Data mining Techniques for Digital Forensic Analysis
|
|
|
- Justin Osborne
- 9 years ago
- Views:
Transcription
1 Data mining Techniques for Digital Forensic Analysis Ashwinkumar Malwadkar Prof. Sonali Patil Department of Information Technology Department of Information Technology K. J. Somaiya College of Engineering K. J. Somaiya College of Engineering Mumbai, Maharashtra Mumbai, Maharashtra Abstract: The computer forensic involve the protection, classification, taking out information and documents the evidence stored as data or magnetically encoded information. But the organizations have an increasing amount of data from many sources like computing peripherals, personal digital assistants (PDA), consumer electronic devices, computer systems, networking equipment and various types of media, among other sources. To find similar kinds of evidences, crimes happened previously, the law enforcement officers, police forces and detective agencies is time consuming and headache. The main motive of this work is by combining a data mining techniques with computer forensic tools to get the data ready for analysis, find crime patterns, understand the mind of the criminal, assist investigation agencies have to be one step ahead of the bad guys, to speed up the process of solving crimes and carry out computer forensics analyses for criminal affairs. Keywords-Digital Forensics, NTFS, MFT, PDA, MBR, Data mining, IDS ***** I. INTRODUCTION Digital Forensics is the application of science to identify, collect, examine, and analysis the data, while preserving the integrity of the information and maintaining a strict chain of custody for the data. Data contains the distinct pieces of digital information that have been formatted in a specific way. Organizations have an escalating amount of data from many sources. For example, data can be transferred or stored by standard networking equipment, computer systems, computing peripherals, personal digital assistant (PDA), consumer electronic device and different types of media, enclosed by other sources. Data is an important tool and weapon for companies, to capture larger marketplace. Due to the importance of Data, its security has become a major issue in the I.T. industry. So the organization will have difficulty determining what events have occurred within its systems and networks, such as exposures of secured, sensitive data. The law enforcement officer, detective agencies, police departments having problem to solve this cases because of the large volumes of crime-related data are existed. Due to the crime-related complexity relationships, the widely used methods of crime analysis are out-of-date that consume many time and human resources. Moreover, these methods are not able to obtain all influential parameters because of their high amount of human interference, therefore, using an intelligent and systematic approach for crime analysis more than ever. Whereas, the data mining techniques can be the key solution. With the use of data mining techniques like clustering, classification used to track, identify crimes, crimes patterns, which have started helping the law enforcement officers and detectives to speed up the process of solving crimes. Here we will take an interdisciplinary approach between computer science and criminal justice to develop a data mining paradigm that can help solve crimes faster. II. LITERATURE SURVEY Digital forensics is about finding evidence present in the digital devices that is sufficiently reliable to stand up in court and be convincing. Digital forensics mainly used to preserve, identify, extract, and document the digital evidence stored as data or magnetically encoded information[8]. The process of acquiring, examining, and applying digital evidence is crucial to the success of prosecuting a cybercriminal. With the continuous evolution of technology, it is difficult for law enforcement and computer professionals to stay one step ahead of technologically savvy criminals. To effectively combat cyber-crime, greater emphasis must be placed in the digital forensic field of study. A. Steps for Digital Forensic 1) Assessment: You must be able to distinguish between evidence and junk data. For this, you should know what the data is, where it is located, and how it is stored. 2) Acquisition: The evidence you find must be preserved as close as possible to its original state. Any changes made during this phase must be documented and justified. 3) Authentication: At least two copies are taken of the evidential computer. One of these is sealed in the presence of the computer owner and then placed in secure storage. This is the master copy and it will only be opened for examination under instruction from the court in the event of a challenge to the evidence presented after forensic analysis on the second copy. 4) Analysis: The stored evidence must be analysed to extract the useful information and recreate the chain of events. 17
2 5) Articulation: The manner of presentation is important, and it must be understandable to court effectively. It should remain technically correct and credible. A good presenter can help in this respect. 6) Archival: After the case is closed seal the original evidence and keeps it in secure storage place because it is a chance to reopen the case after some time or years, then it s required to resubmit in court. B. Types of Digital Forensic 1) Computer Forensic: The core underlying principle within computer forensics is preservation of data. Therefore, during all stages of examination and analysis a forensic examiner will work on duplicates of the original evidence rather than the original. Computer forensic used to preserve, identify, extract, and document the evidence from the storage media. File management systems or file systems is a part of operating system which organize and locate sectors for file storage. A computer system fundamentally has two sources of data that are of interest to a forensic examiner: volatile and nonvolatile memory. Volatile memory primarily relates to the main RAM of a computer, but also includes cache memory and even register memory and the non-volatile memory does not lost data when the system is switched off i.e. hard disk [8]. 2) File System Analysis: File system analysis examines data in a volume (i.e., a partition or disk) and interprets them as a file system. There are many end results from this process, but examples include listing the files in a directory, recovering deleted content, and viewing the contents of a sector. File systems provide a mechanism for users to store data in a hierarchy of files and directories. A file system consists of structural and user data that are organized such that the computer knows where to find them [7]. copy it into a text file and save with corresponding extension. Restore a JPEG image: a) Open file in the hex pattern. b) Analyze the file signature. c) Replicate from starting signature up to ending signature. d) For example (JPEG/JPG/JPE/JFIF file starting sig-nature is FF D8 FF E1 XX XX (EXIF in ascii Exchangeable image file format trailer is FF D9). e) Open the file with corresponding application. c) Partition Tables: Information about how partitions are setup on a machine is stored in a partition table, which is a part of the Master Boot Record (MBR). When the computer is booted, the partition table allows the computer to understand how the hard disk is organized and then passes this information to the operating system. When a partition is deleted, the entry in the partition table is removed, making the data inaccessible. However, even though the partition entry has been removed, the data still resides on the hard disk [7]. d) Slack Space: A file system may not use an entire partition. The space after the end of the volume called volume slack that can be used to hide data. The space between Partitions is also vulnerable for hiding data, file slack space is another hidden storage. Figure 1shows slack spaces in a Disk. When a file does not end on a sector boundary, operating systems prior to Windows 95 a fill the rest of the sector with data from RAM, giving it the name RAM slack [7]. a) Hidden Evidence Analysis in the File System:Suspects can hide their sensitive data in various areas of the file system such as volume slack; file slack, bad clusters, deleted file spaces. i. Hard Disk: The maintenance track/protected Area on ATA disks are used to hide information. ii. File System Tables: A file allocation table in FAT and Master File Table (MFT) in NTFS are used to keep track of files. MFT entries are manipulated to hide vital and sensitive information. b) File Deletion: file is removed from the table, by that making it appear that it does not exist anymore. The clusters used by the deleted file are marked as being free and can now be used to store other data. However, even if the record is gone, the data may still reside in the clusters of the hard disk. That data can be recovered by calculating start and end of the file in hex format and Figure 1: Slack Space Structure When a file is deleted, its entry in the file system is updated to indicate its deleted status and the clusters that were previously allocated to storing are unallocated and can be reused to store a new file. However, the data are remains on the disk and it is often possible to retrieve a file immediately after it has been deleted. The data will re-main on the disk until a new file overwrites them. Whenever, if the new file does not take up the entire cluster, a some part of the old file might remain in the slack space. In this case, a portion of a file can be retrieved long after it has been deleted and partially overwritten. e) Free Space:However, when a file is moved from one hard disk or partition to another, it is actually a multistep process of replicating and deleting the file. First, a new copy 18
3 of the file is created on the target partition. After the file has been copied, the original file is then deleted. This process also requires some housekeeping in the FAT or MFT tables. A new entry is created in the table on the partition where it has been copied, whereas the record for the deleted file is removed from the table on its partition. When a file get deleted, that space considered as free space, there also criminal can hide sensitive information [6]. f) Faked Bad Clusters: Clusters marked as bad may be used to hide data. In NFTS, bad clusters are marked in metadata file called $BadClus, which is in MFT entry 8.Originally, $BadClus is a sparse file which file size is set to the size of entire file system. When bad clusters are detected, they will be allocated to this file. The size of data that can be hidden with this technique is unlimited. Suspects can simply allocate more clusters [6]. 3) Boot Sector Analysis: The recent cyber-crime trends are to use different obfuscated techniques such as disguising file names, hiding attributes and deleting files to intrude the computer system. Since the Windows operating system does not zero the slack space, it becomes a vehicle to hide data, especially in $Boot file. Hence, in this study, we have analysed the hidden data in the $Boot file structure. The $Boot entry is stored in a metadata file at the first cluster in sector 0 of the file system, called $Boot, from where the system boots. It is the only metadata file that has a static locationso that it cannot be relocated. Microsoft allocates the first 16 sectors of the file system to $Boot and only half of these sectors contains nonzero values. The $Boot metadata file structure is located in MFT entry 7 and contains the boot sector of the file system. It contains knowledgeabout the size of the volume, clusters and the MFT. The $Boot metadata file structure has four attributes, namely, $STANDARD_INFORMATION, $FILE_NAME, $SECURITY_DESCRIPTION and $DATA. The $STANDARD_INFORMATION attribute contains temporal information such as flags, owner, security ID and the last accessed, written, and created times. $Boot data structure of thentfs file system could be used to hide data. By analysing the hidden data in the boot sector, onecould provide useful information for digital forensics 4) Network Forensics: Network forensics deals with the capture, recording or analysis of network events in order to discover evidential information about the source of security attacks in a court of law. With the rapid growth and use of Internet, network forensics has become an integral part of digital forensics [10]. The Network Forensics include The analysis of IDS and firewall logs as evidence. The back tracking of network packets and TCP connections. The analysis of network related artifacts on forensically acquired hard disks. The analysis of logs generated by network services and network applications. The seizure and analysis of network traffic using sniffers and NFAT1 devices Collecting data from remote network services. 1) Procedure for Network Live Acquisition: a) Create a bootable forensic CD. b) Perform Remote access to the suspected machine or insert bootable CD in suspects machine directly. c) Record or keep a log of all the actions of forensic investigator. d) If need to take out away the evidence then use USB. e) Next, Take a copy of the physical memory using a forensic tool example memfetch. f) Create an image of the drive. g) For Intrusion first check Root kit is installed or not, for that root kit revealers are available. h) Perform hash value of the created image for integrity checking. 2) Network Investigation Tools: There is a powerful windows tools available at sysinternal Filemon- shows file system activity. RegMon- shows all Registry data in real time. Process Explorer- shows what files, registry keys and dynamic link libraries (DLLs) are loaded at a specific time. Pstools is a suite created by Sysinternals that includes the following tools. PsExec-Run processes remotely. PsGetSid-Displays the security identifier of a computer. PsKill-Kills processes by name or processes ID. PsList-Lists detailed information about processes. PsLoggedOn-Displays who s logged on locally. PsPassword-Allows user to change account passwords. PsService-Enables to view and control services. PsShutDown-Shutdown &optionally restarts a computer. PsSuspend-Allows to suspend processes. Tcpdump and Ethereal-Packet sniffers. 5) Forensics: is one of the most common ways people communicate, ranging from internal meetings, to distribute the documents and general conversation. s are now being used for all sorts of communication including providing authentication, non-repudiation, confidentiality and data integrity. The tools help to identify the point of origin of the message, trace the path traversed by the message (used to identify the spammers) and also to identify the phishing s that try to obtain confidential information from the receiver. 19
4 TrackerPro analyses the header of an to detect the IP address of the machine that sent the message so that the sender can be tracked down. It helps to track s to a country or region of the world, showing information on a global map. SmartWhoIs is a freeware network utility to look up all the available information about an IP address, hostname or domain, including country, state or province, city, name of the network provider, administrator and technical support contact information [10]. 6) Web Forensics: Web forensics deals with collecting critical information related to a crime by exploring the browsing history of a person, the number of times a website has been visited, the duration of each visit, the files that have been uploaded and downloaded from the visited website, the cookies setup as part of the visit and other critical information. Mandiant Web Historian assists users in reviewing web site URLs that are stored in the history files of the most commonly used web browsers. It allows the forensic examiner to determine what, when, where, and how the intruders looked into the different sites [10]. Index.dat analyser is a forensic tool to view, examine and delete the contents of index.dat files. The tool can be used to simultaneously or individually view the cookies, cache and browsing history. The tool provides support to directly visit the website listed in the output of the analyser and also to open the file uploaded to or downloaded from the website. 7) Packet Sniffers: A Sniffer is software that collects traffic flowing into and out of a computer attached to a network [11]. Network engineers, system administrators and security professionals use sniffers to monitor and collect information about different communications occurring over a network. Sniffers are used as the main source for data collection in Intrusion Detection Systems (IDS) to match packets against a rule set designed to notify anything malicious or strange. Tools Used Ethereal is an open source software and widely used as a network packet analyser. It captures live network packets. It displays the information in the headers of all the protocols used in the transmission of the packets captured. Depending on user needs it filters the packets. WinPcap is the tool used for link-layer network access in Windows. WinPcap includes a network statistics engine and provides support for kernel-level packet filtering and remote packet capture. AirPcap can be used to capture the control frames (ACK, RTS, CTS), management frames (Beacon, Probe Requests and Responses, Authentication) and data frames of the traffic. C. Data Mining Techniques: Data mining is defined as the identification of interesting structure in data, where structure designates patterns, statistical or predictive picture of the data, and relationships among parts of the data. Data mining in the context of crime and intelligence analysis for national security is still a young field. The following describes our applications of different techniques in crime data mining [3]. 1) Clustering technique group data objects into classes by similar characteristics to minimize or maximize interclass similarity for instance, to identify suspects that bearing the crimes in similar ways or discriminate among groups belonging to different gangs. These techniques do not have a set of predefined classes for assigning items. 2) Association rule mining determines frequently occurring item sets in a database and offerings some patterns as rules that been used in network intrusion detection to develop the connection rules from users interaction history. Investigators also can apply this technique to network intruders profiles to help detect potential future network attacks. In network intrusion detection, this approach can identify intrusion patterns among time-stamped data. Showing hidden patterns benefits crime analysis, but to obtain meaningful results requires rich and highly structured data. 3) Deviation detection utilizes the particular measures to study data that differs noticeably from the rest of the data. Also called outlier detection, investigators can use this technique to fraud detection, network intrusion detection, and other crime analyses. However, such activities can sometimes appear to be normal, making it difficult to identify outliers. 4) Classification finds mutual properties between various Crime entities and arranges them into predefined classes that have been applied for identifying the source of spamming according to the sender s structural features and linguistic patterns. Often used to predict crime trends, classification can reduce the time required to identify crime entities. However, the technique requires a predefined classification scheme [5]. 5) String comparator techniques that show the relation the textual fields in pairs of database records and calculate the correspondence among the records that can detect deceptive information in criminal records for instance the name and address. The researchers can utilize string comparators to evaluate textual data that often need intensive computation. D. Data mining algorithm: 1) Identify itemsets/variables from a case report (our proposed system stores these variables as attributes of tables, filesystem table, network table). 2) Item sets I = {I1, I2, I3 Im}. 3) Set of actions A = {a1, a2, a3 an}. 4) Find frequent item sets by using Apriori algorithm. 5) Make Association Rules i.e. It is a rule in the form X Y showing an association between X and Y that if X occurs then Y will occur. If the attacker accessed operating system files then we can say motive of attack is system Crash. 20
5 If the attacker attacked Database login and Password steel then we can say criminal motive for data theft/data change. This maximum frequent item sets also shows attack patterns. Finding other signs of evidence Correlation, contingences (Consider these values while making rule sets). 6) Set SQL queries according to the rules. 7) Retrieve data. 1) Apriori Algorithm: The Apriori algorithm is the most well-known association rule algorithm and is used in most commercial products. It uses the following property which we call large itemset property. Any subset of large itemset must be large. for each I i Є C k do if I i Є t j then c i = c i + 1 ; for each I i Є C k do if c i >= ( s * D ) do L k = L k U I i ; L = L U L k ; C k+1 = Apriori-Gen(L k ) Until C k+1 = Ø ; Algorithm Apriori-Gen : Input : L i-1 // Large itemsets of size i-1 Output : C i // Candidates of size i Apriori-Gen Algorithm : C i = Ø ; for each I Є L i-1 do for each J I Є L i-1 do if i-2 of the elements in I and J are equal then C k = C k U { I U J }; Figure 2. Downword Closure The large itemset are also said to be downward closed because if an itemset satisfies the minimum support requirements so do all of its subset [9]. The basic idea of the Apriori algorithm is to generate candidate itemsets of a particular size and then scan the database to count these to see if they are large.an itemset is considered as a candidate only if all its subset also are large. An algorithm called Apriori-Gen is used to generate the candidate itemsets for each pass after the first. All singleton itemsets of are used as candidates in the first pass. After the first scan, every large itemset is combined with every other itemset. Algorithm: Input: I // Itemsets D // Database of transaction s // Support Output : L // Large itemsets Apriori algorithm : k = 0 ; // k is used as the scan number. L = Ø ; C 1 = I ; repeat k = k + 1; L k = Ø ; for each I i Є C k do c i = 0 ; //Initial counts for each itemset are 0. for each t j Є D do III. PROPOSED SYSTEM Our proposed system is the combination of a data mining techniques and computer forensic tools. This helps to organization to get the data ready for analysis, find crime patterns, understand the mind of the criminal, assist investigation agencies have to be one step ahead of the bad guys, to speed up the process of solving crimes and carry out computer forensics analyses for criminal proceedings. With the use of data mining techniques we can track, identify crimes, crimes patterns that helps to solve crimes fast and digital forensics is the application of science to the identification, collection, examination, and analysis of data while preserving the integrity of the information. These productive measures can be initiated to alert administrator about similar kinds of attacks happened in future for preventing upcoming cyber attack. A. Block Diagram of Proposed System: Evidence Investigator Input apply digital forensic methods apply investigator queries Digital Forensic Analysis Data Mining Algorithms GUI Output/Report Figure 4: Block DiagramEvidence Forensic Output 21
6 Digital evidence or electronic evidence is any probative information stored or transmitted in digital form Digital evidence includes information on computers, audio files, video recordings, digital images, s, digital photographs, ATM transaction logs, word processing documents, instant message histories, spreadsheets, internet browser histories, databases, contents of computer memory, computer backups, GPS tracks, system logs this evidences must be essential in computer and internet crimes. 1) Digital Forensic Analysis: Digital forensics encompassing the recovery and investigation of material found in digital devices, often in relation to computer crime. The goal of digital forensics is to examine digital media in a forensically sound manner with the aim of identifying, preserving, recovering, analysing and presenting facts and opinions about the digital information. 2) Data mining Algorithm: Data mining algorithm contains the various data mining algorithm like clustering algorithm, association rule mining algorithm, classification algorithm, which can be used to find patterns, keeps the track of information, identification of interesting structure in data, statistical or predictive models of the data, and relationships among parts of the data etc. 3) GUI Output/Report: The GUI Output/Report shows output or create report what the investigator wants. It get data ready for analysis, shows the crime patterns, create reports like to find motive behind the crime, pattern of cyber-attacks and counts of attacks types happened during a period. IV. CONCLUSION Digital forensics is the science of identifying, extracting, analysing and presenting the digital evidence that has been stored in the digital devices and data mining is the method for the identification of interesting structure in data, where structure designates patterns, statistical or predictive models of the data, and relationships among parts of the data. Our pre synopsis work defined the new proposed technique with the combination of digital forensic analysis and data mining techniques. The proposed system is designed for to get the data ready for analysis, find crime patterns, finding motive, pattern of cyber-attacks and counts of attacks types happened during a period. Hence the proposed tool helps to enables the system administrators to minimize the system vulnerability, understand the mind of the criminal, assist investigation agencies have to be one step ahead of the bad guys, to speed up the process of solving crimes and carry out computer forensics analyses for criminal proceedings REFERENCES [1] Cheong Kai Wee, Analysis of Hidden Data in NTFS File System, Edith Cowan University. [2] Shyam Varan Nath, Crime Pattern Detection Using Data Mining, Oracle Corporation. [3] Hsinchun Chen, Wingyan Chung, Yi Qin, Michael Chau, Jennifer Jie Xu, Gang Wang, Rong Zheng, Homa Atabakhsh, Crime Data Mining: An Overview and Case Studies, Proceeding of ACM Inter-national Conference, Vol. 130, 2003, pp [4] Chung-Hsien Yu, Max W. Ward, Melissa Morabito, Wei Ding, Crime Forecasting Using Data Mining Techniques,University of Massachusetts Boston. [5] Javad Hosseinkhani, Mohammad Koochakzaei, Solmaz Keikhaee, Javid Hosseinkhani Naniz, Detecting Suspicion Information on the Web Using Crime Data Mining Techniques, International Journal of Advanced Computer Science and Information Technology (IJACSIT), Vol. 3, No. 1, 2014, Page: 32-41, ISSN: [6] Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters, Effective Digital Forensic Analysis of the NTFS Disk Image, Ubiquitous Computing and Communication Journal, Vol. 4, No. 3, 2009, pp [7] Brian Carrier, File System Forensic Analysis, Addison Wesley Professional, ISBN: [8] John R. Vacca, Computer Forensics: Computer Crime Scene Investigation, Second Edition.ISBN: ISBN-13: [9] Margaret H Dunham, Data Mining: Introductory and Advanced Topics Publisher, Pearson Education, [10] Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore, Tools And Techniques For Network Forensics, International Journal of Network Security & Its Applications (IJNSA), Vol.1, No.1, April [11] Bruce J. Nikkel, Generalizing sources of live network evidence, Whitepaper [12] Karen Kent Suzanne Chevalier Tim Grance Hung Dang, Guide to Integrating Forensic Techniques into Incident Response, National Institute of Standards and Technology Special Publication
Digital Forensic Tool for Decision Making in Computer Security Domain
Digital Forensic Tool for Decision Making in Computer Security Domain S. K. Khode 1,V. N. Pahune 2 and M. R. Sayankar 3 1, 2, 3 Computer Engineering Department of Bapurao Deshmukh College of Engineering,
Digital Forensics and Cyber Crime Datamining
Journal of Information Security, 2012, 3, 196-201 http://dx.doi.org/10.4236/jis.2012.33024 Published Online July 2012 (http://www.scirp.org/journal/jis) Digital Forensics and Cyber Crime Datamining K.
Sindhu. K. K. Computer Engineering Department, Shah and Anchor Engineering, Mumbai University Mumbai, India.
A Digital Forensic Tool for Cyber Crime Data mining Sindhu. K. K. Computer Engineering Department, Shah and Anchor Engineering, Mumbai University Mumbai, India. Abstract: - Digital forensics is the science
Framework for Live Digital Forensics using Data Mining
Framework for Live Digital Forensics using Data Mining Prof Sonal Honale #1, Jayshree Borkar *2 Computer Science and Engineering Department, Aabha Gaikwad College of Engineering, Nagpur, India Abstract
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING
OS KERNEL MALWARE DETECTION USING KERNEL CRIME DATA MINING MONISHA.T #1 and Mrs.UMA.S *2 # ME,PG Scholar,Department of CSE, SKR Engineering College,Poonamallee,Chennai,TamilNadu * ME,Assist.professor,
Digital Forensic Techniques
Digital Forensic Techniques Namrata Choudhury, Sr. Principal Information Security Analyst, Symantec Corporation Professional Techniques T23 CRISC CGEIT CISM CISA AGENDA Computer Forensics vs. Digital Forensics
Concepts of digital forensics
Chapter 3 Concepts of digital forensics Digital forensics is a branch of forensic science concerned with the use of digital information (produced, stored and transmitted by computers) as source of evidence
MSc Computer Security and Forensics. Examinations for 2009-2010 / Semester 1
MSc Computer Security and Forensics Cohort: MCSF/09B/PT Examinations for 2009-2010 / Semester 1 MODULE: COMPUTER FORENSICS & CYBERCRIME MODULE CODE: SECU5101 Duration: 2 Hours Instructions to Candidates:
Digital forensic techniques for static analysis of NTFS images
Digital forensic techniques for static analysis of NTFS images Mamoun Alazab Internet Commerce Security Laboratory University of Ballarat, Australia [email protected] Sitalakshmi Venkatraman Internet
Hands-On How-To Computer Forensics Training
j8fm6pmlnqq3ghdgoucsm/ach5zvkzett7guroaqtgzbz8+t+8d2w538ke3c7t 02jjdklhaMFCQHihQAECwMCAQIZAQAKCRDafWsAOnHzRmAeAJ9yABw8v2fGxaq skeu29sdxrpb25zidxpbmznogtheories...ofhilz9e1xthvqxbb0gknrc1ng OKLbRXF/j5jJQPxXaNUu/It1TQHSiyEumrHNsnn65aUMPnrbVOVJ8hV8NQvsUE
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE
EFFECTIVE DIGITAL FORENSIC ANALYSIS OF THE NTFS DISK IMAGE Mamoun Alazab, Sitalakshmi Venkatraman, Paul Watters University of Ballarat, Australia {m.alazab, s.venkatraman, p.watters} @ballarat.edu.au ABSTRACT
Introduction to Network Security Comptia Security+ Exam. Computer Forensics. Evidence. Domain 5 Computer Forensics
Introduction to Network Security Comptia Security+ Exam Domain 5 Computer Forensics Computer Forensics Forensics relates to the application of scientific knowledge and method to legal problems Investigating
EC-Council Ethical Hacking and Countermeasures
EC-Council Ethical Hacking and Countermeasures Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
Overview of Computer Forensics
Overview of Computer Forensics Don Mason, Associate Director National Center for Justice and the Rule of Law University of Mississippi School of Law [These materials are based on 4.3.1-4.3.3 in the National
Detection of Data Hiding in Computer Forensics. About Your Presenter
Detection of Data Hiding in Computer Forensics NEbraskaCERT Conference August 22nd, 2008 James E. Martin CISSP, JD About Your Presenter 2008-Present: Security Engineer, West Corporation 2004-2008: Senior
11.1. Performance Monitoring
11.1. Performance Monitoring Windows Reliability and Performance Monitor combines the functionality of the following tools that were previously only available as stand alone: Performance Logs and Alerts
Information Technology Audit & Forensic Techniques. CMA Amit Kumar
Information Technology Audit & Forensic Techniques CMA Amit Kumar 1 Amit Kumar & Co. (Cost Accountants) A perfect blend of Tax, Audit & Advisory services Information Technology Audit & Forensic Techniques
Digital Forensic. A newsletter for IT Professionals. I. Background of Digital Forensic. Definition of Digital Forensic
I Digital Forensic A newsletter for IT Professionals Education Sector Updates Issue 10 I. Background of Digital Forensic Definition of Digital Forensic Digital forensic involves the collection and analysis
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers
Defining Digital Forensic Examination and Analysis Tools Using Abstraction Layers Brian Carrier Research Scientist @stake Abstract This paper uses the theory of abstraction layers to describe the purpose
Live View. A New View On Forensic Imaging. Matthiew Morin Champlain College
Live View A New View On Forensic Imaging Matthiew Morin Champlain College Morin 1 Executive Summary The main purpose of this paper is to provide an analysis of the forensic imaging tool known as Live View.
Computer Hacking Forensic Investigator v8
CÔNG TY CỔ PHẦN TRƯỜNG CNTT TÂN ĐỨC TAN DUC INFORMATION TECHNOLOGY SCHOOL JSC LEARN MORE WITH LESS! Computer Hacking Forensic Investigator v8 Course Description: EC-Council releases the most advanced Computer
Getting Physical with the Digital Investigation Process
Getting Physical with the Digital Investigation Process Brian Carrier Eugene H. Spafford Center for Education and Research in Information Assurance and Security CERIAS Purdue University Abstract In this
Lecture outline. Computer Forensics and Digital Investigation. Defining the word forensic. Defining Computer forensics. The Digital Investigation
Computer Forensics and Digital Investigation Computer Security EDA263, lecture 14 Ulf Larson Lecture outline! Introduction to Computer Forensics! Digital investigation! Conducting a Digital Crime Scene
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS. Brian Carrier & Eugene H. Spafford
CERIAS Tech Report 2003-29 GETTING PHYSICAL WITH THE DIGITAL INVESTIGATION PROCESS Brian Carrier & Eugene H. Spafford Center for Education and Research in Information Assurance and Security, Purdue University,
RecoverIt Frequently Asked Questions
RecoverIt Frequently Asked Questions Windows Recovery FAQs When can I use Windows Recovery application? This application is used to recover the deleted files from internal or external storage devices with
Incident Response and Computer Forensics
Incident Response and Computer Forensics James L. Antonakos WhiteHat Forensics Incident Response Topics Why does an organization need a CSIRT? Who s on the team? Initial Steps Detailed Project Plan Incident
HOST BASED INTERNAL INTRUSION DETECTION AND PREVENTION SYSTEM.
HOST BASED INTERNAL INTRUSION DETECTION AND PREVENTION SYSTEM. 1 Rane Ankit S., 2 Waghmare Amol P., 3 Payal Ashish M., 4 Markad Ashok U, 3 G.S.Deokate. 1,2,3,4 Department of Computer Engineering SPCOE
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065
Computer Forensics and Investigations Duration: 5 Days Courseware: CT 0619217065 Introduction The Computer Forensics and Investigation course presents methods to properly conduct a computer forensics investigation
A Short Introduction to Digital and File System Forensics
Antonio Barili Lab Dept. of Industrial and Information Engineering University of Pavia (Italy) [email protected] Every contact leaves a trace Culprit Scene Victim Edmond Locard (1877-1966) 2015 -
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL)
COMPUTER FORENSICS (EFFECTIVE 2013-14) ACTIVITY/COURSE CODE: 5374 (COURSE WILL BE LISTED IN THE 2013-14 CATE STUDENT REPORTING PROCEDURES MANUAL) COURSE DESCRIPTION: Computer Forensics is focused on teaching
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies
Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some
C HFI C HFI. EC-Council. EC-Council. Computer Hacking Forensic Investigator. Computer. Computer. Hacking Forensic INVESTIGATOR
Page: 1 TM C HFI Computer C HFI Computer Hacking Forensic INVESTIGATOR Hacking Forensic INVESTIGATOR TM v8 v8 Page: 2 Be the leader. Deserve a place in the CHFI certified elite class. Earn cutting edge
Zmanda Cloud Backup Frequently Asked Questions
Zmanda Cloud Backup Frequently Asked Questions Release 4.1 Zmanda, Inc Table of Contents Terminology... 4 What is Zmanda Cloud Backup?... 4 What is a backup set?... 4 What is amandabackup user?... 4 What
What is Digital Forensics?
DEVELOPING AN UNDERGRADUATE COURSE IN DIGITAL FORENSICS Warren Harrison PSU Center for Information Assurance Portland State University Portland, Oregon 97207 [email protected] What is Digital Forensics?
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR
winhex Disk Editor, RAM Editor PRESENTED BY: OMAR ZYADAT and LOAI HATTAR Supervised by : Dr. Lo'ai Tawalbeh New York Institute of Technology (NYIT)-Jordan X-Ways Software Technology AG is a stock corporation
Getting Ahead of Malware
IT@Intel White Paper Intel Information Technology Security December 2009 Getting Ahead of Malware Executive Overview Since implementing our security event monitor and detection processes two years ago,
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS
Chapter 22 CONCEPT MAPPING FOR DIGITAL FORENSIC INVESTIGATIONS April Tanner and David Dampier Abstract Research in digital forensics has yet to focus on modeling case domain information involved in investigations.
RingStor User Manual. Version 2.1 Last Update on September 17th, 2015. RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816.
RingStor User Manual Version 2.1 Last Update on September 17th, 2015 RingStor, Inc. 197 Route 18 South, Ste 3000 East Brunswick, NJ 08816 Page 1 Table of Contents 1 Overview... 5 1.1 RingStor Data Protection...
An overview of IT Security Forensics
An overview of IT Security Forensics Manu Malek, Ph.D. Stevens Institute of Technology [email protected] www.cs.stevens.edu/~mmalek April 2008 IEEE Calif. 1 Outline Growing Threats/Attacks Need for Security
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
SPEAR PHISHING UNDERSTANDING THE THREAT
SPEAR PHISHING UNDERSTANDING THE THREAT SEPTEMBER 2013 Due to an organisation s reliance on email and internet connectivity, there is no guaranteed way to stop a determined intruder from accessing a business
Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform
Int'l Conf. Security and Management SAM'15 3 Analysis of Evidence in Cloud Storage Client Applications on the Windows Platform R. Malik 1, N. Shashidhar 1, and L. Chen 2 1 Department of Computer Science,
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda
Secure Web Application Coding Team Introductory Meeting December 1, 2005 1:00 2:00PM Bits & Pieces Room, Sansom West Room 306 Agenda 1. Introductions for new members (5 minutes) 2. Name of group 3. Current
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Cleaning Encrypted Traffic
Optenet Documentation Cleaning Encrypted Traffic Troubleshooting Guide iii Version History Doc Version Product Date Summary of Changes V6 OST-6.4.300 01/02/2015 English editing Optenet Documentation
Why Device Fingerprinting Provides Better Network Security than IP Blocking. How to transform the economics of hacking in your favor
Why Device Fingerprinting Provides Better Network Security than IP Blocking How to transform the economics of hacking in your favor Why Device Fingerprinting Provides Better Network Security than IP Blocking
Freeware Live Forensics tools evaluation and operation tips
Freeware Live Forensics tools evaluation and operation tips Ricci IEONG, Principal Consultant, ewalker Consulting Ltd Abstract Highlighted by a digital forensics investigation specialists from FBI in DFRWS
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
File System Forensics FAT and NTFS. Copyright Priscilla Oppenheimer 1
File System Forensics FAT and NTFS 1 FAT File Systems 2 File Allocation Table (FAT) File Systems Simple and common Primary file system for DOS and Windows 9x Can be used with Windows NT, 2000, and XP New
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
Just EnCase. Presented By Larry Russell CalCPA State Technology Committee May 18, 2012
Just EnCase Presented By Larry Russell CalCPA State Technology Committee May 18, 2012 What is e-discovery Electronically Stored Information (ESI) Discover or Monitor for Fraudulent Activity Tools used
PTK Forensics. Dario Forte, Founder and Ceo DFLabs. The Sleuth Kit and Open Source Digital Forensics Conference
PTK Forensics Dario Forte, Founder and Ceo DFLabs The Sleuth Kit and Open Source Digital Forensics Conference What PTK is about PTK forensics is a computer forensic framework based on command line tools
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
Kaseya 2. User Guide. Version 7.0. English
Kaseya 2 Backup User Guide Version 7.0 English September 3, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? A Typical Attack Scenario
DRIVE-BY DOWNLOAD WHAT IS DRIVE-BY DOWNLOAD? Drive-by Downloads are a common technique used by attackers to silently install malware on a victim s computer. Once a target website has been weaponized with
ITU Session Four: Device Imaging And Analysis. Mounir Kamal Q-CERT
ITU Session Four: Device Imaging And Analysis Mounir Kamal Q-CERT 2 Applying Forensic Science to Computer Systems Like a Detective, the archaeologist searches for clues in order to discover and reconstruct
Cyber Security Response to Physical Security Breaches
Cyber Security Response to Physical Security Breaches INTRODUCTION Physical break-ins and other unauthorized entries into critical infrastructure locations, such as electrical power substations, have historically
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS
TOOLS AND TECHNIQUES FOR NETWORK FORENSICS Natarajan Meghanathan, Sumanth Reddy Allam and Loretta A. Moore Department of Computer Science, Jackson State University, Jackson, MS 39217, USA 1 [email protected],
Scene of the Cybercrime Second Edition. Michael Cross
Scene of the Cybercrime Second Edition Michael Cross Chapter 1 Facing the Cybercrime Problem Head-On 1 Introduction 2 Defining Cybercrime 2 Understanding the Importance of Jurisdictional Issues 3 Quantifying
For more information on SQL injection, please refer to the Visa Data Security Alert, SQL Injection Attacks, available at www.visa.
Global Partner Management Notice Subject: Visa Data Security Alert Malicious Software and Internet Protocol Addresses Dated: April 10, 2009 Announcement: The protection of account information is a responsibility
State of the art of Digital Forensic Techniques
State of the art of Digital Forensic Techniques Enos K. Mabuto 1, H. S Venter 2 Department of Computer Science University of Pretoria, Pretoria, 0002, South Africa Tel: +27 12 420 3654 Email: [email protected]
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop.
Thanks for showing interest in Vortex IIT Delhi & What After College (WAC) Ethical Hacking Workshop. Our aim is to address the students apprehensions and anxieties regarding their career prospects in Ethical
Loophole+ with Ethical Hacking and Penetration Testing
Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals
A Study on the Live Forensic Techniques for Anomaly Detection in User Terminals Ae Chan Kim 1, Won Hyung Park 2 and Dong Hoon Lee 3 1 Dept. of Financial Security, Graduate School of Information Security,
Performing Advanced Incident Response Interactive Exercise
Performing Advanced Incident Response Interactive Exercise Post-Conference Summary Merlin Namuth Robert Huber SCENARIO 1 - PHISHING EMAILS... 3... 3 Mitigations... 3 SCENARIO 2 - IDS ALERT FOR PSEXEC...
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Troubleshooting. System History Log. System History Log Overview CHAPTER
CHAPTER 10 This section provides you will tools to help you to troubleshoot the Cisco Intercompany Media Engine server. For more information on troubleshooting the Cisco Intercompany Media Engine feature,
Digital Forensics. Tom Pigg Executive Director Tennessee CSEC
Digital Forensics Tom Pigg Executive Director Tennessee CSEC Definitions Digital forensics Involves obtaining and analyzing digital information as evidence in civil, criminal, or administrative cases Analyze
Frequently Asked Questions. Secure Log Manager. Last Update: 6/25/01. 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.
Frequently Asked Questions Secure Log Manager Last Update: 6/25/01 6303 Barfield Road Atlanta, GA 30328 Tel: 404.236.2600 Fax: 404.236.2626 1. What is Secure Log Manager? Secure Log Manager (SLM) is designed
Operating Systems Forensics
Operating Systems Forensics Section II. Basic Forensic Techniques and Tools CSF: Forensics Cyber-Security MSIDC, Spring 2015 Nuno Santos Summary! Windows boot sequence! Relevant Windows data structures!
Installing an Omnicast System Omnicast version 3.5
Installing an Omnicast System Omnicast version 3.5 INST-9001 Version 1.0 INST-9001 Page 1 Omnicast Install Table of Contents 1 PREAMBLE...3 1.1 DOCUMENT REVISIONS...3 1.2 OMNICAST OVERVIEW...3 1.3 SUPPORTED
Deploying Layered Email Security. What is Layered Email Security?
Deploying Layered Email Security This paper is intended for users of Websense Email Security who want to add Websense Hosted Email Security to deploy a layered email security solution. In this paper: Review
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Guide to Computer Forensics and Investigations, Second Edition
Guide to Computer Forensics and Investigations, Second Edition Chapter 12 Network Forensics Objectives Understand Internet fundamentals Understand network basics Acquire data on a Linux computer Guide
Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM)
s Unix Definition of : Computer Coherent application of a methodical investigatory techniques to solve crime cases. Forensics source: Edward Fjellskål, NorCERT, Nasjonal sikkerhetsmyndighet (NSM) s Unix
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000
FAT32 vs. NTFS Jason Capriotti CS384, Section 1 Winter 1999-2000 Dr. Barnicki January 28, 2000 Table of Contents List of Figures... iv Introduction...1 The Physical Disk...1 File System Basics...3 File
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
10- Assume you open your credit card bill and see several large unauthorized charges unfortunately you may have been the victim of (identity theft)
1- A (firewall) is a computer program that permits a user on the internal network to access the internet but severely restricts transmissions from the outside 2- A (system failure) is the prolonged malfunction
Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)
Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose
Easy Setup Guide 1&1 CLOUD SERVER. Creating Backups. for Linux
Easy Setup Guide 1&1 CLOUD SERVER Creating Backups for Linux Legal notice 1&1 Internet Inc. 701 Lee Road, Suite 300 Chesterbrook, PA 19087 USA www.1and1.com [email protected] August 2015 Copyright 2015 1&1
STUDY GUIDE CHAPTER 4
STUDY GUIDE CHAPTER 4 True/False Indicate whether the statement is true or false. 1. A(n) desktop operating system is designed for a desktop or notebook personal computer. 2. A(n) mirrored user interface
CA DLP. Stored Data Integration Guide. Release 14.0. 3rd Edition
CA DLP Stored Data Integration Guide Release 14.0 3rd Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Where is computer forensics used?
What is computer forensics? The preservation, recovery, analysis and reporting of digital artifacts including information stored on computers, storage media (such as a hard disk or CD-ROM), an electronic
Digital Forensics Lecture 3. Hard Disk Drive (HDD) Media Forensics
Digital Forensics Lecture 3 Hard Disk Drive (HDD) Media Forensics Current, Relevant Topics defendants should not use disk-cleaning utilities to wipe portions of their hard drives before turning them over
EnCase 7 - Basic + Intermediate Topics
EnCase 7 - Basic + Intermediate Topics Course Objectives This 4 day class is designed to familiarize the student with the many artifacts left behind on Windows based media and how to conduct a forensic
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA
JK0-022 CompTIA Academic/E2C Security+ Certification Exam CompTIA To purchase Full version of Practice exam click below; http://www.certshome.com/jk0-022-practice-test.html FOR CompTIA JK0-022 Exam Candidates
NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage
AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network
COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10
LabTech Commands COMMANDS 1 Overview... 1 Default Commands... 2 Creating a Script from a Command... 10 Document Revision History... 10 Overview Commands in the LabTech Control Center send specific instructions
Managed Security Services
Managed Security Services 1 Table of Contents Possible Security Threats 3 ZSL s Security Services Model 4 Managed Security 4 Monitored Security 5 Self- Service Security 5 Professional Services 5 ZSL s
Web Plus Security Features and Recommendations
Web Plus Security Features and Recommendations (Based on Web Plus Version 3.x) Centers for Disease Control and Prevention National Center for Chronic Disease Prevention and Health Promotion Division of
