Analyzing Cyber-Attack Intention for Digital Forensics Using Case-Based Reasoning

01/05/2021
by   Mohammad Rasmi AL-Mousa, et al.
0

Cyber-attacks are increasing and varying dramatically day by day. It has become challenging to control cyber-attacks and to identify the perpetrators and their intentions. In general, the analysis of the intentions of cyber-attacks is one of the main challenges in digital forensics. In many cases of cyber-attacks, the analysis of the intent of the attacks determines the strategy and tools used in the attack, thus facilitating the process of identifying the perpetrator of the attack with greater accuracy. In this paper a model will be proposed to analyze the intentions of cyber-attacks. In this proposal, a set of steps will be conceived by linking them with a case-based reasoning methodology. This model will be examined by analyzing the intent of attacks for some cases and comparing the results with other methods of analyzing the intent of attacks. Hopefully the results will determine the intent of cyber-attacks more accurately.

READ FULL TEXT

page 3

page 5

research
04/26/2018

A Formal Approach to Analyzing Cyber-Forensics Evidence

The frequency and harmfulness of cyber-attacks are increasing every day,...
research
09/05/2018

Probabilistic Modeling and Inference for Obfuscated Cyber Attack Sequences

A key element in defending computer networks is to recognize the types o...
research
03/31/2021

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

The number of cyber attacks has increased tremendously in the last few y...
research
07/18/2020

Active Deception using Factored Interactive POMDPs to Recognize Cyber Attacker's Intent

This paper presents an intelligent and adaptive agent that employs decep...
research
01/06/2023

Unsupervised attack pattern detection in honeypot data using Bayesian topic modelling

Cyber-systems are under near-constant threat from intrusion attempts. At...
research
03/06/2021

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Cyber-attacks continue to grow, both in terms of volume and sophisticati...
research
03/08/2023

Automated Cyber Defence: A Review

Within recent times, cybercriminals have curated a variety of organised ...

Please sign up or login with your details

Forgot password? Click here to reset