[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/SPW.2013.12guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Understanding Network Forensics Analysis in an Operational Environment

Published: 23 May 2013 Publication History

Abstract

The manual forensics investigation of security incidentsis an opaque process that involves the collection and correlation of diverse evidence. In this work we conduct a complex experiment to expand our understanding of forensics analysis processes. During a period of four weeks we systematically investigated 200 detected security incidents about compromised hosts within a large operational network. We used data from four commonly-used security sources, namely Snort alerts, reconnaissance and vulnerability scanners, blacklists, and a search engine, to manually investigate these incidents. Based on our experiment, we first evaluate the (complementary) utility of the four security data sources and surprisingly find that the search engine provided useful evidence for diagnosing many more incidents than more traditional security sources, i.e., blacklists, reconnaissance and vulnerability reports. Based on our validation, we then identify and make available a list of 138 good Snort signatures, i.e., signatures that were effective in identifying validated malware without producing false positives. In addition, we compare the characteristics of good and regular signatures and highlight a number of differences. For example, we observe that good signatures check on average 2.14 times more bytes and 2.3 times more fields than regular signatures. Our analysis of Snort signatures is essential not only for configuring Snort, but also for establishing best practices and for teaching how to write new IDS signatures.

Cited By

View all
  • (2018)A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection SystemsACM Computing Surveys10.1145/318489851:3(1-41)Online publication date: 22-Jun-2018
  • (2017)Efficient Attack Graph Analysis through Approximate InferenceACM Transactions on Privacy and Security10.1145/310576020:3(1-30)Online publication date: 31-Jul-2017
  • (2016)HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingEURASIP Journal on Information Security10.1186/s13635-016-0030-72016:1(1-14)Online publication date: 1-Dec-2016
  • Show More Cited By
  1. Understanding Network Forensics Analysis in an Operational Environment

    Recommendations

    Comments

    Please enable JavaScript to view thecomments powered by Disqus.

    Information & Contributors

    Information

    Published In

    cover image Guide Proceedings
    SPW '13: Proceedings of the 2013 IEEE Security and Privacy Workshops
    May 2013
    180 pages
    ISBN:9780769550176

    Publisher

    IEEE Computer Society

    United States

    Publication History

    Published: 23 May 2013

    Author Tags

    1. IDS
    2. Infections
    3. Malware
    4. Network forensics

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 15 Jan 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2018)A Systematic Mapping Study on Intrusion Alert Analysis in Intrusion Detection SystemsACM Computing Surveys10.1145/318489851:3(1-41)Online publication date: 22-Jun-2018
    • (2017)Efficient Attack Graph Analysis through Approximate InferenceACM Transactions on Privacy and Security10.1145/310576020:3(1-30)Online publication date: 31-Jul-2017
    • (2016)HTTPS traffic analysis and client identification using passive SSL/TLS fingerprintingEURASIP Journal on Information Security10.1186/s13635-016-0030-72016:1(1-14)Online publication date: 1-Dec-2016
    • (2016)Network forensicsJournal of Network and Computer Applications10.1016/j.jnca.2016.03.00566:C(214-235)Online publication date: 1-May-2016
    • (2016)Automated root cause identification of security alertsFuture Generation Computer Systems10.1016/j.future.2015.09.00956:C(375-387)Online publication date: 1-Mar-2016

    View Options

    View options

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media