Reconstruction of Events in Digital Forensics
|
|
|
- Howard Hood
- 9 years ago
- Views:
Transcription
1 Reconstruction of Events in Digital Forensics M.A.Rama Prasad 1 Y.Naga Satish 2 1,2 Department.of Computer Science and Engineering, 1 Vignan.s Lara Institute of Technology and Science, Vadlamudi 2 BVC Institute of Technology and Science, Amalapuram ABSTRACT Detecting and gaining clues from the crime scene plays a major role in the process of investigation. Now days with increase of cybercrime and fraud on the internet, digital forensics gaining importance. It needs to collect information the events happened at crime place. This paper deals with event reconstruction process which is useful for digital crime scene. The process of reconstruction is based on crime event and event characteristics. It also furnishes crime rate guess using some semi-formal techniques. Keywords: digital investigation, digital forensics, events, attack trees, reconstruction, evidence. 1. INTRODUCTION Digital forensics is gaining importance with the increase of cybercrime and fraud on the Internet. Tools and methodologies for digital forensics with the soundness necessary for presentation in court are in high demand. Computer forensics can be summarized as the process of identifying, collecting, preserving, analyzing and presenting the computer-related evidence in a manner that is legally acceptable by court (McKemmish, 1999; Noblett et al., 2000; Robbins, 2000; Borck, 2001; Garber, 2001; Patzakis, 2003; Yasinsac, 2003; Slade, 2004; Bitpipe, 2005). [2] The goal of this section is to introduce the terms Computer Crime, Digital Evidence and Digital Forensic Analysis and show their basic concepts. There are two aspects of Computer Crime, which are defined by the world s leading computer forensic equipment company DIBS [DIB] as follows: A criminal act in which a computer is essential to the perpetration of the crime. A criminal act where a computer, non-essential to perpetration of the crime, acts as a store of information, concerning the crime. This is to say that not only the crimes committed directly with a computer belong to this field of offense but also crimes where evidence could be found on computers or networks without necessarily using those devices to actually commit the crime. CASE EXAMPLE If the police has a certain suspect in a homicide, the investigation of his computer may reveal certain details about his contact to the victim (e.g. s and chats), or even research about how to get rid of a corpse. The analysis of the suspects cell phone may refute his alibi or also give details about contact between suspect and victim. With this definition it becomes obvious which important role digital crime analysis has nowadays and that its role in crime investigation will not decrease but more likely increase in the upcoming years. There is nearly no imaginable crime in which no computer or network can be involved. Therefore, besides the increasing number of electronic fraud or crimes committed directly with a computer, the branch of digital investigation will become more important for classical evidence collection and crime investigation. The term Digital Evidence describes all the information that can be gained from electronic devices. This can be storage media like hard disks, network logs, cell phone logs, s and so on. Digital Forensic Analysis is divided into two main branches. The first one is Physical Storage Media Analysis and the second Network Analysis.[1] One of the standard works on Digital Forensic Analysis is Brian Carrier`s File System Forensic Analysis [15]. Figure 1.1 shows the global price tag of cybercrime. ISSN: Page 3460
2 Figure 1.1. Norton cybercrime 2012 report. Figure 1.2 shows the three major phases of digital crime investigstion. These are the System Preservation-, Evidence Searching- and Event Reconstruction Phase. As Figure 1.2 indicates these three phases do not need to occur one after another but there are trackbacks from every phase to the previous. System Preservation Evidence Searching Event Reconstruction Figure 1.2.Phases of a digital crime scene investigation. 1.1 System Preservation This phase is always the first thing to do once a digital crime is detected or even assumed. As with classic crimes the first act of investigation is to preserve the crime scene. This is the main aspect of this phase. In classic crime investigation you can close of the crime scene, e.g. a house or at, but it is more difficult to follow this approach in digital investigation. Here it is difficult to shut down a network or computers without altering data. As with classic crime scenes it should be tried to avoid every change of the evidences. It has to be tried to copy and save all information contained in the network or on physical storage devices without changing them. It is important to have a proof that the data was not changed during the investigation process. One approach to achieve this is to compute a cryptographic hash sum of the data, which would indicate a change of them later. 1.2 Search for Evidence Now, after the crime scene is preserved, the next step is to look for evidences. As a digital crime is assumed the digital investigator creates hypotheses which can either be supported or refuted by evidence found in the data. It is a major aspect not only to look for evidence that supports a specific hypothesis because the hypothesis always could be wrong. The main methods for searching for evidence are: to look at log files, e.g., those of routers or other network components, search for altered data, e.g., again with cryptographic hash sums, looking for root kits, e.g., by checking the low levels of the operating system, search the file system for ominous files. 1.3 Event Reconstruction The third and last phase of the digital investigation process is to use the collected evidences to reconstruct what has happened in the system or network. To do this, it is necessary to correlate various evidence, maybe even from differ rent sources, to get a proof of the one hypothesis that stands last. For this phase it is important to have a knowledge of the operating systems and the network basics of the digital components involved in the crime. To understand how an operating system or the network components work is essential to come to a clue what the hints are indicating. ISSN: Page 3461
3 2. EVENT RECONSTRUCTION Event reconstruction, or event analysis, examines the evidence to identify why it has its characteristics. Many events occur at a crime scene, including the ones that are considered a crime or policy violation. The events that occurred prior to the incident may need to be understood to fully explain the incident. The reconstruction phase identifies the events for which evidence exists to support their occurrence. Conceptually, this phase adds an additional dimension to the evidence. Instead of having information about only the final state of an object, this phase attempts to deduce the previous states by examining the events in which an object may have been involved. [4 ] 2.1. General concepts Definitions Digital data are data represented in a numerical form. A digital event is an occurrence that changes the state of one or more digital objects [5]. If the state of an object changes as a result of an event, then it is an effect of the event. A digital object is a discrete collection of digital data, such as a file, a hard disk sector, a network packet, a memory page, or a process. The state of an object is the value of its characteristics. If a letter were changed in an ASCII text document, then the object corresponding to the file would have a new state. Note that because digital objects are stored in a physical form, then their state can be changed by both physical and digital events. An object is evidence of an event if the event changed the object s state.[5] Now we can classify objects with respect to their roles in events. At the highest level, we can use the following roles: Cause: An object plays the role of a cause if its characteristics were used in the event. A test for this role is to identify if the same effect would have occurred, if the object were to not exist. Effect: An object plays the role of an effect if its state was changed by a cause object in the event. Objects that are causes may be passive. That is, they are used in the event, but they are not changed by the event. If a cause object is changed by the event, then it is both a cause and an effect object. From this if an object is an effect but not a cause, then it must have been created as a result of the event. The cause objects can be thought of as the tools and scientific laws that determine how an event will occur. We can graphically represent this definition of an event as shown in Fig (A). Each circle represents a state of an object and each box represents an event. In this graph, objects P, Q, and R were causes of the event E and object P is also an effect, with its new state noted by P 1 In some cases, it may be possible or may not possible to identify a cause object that initiated the event. The initiator of the event is the object or event that began the event. P Q R P Q R E E 1 E 2 P 1 (A) P 1 (B) Figure Graphical representation of (A) an event with three cause objects and one effect object and (B) an event chain with two events. An event chain is a sequence of events _e0, e1,..., ek_ such that an effect of event ei is a cause of event ei+1 for i =1, 2,...,k 1. We can see this in Fig (B), where event E1 causes event E2 because of its effect on object P. 3. SEMI-FORMAL TECHNIQUES FOR EVENT RECONSTRUCTION PROCESS 3.1. Attack trees An important part of reconstruction process is identification of possible incident Scenarios. Attack trees described in [7] is a semi-formal approach to discovery, documentation, and analysis of possible incident scenarios. An attack tree is a diagram that describes different scenarios achieving some goal. The goal is represented by the root node. Other nodes represent sub goals that must be achieved - either alone, or in conjunction with other sub goals - to achieve the goal. ISSN: Page 3462
4 Figure 3.1 shows an attack tree of opening a safe without authorization (this example is taken from [8]. The goal of the tree is to open a safe. The goal can be achieved in a number of different ways, such as picking the lock. Open Safe Pick lock I Learn Combo Cut Open safe P Install Improperly I Find Written Combo Get Combo from target Threaten Blackmail I Eavesdrop Bribe P P=Possible I=Impossible Listen to conversation P Get target to state combo Figure Attack trees Attack tree describing different ways to open a safe cutting through the safe wall, learning the combo, or making a security hole when the safe is installed. Different ways of learning a combo are elaborated under the learn combo" node. Basic attack tree is built from two types of node: AND nodes, and OR nodes. In this paper, AND node is graphically distinguished from an OR node by an arc that joins arrows coming out of the AND node. Both AND and OR nodes describe sub-goals that need to be fulfilled to fulfil the main goal of attack. To fulfil an OR node, any one of its child nodes must be fulfilled. To fulfil an AND node, all of its child nodes must be fulfilled. A possible scenario corresponds to every group of leaf nodes, whose joint fulfilment results in the fulfilment of the tree's root node. Once the attack tree is built, the analyst can calculate various properties of the discovered scenarios. The simplest property to calculate is whether a scenario is possible. Finding possible scenarios is a three-step process. In the first step, the analyst assigns a value possible" or impossible" to each leaf node. To decide whether a particular leaf node is possible or impossible, the analyst uses available evidence. In the second step, the analyst decides for every other node whether it is possible or not using the following rules An OR node is possible if at least one of its child nodes is possible; An AND node is possible if all of its child nodes are possible. In the third step, all possible scenarios are identified by tracing them from root to leafs along chains of possible" nodes. Attack trees permit other types of scenario comparison. In particular, they can be used to calculate probability and cost of different scenarios Visual investigative analysis Another semi-formal technique used for event reconstruction is Visual Investigative Analysis (VIA). It is a charting technique that uses a network approach to display graphically the sequences of occurrences and the relationships of all the elements of a criminal incident [9]. ISSN: Page 3463
5 3.2.1Graphical notation VIA chart is a directed acyclic graph whose arrows represent activities and whose nodes represent states of the world in which activities start and finish. The following graphical notation is used to draw VIA charts. Solid line arrows: A solid line arrow represents single activity. The description of the activity is placed above the arrow. Activity always start at one node and ends at another. To improve clarity of the chart, only one solid line arrow is permitted between any two nodes. Circles and triangles: Circles and triangles are nodes. A node represents the world state in which one or more activities start or finish. Terminal is the last node in a sequence of activities. There is usually only one terminal on a chart. Terminals are drawn as triangles. All other nodes are drawn as circles. Dotted lines and arrows: A dotted line or arrow denotes a dummy activity. Dummy activity consumes no time and does nothing. It simply says that two nodes denote the same world state. Dotted lines are used for drawing parallel activities whose starting and ending world states are the same. 3.3Multilinear events sequencing Multilinear event sequencing (MES) is a set of semi-formal techniques for conducting investigations [10]. It is based on the same ideas as visual investigative analysis and attack trees. 3.4.Why-because analysis Why-Because Analysis (WBA) is a method for determining causes of complex accidents. Like MES, it uses counterfactual reasoning to establish causality, but the approach taken by WBA is more formal Why-because graph The graphical notation used by WBA to represent accidents is Why-because graph (WB-graph). It is a directed acyclic graph whose nodes represent elements of the accident, and whose arrows represent causal relationship. Four kinds of nodes are defined for building WB-graphs. A node can be either of the following event --change from one state to another process --undifferentiated mix of events and states non-event --causally important absence of some event 4. EVENT RECONSTRUCTION PROCESS Event Reconstruction Process Evidence Examination Hypothesis Testing Role Classification Event Sequencing. Event construction & Testing Figure Event reconstruction phases ISSN: Page 3464
6 We will now examine the five event reconstruction phases with respect to a digital crime scene Evidence Examination The evidence examination phase examines each piece of digital evidence to identify it and individualize it. In the process, the class and individual characteristics will be determined. Examples of the class characteristics of digital data include any general data format values, such as the header signatures ( magic values ) and file extensions. Individual characteristics are those that may be unique to that file and will include the actual content of the file outside of the standard format data. Individual characteristics are rare in digital data. This phase also includes network packets and logs from network devices, not only data from a hard disk. The details associated with data characteristics need more research to identify those that are the most useful and provide the most information. The reliability and credibility of the digital evidence is also examined in this phase. An example of data that could be examined is the times associated with a file and identifying if they can be trusted, if they were updated while responding to the system, or if the attacker modified them. If deleted files were recovered, then the recovery tool should be considered to determine if the recovered file is accurate. If data was taken from a live system, then the procedure relied on software that could have been modified by the attacker and therefore the data should be examined in more detail to find evidence of tampering Role Classification The role classification phase examines each of the objects and identifies what types of information it has. For example, an investigator can use Casey s functional, relational, and temporal analysis techniques [11] to identify the information types an object has. Using the object s information, hypotheses are created about what events the object was a cause of and what events it was an effect of. Every object in the digital crime scene is the effect of an event. For example, a process is the effect of the kernel creating it and data on a disk is an effect of it being written there by the kernel, which was likely an effect of a process causing a system call event. In a typical computer, there are at least two objects that are causes in every event: the hardware and the operating system. The hardware has an influence on the effects of every event and the operating system dictates what events will occur. If an attacker has modified the operating system, then the effects of some events will be different than if the attacker did not modify the operating system. Depending on the level of detail that is needed for the investigation, many of the events dealing with data storage, devices, or processes will be caused and initiated by the kernel and the kernel will be an effect of a system call or similar request from a process to initiate the event. It is unlikely that evidence will exist to reconstruct events at this level, especially because it will require that the memory of a system be acquired before the system is powered off. In a computer, we can reduce all events to reading and writing events. This is similar to being able to reduce the five senses in the physical world to touch at a molecular level. It will not be possible to find evidence of all events at this level though. In general, if data is read from an object for an event, then it is a cause. If data is written to an object from an event, then it is an effect. We will now give some examples of how roles can be determined. If the object is an executable file, then analysis of its system calls can show what events it could have caused. For example, it may open files or network sockets. A more detailed analysis of the executable file may show that it only opens network sockets on a certain port or that it only opens files for reading in a given directory. Files that contain time stamped entries may show that the file was an effect of an event at that time. The Modified, Accessed, and Changed (MAC) times of a file may also show when the object played a role in an event. The modified and changed times show that it was the effect of an event and the accessed time can show that it was either role. Note that the occurrence of an event can be determined even if the attacker forged the actual date or time. As an example, consider the notepad.exe application. A process that is loaded by this executable can be the cause of an event to write an ASCII file. It can also be the cause and effect of an event to read an ASCII file into memory. Now consider an ASCII text file that contains sensitive data. It can be the effect of an event where a process wrote data to it and it can also be the cause of an event where a process read from it Event Construction and Testing The event construction and testing phase takes the role assignments and correlates the cause and effect objects. This phase can be difficult with digital computers because the process and kernel objects are not always collected from the crime scene and they initiate most events. Furthermore, the process and kernel information will be erased when the system is powered off. In many cases, hypotheses will need to be created about the processes that played a role in events. Executable files on the system can be examined to determine the roles a process may play if it were loaded from the executable. One of the benefits of most digital investigations is that the investigator ISSN: Page 3465
7 always has a copy of the crime scene and can easily search it for new evidence. Therefore, in many cases the search for other objects in an event can be performed on both the evidence that has already been collected and on the digital crime scene. When new evidence is found in this phase, it must be examined and have its roles classified so that it can be fully utilized in the reconstruction process. When doing a backward search to find cause objects of events, we can look for objects that could have created the data. Consider data that is found on the disk. Either a process or the kernel initiated the event that wrote it there (we will ignore the possibility that the hard disk initiated it). Using the individual or class characteristics of the data, we can find values that are unique to it and the possible effect objects can be searched. For example, consider a JPEG image. It has a format that not every application can process; so only a limited number of applications would be able to successfully initiate a read event for a JPEG file and reasonably process it. Similarly, only a limited number of applications can write a JPEG file format, so we can search for applications that could have initiated a write event. We can also focus a backward search using access control permissions. Not all users or applications will have permissions to write to or read from a file. Once a possible cause object has been identified, its dependencies need to be identified. For example, an application may have one or more configuration files that are needed for the event to occur and they may contain additional evidence. A forward search identifies the unique data that was being used in the event and searches for data that may have been written to because of the event. The permissions associated with data can also be used in this search direction to restrict the search to only objects that the cause had access to. Testing the events can be challenging in a digital environment because it may require the investigator to execute code from the system. This is dangerous because the investigator may not know everything that the program will do. It is typically safer to test the theories in a trusted and safe environment, such as a virtual machine [12] where the system can be easily isolated and rebuilt. Using our previous example of the ASCII file and notepad.exe, if we wanted to know how the ASCII file was created then we could search the system for all executables that can create an ASCII file. This would result in many applications, including notepad.exe. Tests could be conducted with all identified applications to identify any unique characteristics that may show which created the file.[4] 4.4. Event Sequencing The event sequencing phase orders the events based on when they occurred. Some events will generate a timestamp on a file or in a log file, but another event may change the time. If the execution flow of an executable or process is known, then that information can be used to sequence the events that it caused. Using low-level file system analysis techniques may also help to show the sequence of events. The location of the data structures and storage locations that a file system allocates to a file may reveal information about other files that were created before it. For example, the order of the file name structures in a directory or the order of clusters in files may show when two files were created relative to each other. Using the shell history file from a Unix system is a common method of sequencing the events on the system. Unfortunately, many attackers will delete or modify the history file contents. Theoretically, event sequencing can be easier in the digital world versus the physical world because computers are deterministic and events are initiated by code. Therefore, if the programs and operating system can be reverse engineered, then we may be able to better determine what events need to occur first. Many investigators do not have full access to the code of applications and operating systems though, and therefore the investigator is left to testing applications and observing the events that occur Hypothesis Testing Hypothesis testing for digital crime scenes is no different than for physical crime scenes. At this point in the investigation, we will have a series of event chains and hypotheses about missing events. Each hypothesis should have a confidence level attached to it and this phase examines each hypothesis to determine which was most likely and which the evidence can refute. Knowledge of how digital systems work is important to this phase, but there are no procedures that are unique to digital evidence and not physical evidence. It is in this phase where Stephenson s Petri net hypotheses testing model could be used [13]. 5. CONCLUSION In this paper, we have shown the event reconstruction process in digital crime scenes. It also gives introduction to the field of digital forensics and terminology used. In the event reconstruction process, there are 5 phases, which plays vital role in the investigation is discussed in this paper. In addition to that it also covers the some of the semi- formal approaches used in the reconstruction process to construct events. REFERENCES ISSN: Page 3466
8 [1] Pascal Schottle, July 19, 2009, Digital Forensics in Computer and Cellular Networks. [2] Mohd Taufik Abdullah, Ramlan mahmod, Abdul Azim Ab. Ghani, Mohd Zain Abdullah, and Abu Bakar Md Sultan, Advances in computer Forensics [3] The need for a theory of event Reconstruction. [4] Brian D. Carrier, M.S. and Eugene H. Spafford1 Ph.D. Defining Event Reconstruction of Digital Crime Scenes. [5] An Event-Based Digital Forensic Investigation Framework, Brian D. Carrier Eugene H. Spafford [6] Brian D. Carrier and Eugene H. Spafford. Defining Event Reconstruction of a Digital Crime Scene. Journal of Forensic Sciences, [7] Romig, S.Computer forensics investigations class handouts, See url forensic-computer-investigations lisa/forensics-6up.pdf [8] Schneier, B. Attack trees. modelling security threats. Dr. Dobb's Journal, 12 (1999). [9] Morris, J. Crime Analysis Charting-An Introduction To Visual Investigative Analysis. Palmer Enterprises, Orangevale, CA, USA, [10] Benner, L. Accident investigation: Multilinear event sequencing methods. Journal of Safety Research 7, 2 (1975). [11] Bevel T, Gardner RM. Bloodstain pattern analysis: with an introduction to crime scene reconstruction. 2nd ed. Boca Raton, FL: CRC Press, [12] Kenneally E. Gatekeeping out of the box: open source software as a mechanism to assess reliability for digital evidence. Virginia Journal of Law and Technology 2001;6(3). [13] Stephenson P. Modeling of post-incident root cause analysis. International Journal of Digital Evidence 2003;2(2). [14] Rynearson J. Evidence and crime scene reconstruction. 6th ed. Redding, CA: National Crime Investigation and Training, [15] Brian Carrier. File System Forensic Analysis. Addison-Wesley Professional, BIBLIOGRAPHY OF AUTHORS M.A.Rama Prasad received B.Tech degree in Computer Science from J.N.T. University and M.Tech from J.N.T. University, Hyderabad. Currently he is working as an Assistant Professor of Computer Science and Engineering in Vignan s Lara Institute of Technology and Science. He is involved in research of Computer Forensics and Mobile Computing. Y. N. Satish received B.Tech degree in Computer Science from J. N. T. University and M.E from Satya Bhama University. Currently he is working as an Assistant Professor of Computer Science and Engineering in BVC Institute of Technology and Science. He is involved in research of Computer forensics, and Mobile Computing. ISSN: Page 3467
Digital Forensics in Computer and Cellular Networks
Digital Forensics in Computer and Cellular Networks Pascal Schöttle July 19, 2009 Seminararbeit Ruhr-Universität Bochum Chair for Communication Security Prof. Dr.-Ing. Christof Paar Abstract The goal of
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
Advances in Computer Forensics
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.2, February 2008 215 Advances in Computer Forensics Mohd Taufik Abdullah 1, Ramlan Mahmod 2, Abdul Azim Ab. Ghani 3, Mohd
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
The Enhanced Digital Investigation Process Model
The Enhanced Digital Investigation Process Model Venansius Baryamureeba and Florence Tushabe [email protected], [email protected] Institute of Computer Science, Makerere University P.O.Box 7062,
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Attack Net Penetration Testing
Attack Net Penetration Testing J.P. McDermott Department of Computer Science James Madison University Harrisonburg, Virginia 22807 [email protected] Abstract The modeling of penetration testing as a
Process Modelling from Insurance Event Log
Process Modelling from Insurance Event Log P.V. Kumaraguru Research scholar, Dr.M.G.R Educational and Research Institute University Chennai- 600 095 India Dr. S.P. Rajagopalan Professor Emeritus, Dr. M.G.R
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices
The Proper Acquisition, Preservation, & Analysis of Computer Evidence: Guidelines & Best-Practices Introduction As organizations rely more heavily on technology-based methods of communication, many corporations
Case study on asset tracing
Recovering Stolen Assets: A Practitioner s Handbook ARNO THUERIG * Case study on asset tracing I. Case study background The client adviser of a Swiss private bank transferred approximately USD 1 million
Digital Forensics. General Terms Cyber Crime, forensics models, Investigation, Analysis, digital devices.
Digital Forensics Ravneet Kaur, Amandeep Kaur Assistant Professor in Computer Science SDSPM College for Women, Rayya (Asr) Guru Nanak Dev University, India International Journal of Computer Applications
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
Open Source Digital Forensics Tools
The Legal Argument 1 [email protected] Abstract This paper addresses digital forensic analysis tools and their use in a legal setting. To enter scientific evidence into a United States court, a
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM
DIGITAL FORENSICS SPECIALIZATION IN BACHELOR OF SCIENCE IN COMPUTING SCIENCE PROGRAM Proposed Program Title: Bachelor of Science in Computing Science- Specialization in Digital Forensics Specialization
P Principles of Network Forensics P Terms & Log-based Tracing P Application Layer Log Analysis P Lower Layer Log Analysis
Agenda Richard Baskerville P Principles of P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Principles Kim, et al (2004) A fuzzy expert system for
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Crime Scene Investigation Protocol
Crime Scene Investigation Protocol The State of the Art Larry Barksdale, 8-9-04 Protocols A protocol is a defined way of going about doing something. A protocol may be formally defined in a written policy,
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Network Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
Design and Implementation of a Live-analysis Digital Forensic System
Design and Implementation of a Live-analysis Digital Forensic System Pei-Hua Yen Graduate Institute of Information and Computer Education, National Kaohsiung Normal University, Taiwan [email protected]
Data Security Incident Response Plan. [Insert Organization Name]
Data Security Incident Response Plan Dated: [Month] & [Year] [Insert Organization Name] 1 Introduction Purpose This data security incident response plan provides the framework to respond to a security
CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak
CSN08101 Digital Forensics Lecture 1A: Introduction to Forensics Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Digital Forensics You will learn in this module: The principals of computer
Digital Evidence Search Kit
Digital Evidence Search Kit K.P. Chow, C.F. Chong, K.Y. Lai, L.C.K. Hui, K. H. Pun, W.W. Tsang, H.W. Chan Center for Information Security and Cryptography Department of Computer Science The University
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Survey on Different Phases of Digital Forensics Investigation Models
Survey on Different Phases of Digital Forensics Investigation Models Priya S. Patil 1, Prof. A. S. Kapse 2 P. R. Patil College of Engineering and Technology, Amravati, India ABSTRACT: Most forensics models
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence
Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence Chris Poulin Security Strategist, IBM Reboot Privacy & Security Conference 2013 1 2012 IBM Corporation Securing
Checking signatures at postal vote openings
Checking signatures at postal vote openings Introduction This guidance aims to provide practical advice on postal vote opening procedures, with special regard to carrying out manual checking of signatures.
e-discovery Forensics Incident Response
e-discovery Forensics Incident Response NetSecurity Corporation 21351 Gentry Drive Suite 230 Dulles, VA 20166 VA DCJS # 11-5605 Phone: 703.444.9009 Toll Free: 1.866.664.6986 Web: www.netsecurity.com Email:
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Forensic Analysis of Physical Memory and Page File. Hameed Iqbal
Forensic Analysis of Physical Memory and Page File Hameed Iqbal Master s Thesis Master of Science in Information Security 30 ECTS Department of Computer Science and Media Technology Gjøvik University College,
A Short Introduction to Digital and File System Forensics
Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) [email protected] Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 -
Computer Forensics as an Integral Component of the Information Security Enterprise
Computer Forensics as an Integral Component of the Information Security Enterprise By John Patzakis 10/28/03 I. EXECUTIVE SUMMARY In addition to fending off network intrusions and denial of service attacks,
Forensics on the Windows Platform, Part Two
1 of 5 9/27/2006 3:52 PM Forensics on the Windows Platform, Part Two Jamie Morris 2003-02-11 Introduction This is the second of a two-part series of articles discussing the use of computer forensics in
ITM 642: Digital Forensics Sanjay Goel School of Business University at Albany, State University of New York
INSTRUCTOR INFORMATION Name: Sanjay Goel Email: [email protected] Phone: (518) 442-4925 Office Location: BA 310b, University at Albany Office Hours: TBD CLASS INFORMATION Time: N/A Location: Online Dates:
CSIRT Introduction to Security Incident Handling
CSIRT Introduction to Security Incident Handling P. Jacques Houngbo AIS 2013Technical Workshops Lusaka, Zambia, June 2013 If you think technology can solve your security problems, then you don t understand
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Digital Forensics Tutorials Acquiring an Image with FTK Imager
Digital Forensics Tutorials Acquiring an Image with FTK Imager Explanation Section Digital Forensics Definition The use of scientifically derived and proven methods toward the preservation, collection,
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Database Security Guideline. Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG
Database Security Guideline Version 2.0 February 1, 2009 Database Security Consortium Security Guideline WG Table of Contents Chapter 1 Introduction... 4 1.1 Objective... 4 1.2 Prerequisites of this Guideline...
Large Scale Cloud Forensics
Large Scale Cloud Forensics Edward L. Haletky AstroArch Consulting, Inc. Sam Curry RSA, The Security Division of EMC Session ID: STAR-302 Session Classification: Advanced Happenstance Lo and Behold Sam
Contents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
FORENSIC SCIENCE COURSE DESCRIPTION
FORENSIC SCIENCE COURSE DESCRIPTION This course is an overview of how science is applied to solving crimes. Topics include history of forensic sciences, collecting of evidence, analyzing results and hands-on
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
Mapping Process of Digital Forensic Investigation Framework
IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 163 Mapping Process of Digital Forensic Investigation Framework Siti Rahayu Selamat 1, Robiah Yusof 2, Shahrin
Legal view of digital evidence
Chapter 2 Legal view of digital evidence Before developing a model or a theory, it is important to understand the requirements of the domain in which the model or the theory is going to be used. The ultimate
Digital Forensics. Larry Daniel
Digital Forensics Larry Daniel Introduction A recent research report from The Yankee Group found that 67.6 percent of US households in 2002 contained at least one PC The investigators foresee three-quarters
An Approach to Understand the End User Behavior through Log Analysis
An Approach to Understand the End User Behavior through Log Analysis Nikhil Kumar Singh Department of Computer Science and Engineering Maulana Azad National Institute of Technology Bhopal, India Deepak
Significance of Hash Value Generation in Digital Forensic: A Case Study
International Journal of Engineering Research and Development e-issn : 2278-067X, p-issn : 2278-800X, www.ijerd.com Volume 2, Issue 5 (July 2012), PP. 64-70 Significance of Hash Value Generation in Digital
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
An overview of IT Security Forensics
An overview of IT Security Forensics Manu Malek, Ph.D. Stevens Institute of Technology [email protected] www.cs.stevens.edu/~mmalek April 2008 IEEE Calif. 1 Outline Growing Threats/Attacks Need for Security
DOT HAZMAT SECURITY AWARENESS TRAINING
ERI Safety Videos DVDs, Digital Media & Custom Production 1319 DOT HAZMAT SECURITY AWARENESS TRAINING Leader s Guide Safety Source Productions DOT HAZMAT SECURITY AWARENESS TRAINING This easy-to-use Leader
Framework for Live Digital Forensics using Data Mining
Framework for Live Digital Forensics using Data Mining Prof Sonal Honale #1, Jayshree Borkar *2 Computer Science and Engineering Department, Aabha Gaikwad College of Engineering, Nagpur, India Abstract
Evidence Technician s School
Evidence Technician s School Program Overview The Evidence Technician s School is designed to provide your Evidence Technician or Crime Scene Investigator with a sound foundation of the basic principles
Microsoft Vista: Serious Challenges for Digital Investigations
Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 2 nd, 2008 Microsoft Vista: Serious Challenges for Digital Investigations Darren R. Hayes and Shareq Qureshi Seidenberg School of
Automatic Timeline Construction For Computer Forensics Purposes
Automatic Timeline Construction For Computer Forensics Purposes Yoan Chabot, Aurélie Bertaux, Christophe Nicolle and Tahar Kechadi CheckSem Team, Laboratoire Le2i, UMR CNRS 6306 Faculté des sciences Mirande,
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS
COMMON PHASES OF COMPUTER FORENSICS INVESTIGATION MODELS Yunus Yusoff, Roslan Ismail and Zainuddin Hassan College of Information Technology, Universiti Tenaga Nasional, Selangor, Malaysia [email protected],
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure
Bendigo and Adelaide Bank Ltd Security Incident Response Procedure Table of Contents 1 Introduction...1 2 Incident Definition...2 3 Incident Classification...2 4 How to Respond to a Security Incident...4
Digital Forensics & e-discovery Services
Digital Forensics & e-discovery Services U.S. Security Associates Digital Forensics & e-discovery Services 21st century fraud investigations require expert digital forensics skills to deal with the complexities
Ten Deadly Sins of Computer Forensics
Ten Deadly Sins of Computer Forensics Cyber criminals take advantage of the anonymity of the Internet to escape punishment. Computer Forensics has emerged as a new discipline to counter cyber crime. This
COMMUNITY UNIT SCHOOL DISTRICT 200. Course Description
Forensic Science High School Elective Course Description Forensic Science is a one semester high school level course that satisfies a CUSD200 graduation requirement in the area of science. Successful completion
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS
AN INVESTIGATION INTO COMPUTER FORENSIC TOOLS K.K. Arthur 1 H.S. Venter 2 Information and Computer Security Architectures (ICSA) Research Group University of Pretoria Pretoria Department of Computer Science
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP)
NEW IMPROVEMENT IN DIGITAL FORENSIC STANDARD OPERATING PROCEDURE (SOP) Sundresan Perumal 1, and Norita Md Norwawi. 2 1 Universiti Sains Islam Malaysia,[email protected] 2 Universiti Sains Islam Malaysia,
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements
Improved Event Logging for Security and Forensics: developing audit management infrastructure requirements Atif Ahmad & Anthonie Ruighaver University of Melbourne, Australia Abstract The design and implementation
IBM SECURITY QRADAR INCIDENT FORENSICS
IBM SECURITY QRADAR INCIDENT FORENSICS DELIVERING CLARITY TO CYBER SECURITY INVESTIGATIONS Gyenese Péter Channel Sales Leader, CEE IBM Security Systems 12014 IBM Corporation Harsh realities for many enterprise
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
ReqXChanger Closing the Gap between Requirements and Modelling
ReqXChanger Closing the Gap between Requirements and Modelling Index: Features Principles Usage Example The Gearwheel between Requirements and Modelling Time- and cost pressure, increasing competition,
A Survey on Mobile Forensic for Android Smartphones
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 17, Issue 2, Ver. 1 (Mar Apr. 2015), PP 15-19 www.iosrjournals.org A Survey on Mobile Forensic for Android Smartphones
CPS122 Lecture: State and Activity Diagrams in UML
CPS122 Lecture: State and Activity Diagrams in UML Objectives: last revised February 14, 2012 1. To show how to create and read State Diagrams 2. To introduce UML Activity Diagrams Materials: 1. Demonstration
STUDENT S PACKET FOR THE SCIENCE FAIR PROJECT
STUDENT S PACKET FOR THE SCIENCE FAIR PROJECT SCIENCE PROJECT STEPS 1. Choose a topic. Be sure it interests you. Don t pick one because you think it will be easy. Talk it over with your parents and when
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
NFS File Sharing. Peter Lo. CP582 Peter Lo 2003 1
NFS File Sharing Peter Lo CP582 Peter Lo 2003 1 NFS File Sharing Summary Distinguish between: File transfer Entire file is copied to new location FTP Copy command File sharing Multiple users can access
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014
Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,
Quality Management Systems. Compliance Driven or Quality Driven?
Quality Management Systems Compliance Driven or Quality Driven? Written by N. Richard Puglielli Page 1 of 7 Overview ISO standards have been around for quite some time now and the concept behind these
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
CRIME SCENE INVESTIGATION
CRIME SCENE INVESTIGATION CHAPTER 2 Mr. Moss 1 CRIME SCENE INVESTIGATION Crime scenes tell a story Crime scene investigators must be careful and systematic Crime scene investigators must follow protocol
1/26/15. Chapter 2 Crime Scene
Chapter 2 Crime Scene Chapter 2 Crime Scene By the end of this chapter you will be able to: By the end of this chapter you will be able to: Investigation and Evidence Collection 1 Investigation and Evidence
East Haven Police Department
East Haven Police Department Type of Directive: Policies & Procedures No. 410.2 Subject/Title: Issue Date: Preliminary Criminal Investigations July 29, 2014 Effective Date: References/Attachments: N/A
