Efficient Reactive Forensic Investigation Model for Large APT Computer Network Events
| dc.contributor.author | Cusack, Brian | |
| dc.contributor.author | Nicho, Mathew | |
| dc.date.accessioned | 2025-02-14T03:07:46Z | |
| dc.date.available | 2025-02-14T03:07:46Z | |
| dc.date.issued | 2024-09-07 | |
| dc.description.abstract | Forensic investigation is an evidential process that occurs after a computer network security event to ascertain causes, vulnerabilities, and remediation actions. The security problem is establishing evidential providence when Advanced persistent threats (APT) are deceptive, learn new behaviors, and erase evidence of activity. Proactive defense mechanisms such as honey pots, fake files and so on filter many APT attacks but network security also relies on reactive forensic investigation after security events to learn tactics and to harden the system. Root cause analysis of APT activity is frustrated by gaps in the data, similarity of normal and malicious network processes, confusion with other network attacks, and the evasive behavior of an APT. In this research the problem of APT evidential providence in reactive APT investigation is addressed by innovating an APT network forensic investigation model (APT-FIM) solution to differentiate reactive APT evidence from other evidence in a computer network investigation. The APT-FIM is structured from the APT definition using Object Oriented (OO) methods and designed for practical use by a security practitioner on secondary data sources. The contribution of the research is to formulate efficient methods and effective big data guidance for reactive APT investigation. Two use cases are used to assess the model and to identify missing requirements. A practitioner flow chart for use results. | |
| dc.identifier.doi | 10.2139/ssrn.4949860 | |
| dc.identifier.uri | http://hdl.handle.net/10292/18660 | |
| dc.relation.uri | https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4949860 | |
| dc.rights | Copyright © 2024 Elsevier Inc., its licensors, and contributors. All rights are reserved, including those for text and data mining, AI training, and similar technologies. For all open access content, the relevant licensing terms apply. This is a preprint article, it offers immediate access but has not been peer reviewed. | |
| dc.rights.accessrights | OpenAccess | |
| dc.subject | 08 Information and Computing Sciences | |
| dc.subject | Strategic, Defence & Security Studies | |
| dc.subject | 4604 Cybersecurity and privacy | |
| dc.subject | Big data evidential efficiency | |
| dc.subject | Evidential providence | |
| dc.subject | Network security | |
| dc.subject | Forensic investigation | |
| dc.subject | Advanced persistent threat | |
| dc.title | Efficient Reactive Forensic Investigation Model for Large APT Computer Network Events | |
| dc.type | Journal article (preprint) | |
| pubs.elements-id | 572611 |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Cusack_2024_preprint_Effective reactive forensic investigation model.pdf
- Size:
- 253.31 KB
- Format:
- Adobe Portable Document Format
- Description:
- Journal article (preprint)
