Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs

Laetitia Leichtnam, Eric Totel, Nicolas Prigent, Ludovic Me

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

When analyzing the security of activities in a highly distributed system, an analyst faces a huge number of events, mainly coming from network supervision mechanisms. To analyze this huge amount of information, the analyst often starts from an indicator of compromise (IoC), an observable that suggests that a compromise may have occurred, and looks for the information related to this IoC as it could help to explain the related security incident. This approach is referred to as forensic analysis. In this paper, we propose an approach to treat automatically network events to provide the analyst with a new way to determine the subset of information related to a given IoC. This approach relies firstly on the generation of graphs between so-called "Security Objects"that are built from the logged network events, and secondly on the automatic processing of these graphs based on graphs communities analysis.

Original languageEnglish
Title of host publicationProceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages565-573
Number of pages9
ISBN (Electronic)9781728185972
DOIs
Publication statusPublished - 1 Sept 2020
Externally publishedYes
Event5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020 - Virtual, Genoa, Italy
Duration: 7 Sept 202011 Sept 2020

Publication series

NameProceedings - 5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020

Conference

Conference5th IEEE European Symposium on Security and Privacy Workshops, Euro S and PW 2020
Country/TerritoryItaly
CityVirtual, Genoa
Period7/09/2011/09/20

Keywords

  • forensic
  • intrusion detection

Fingerprint

Dive into the research topics of 'Forensic Analysis of Network Attacks: Restructuring Security Events as Graphs and Identifying Strongly Connected Sub-graphs'. Together they form a unique fingerprint.

Cite this