{"title":"数据泄露攻击的取证取证模型","authors":"Weifeng Xu, Jie Yan, H. Chi","doi":"10.1109/ISI.2019.8823391","DOIUrl":null,"url":null,"abstract":"Data leakage attack is a serious threat to daily business operations. Reconstructing scenes after attacks is critical because the reconstructed scenarios help security analysts to understand these attacks and prevent future incidents. In this paper, we have proposed a systematic approach to reconstruct attack scenes based on a forensic evidence acquisition model. We first build the model, i.e., data leakage-evidence tree, from which digital forensic examiners can collect forensic evidence, then we formalize the tree and evaluate the semantics of the tree based on the evidence found on digital devices and their supporting environments. Finally, we reconstruct the data leakage scenarios based on the semantics of the tree. Our empirical study reconstructs a data breach scenario using a real-world example.","PeriodicalId":156130,"journal":{"name":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","volume":"25 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-07-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":"{\"title\":\"A Forensic Evidence Acquisition Model for Data Leakage Attacks\",\"authors\":\"Weifeng Xu, Jie Yan, H. Chi\",\"doi\":\"10.1109/ISI.2019.8823391\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Data leakage attack is a serious threat to daily business operations. Reconstructing scenes after attacks is critical because the reconstructed scenarios help security analysts to understand these attacks and prevent future incidents. In this paper, we have proposed a systematic approach to reconstruct attack scenes based on a forensic evidence acquisition model. We first build the model, i.e., data leakage-evidence tree, from which digital forensic examiners can collect forensic evidence, then we formalize the tree and evaluate the semantics of the tree based on the evidence found on digital devices and their supporting environments. Finally, we reconstruct the data leakage scenarios based on the semantics of the tree. Our empirical study reconstructs a data breach scenario using a real-world example.\",\"PeriodicalId\":156130,\"journal\":{\"name\":\"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"volume\":\"25 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2019-07-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"4\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ISI.2019.8823391\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2019 IEEE International Conference on Intelligence and Security Informatics (ISI)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ISI.2019.8823391","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Forensic Evidence Acquisition Model for Data Leakage Attacks
Data leakage attack is a serious threat to daily business operations. Reconstructing scenes after attacks is critical because the reconstructed scenarios help security analysts to understand these attacks and prevent future incidents. In this paper, we have proposed a systematic approach to reconstruct attack scenes based on a forensic evidence acquisition model. We first build the model, i.e., data leakage-evidence tree, from which digital forensic examiners can collect forensic evidence, then we formalize the tree and evaluate the semantics of the tree based on the evidence found on digital devices and their supporting environments. Finally, we reconstruct the data leakage scenarios based on the semantics of the tree. Our empirical study reconstructs a data breach scenario using a real-world example.