Skip to Main Content
Skip Nav Destination
ASME Press Select Proceedings
International Conference on Computer Research and Development, 5th (ICCRD 2013)Available to Purchase
Editor
Fan Yama
Fan Yama
Search for other works by this author on:
ISBN:
9780791860182
No. of Pages:
278
Publisher:
ASME Press
Publication date:
2013

Attack graphs used to compute possible attack paths and hidden activities for given system configuration with information available in Anti-Forensics Vulnerability Database. The purpose of this attack graphs is to help forensics investigator to identify potential attack path(s) with possible vulnerability sequence for the attack. After attack, investigator will find out the right path with the attack graph and the configuration because the graphs will have all possible attack sequence for the attack. But there are possibilities that the evidence can be obfuscate, encrypt, minimized or eliminated if anti-forensics tool is being used. For the anti-forensics tool there are proposal to use another single node (Anti-forensics Activity) every activity but my proposal is to use Hidden-Path which has anti-forensics node in it. With my proposal not only we can identify the use of anti-forensics tool but also generate potential attack sequence.

1. Introduction
2. Releted Work
3. New Generation Attack Path
4. Hidden Path Capabilities
5. Discussion
6. Conclusion
References
This content is only available via PDF.
You do not currently have access to this chapter.

or Create an Account

Close Modal
Close Modal