A Formal Approach to Analyzing Cyber-Forensics Evidence

04/26/2018
by   Erisa Karafili, et al.
0

The frequency and harmfulness of cyber-attacks are increasing every day, and with them also the amount of data that the cyber-forensics analysts need to collect and analyze. In this paper, we propose a formal analysis process that allows an analyst to filter the enormous amount of evidence collected and either identify crucial information about the attack (e.g., when it occurred, its culprit, its target) or, at the very least, perform a pre-analysis to reduce the complexity of the problem in order to then draw conclusions more swiftly and efficiently. We introduce the Evidence Logic EL for representing simple and derived pieces of evidence from different sources. We propose a procedure, based on monotonic reasoning, that rewrites the pieces of evidence with the use of tableau rules, based on relations of trust between sources and the reasoning behind the derived evidence, and yields a consistent set of pieces of evidence. As proof of concept, we apply our analysis process to a concrete cyber-forensics case study.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/15/2019

Time-Stamped Claim Logic

The main objective of this paper is to define a logic for reasoning abou...
research
01/05/2021

Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning

Cyber-attacks are increasing and varying dramatically day by day. It has...
research
04/30/2019

An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks

We expect an increase in frequency and severity of cyber-attacks that co...
research
04/27/2014

An Argumentation-Based Framework to Address the Attribution Problem in Cyber-Warfare

Attributing a cyber-operation through the use of multiple pieces of tech...
research
04/21/2021

Evidential Cyber Threat Hunting

A formal cyber reasoning framework for automating the threat hunting pro...
research
07/07/2016

Argumentation Models for Cyber Attribution

A major challenge in cyber-threat analysis is combining information from...
research
05/01/2017

Argumentation-based Security for Social Good

The increase of connectivity and the impact it has in every day life is ...

Please sign up or login with your details

Forgot password? Click here to reset