vidual network connections in certain cases. This can
be achieved through appropriate attribute filtering, but
a challenge is how to make both of these methods ac-
cessible to the analyst. Another challenge associated
with graph analysis is the need for a mindset change
as analysts are used to other approaches. However,
our experience shows that they can naturally analyze
the data provided in this way after a while. This ob-
servation requires a more detailed verification, which
we plan to perform in future work.
5 CONCLUSION
Graph-based network forensics is a new approach
to analyzing network traffic data utilizing mod-
ern database technologies capable of storing large
amounts of information based on their associations.
It follows the typical way of human thinking and
perception of the characteristics of the surrounding
world. Its main advantage is the connection of ex-
ploratory analysis of network traffic data with results
visualization allowing analysts to easily go through
the acquired knowledge and visually identify interest-
ing network traffic. Our experience also shows that
this approach is not only the new method of data stor-
age and querying, but it is a shift of mindset that al-
lows us to perceive network data in a new way.
In this paper, we introduced the GRANEF toolkit
utilizing Dgraph database that stores transformed in-
formation from network traffic captures extracted by
Zeek network security monitor. The stored data are
presented to the user via a web-based user interface
that provides an abstraction layer above the database
query language and allows the user to efficiently
query data, visualize results in the form of a relation-
ship diagram, and perform exploratory analysis.
Our aim of the provided toolkit description was
to introduce a new approach to network forensics
and incident investigation and describe this solution’s
specifics. As part of future work, we want to further
compare this approach with other typically used an-
alytical methods, both in terms of functionality and
analyst’s behavior. Furthermore, we plan to focus on
the definition of new methods for automatic analysis
of network traffic based on the associations provided
by our proposed data model. We also see great po-
tential in connecting various data types and sources,
which could create a unified analytical environment
allowing us to analyze the data obtained from hosts
and network traffic in one place. The first evaluation
results of the proposed approach demonstrate its great
potential for network forensics and generally for ex-
ploratory analysis of network traffic data.
ACKNOWLEDGEMENTS
This project has received funding from the European
Union’s Horizon 2020 research and innovation pro-
gramme under grant agreement No 833418.
REFERENCES
Atkin, H. (2011). Criminal Intelligence: Manual for Ana-
lysts. UNODC Criminal Intelligence Manual for Ana-
lysts. United Nations Office on Drugs and Crime (UN-
ODC).
Dgraph Labs, Inc. (2021). Native GraphQL Database: The
Best Graph DB | Dgraph. https://dgraph.io/. Ac-
cessed: 2021-01-21.
Diederichsen, L., Choo, K.-K. R., and Le-Khac, N.-A.
(2019). A Graph Database-Based Approach to Ana-
lyze Network Log Files. In Network and System Secu-
rity, pages 53–73. Springer International Publishing.
Digital Corpora (2020). The 2012 National Gallery DC Sce-
nario. https://digitalcorpora.org/corpora/scenarios/
national-gallery-dc-2012-attack. Accessed: 2021-01-
21.
Fernandes, G., Rodrigues, J. J. P. C., Carvalho, L. F., Al-
Muhtadi, J. F., and Proença, M. L. (2018). A com-
prehensive survey on network anomaly detection.
Telecommunication Systems.
Khan, S., Gani, A., Wahab, A. W. A., Shiraz, M., and Ah-
mad, I. (2016). Network forensics: Review, taxon-
omy, and open challenges. Journal of Network and
Computer Applications, 66:214–235.
Leichtnam, L., Totel, E., Prigent, N., and Mé, L. (2020).
Sec2graph: Network Attack Detection Based on Nov-
elty Detection on Graph Structured Data. In Detection
of Intrusions and Malware, and Vulnerability Assess-
ment, pages 238–258. Springer International Publish-
ing.
Messier, R. (2017). Network Forensics. John Wiley & Sons,
Ltd.
Neise, P. (2016). Intrusion Detection Through Relationship
Analysis. Technical report, SANS Institute.
Neo4j (2021). Neo4j Graph Platform - The Leader in Graph
Databases. https://neo4j.com. Accessed: 2021-01-30.
The Zeek Project (2020). The Zeek Network Security Mon-
itor. https://zeek.org/. Accessed: 2021-01-21.
Tovar
ˇ
nák, D., Špa
ˇ
cek, S., and Vykopal, J. (2020). Traffic
and log data captured during a cyber defense exercise.
Data in Brief, 31.
Velan, P. (2018). Application-Aware Flow Monitoring.
Doctoral theses, dissertations, Masaryk University,
Faculty of Informatics, Brno.
W3C (2014). RDF 1.1 N-Triples. https://www.w3.org/TR/
n-triples/. Accessed: 2021-01-21.
Zhang, H., Zeng, H., Priimagi, A., and Ikkala, O.
(2020). Viewpoint: Pavlovian Materials—Functional
Biomimetics Inspired by Classical Conditioning. Ad-
vanced Materials, 32(20).
SECRYPT 2021 - 18th International Conference on Security and Cryptography
790