails to reflect individual semantics of network
applications. We propose a framework for semantics-aware analysis of network
payloads which automaticylly extracts semantic components from recorded
network traffic. Our method proceeds by mapping network payloads to a vector
space and identifying semantic templates corresponding to base directions in
the vector space. We demonstrate the efficacy of semantics-aware analysis in
different security applications: automatic discovery of patterns in honeypot
data, analysis of malware communication and network intrusion detection
A graph oriented approach for network forensic analysis
Network forensic analysis is a process that analyzes intrusion evidence captured from networked environment to identify suspicious entities and stepwise actions in an attack scenario. Unfortunately, the overwhelming amount and low quality of output from security sensors make it difficult for analysts to obtain a succinct high-level view of complex multi-stage intrusions.
This dissertation presents a novel graph based network forensic analysis system. The evidence graph model provides an intuitive representation of collected evidence as well as the foundation for forensic analysis. Based on the evidence graph, we develop a set of analysis components in a hierarchical reasoning framework. Local reasoning utilizes fuzzy inference to infer the functional states of an host level entity from its local observations. Global reasoning performs graph structure analysis to identify the set of highly correlated hosts that belong to the coordinated attack scenario. In global reasoning, we apply spectral clustering and Pagerank methods for generic and targeted investigation
respectively. An interactive hypothesis testing procedure is developed to identify hidden attackers from non-explicit-malicious evidence. Finally, we introduce the notion of target-oriented effective event sequence (TOEES) to semantically reconstruct stealthy attack scenarios with less dependency on ad-hoc expert knowledge. Well established computation methods used in our approach provide the scalability needed to perform
post-incident analysis in large networks. We evaluate the techniques with a number of intrusion detection datasets and the experiment results show that our approach is effective in identifying complex multi-stage attacks
- …