23 Attack Graphs with Anti-Forensics Tool - in Forensics Examination Available to Purchase
-
Published:2013
Download citation file:
Attack graphs used to compute possible attack paths and hidden activities for given system configuration with information available in Anti-Forensics Vulnerability Database. The purpose of this attack graphs is to help forensics investigator to identify potential attack path(s) with possible vulnerability sequence for the attack. After attack, investigator will find out the right path with the attack graph and the configuration because the graphs will have all possible attack sequence for the attack. But there are possibilities that the evidence can be obfuscate, encrypt, minimized or eliminated if anti-forensics tool is being used. For the anti-forensics tool there are proposal to use another single node (Anti-forensics Activity) every activity but my proposal is to use Hidden-Path which has anti-forensics node in it. With my proposal not only we can identify the use of anti-forensics tool but also generate potential attack sequence.