首页 > 最新文献

2009 Fifth International Conference on IT Security Incident Management and IT Forensics最新文献

英文 中文
Workshop: Digital Discovery with Bootable CDs 研讨会:数字发现与可启动cd
R. Moll, M. Prokop, H. Morgenstern
Boot-CDs are a flexible and powerful method to assist in the whole forensic process from live examination to acquisition, searching and recovery. Linux was ever since the most popular OS for this purpose, but in some cases windows-based Live-CDs are also useful. In this workshop we present different real-life case scenarios and the corresponding live-boot-solution. Since kernel 2.6 Linux is able to create forensically sound images even of partitions/harddisks with odd sectors. But one has to be aware of a lot of other circumstances which can alter the evidence: mounting filesystems, automatic activation of software RAID arrays, using LVMs or swap-space on the target disk. A lot of Linux-Boot-CDs seem to take care of all the critical points, but in fact there are only few well documented tests available. Another problem of the ready-to-download Linux Live-CD images is the lack of support for brand new hardware. So a framework to build a custom linux-live-system with current kernel versions and packages would be really helpful. We will present grml, a Debian based live system, developed by the Austrian Debian Developer Michael Prokop and the grml team. This system satisfies all the above mentioned initial conditions and much more. Various boot parameters allow to control the behavior of the live system, e.g. the parameter "forensic", which is a shortcut for "nofstab noraid noautoconfig noswap raid=noautodetect readonly ...". Additionally the grml system can be booted from CD/DVD, USB-/Firewire-Device, Remote-Adapter (iLO, RSA2, ...), Flash-Card and PXE. In this workshop you'll learn how to use grml for forensic investigations and how to build your own live system using the grml-live framework. On some brand-new mainboards the grml system might still fail, because the chipset, especially the onboard-raid-chipset is not yet supported by the linux kernel. For these cases a forensically sound windows-based boot-CD as plan B is needed. So the workshop will present a way to build a forensically sound windows based boot CD using the standard Windows Automated Installation Kit for Windows Vista along with some registry modifications.
引导光盘是一种灵活而强大的方法,可以协助从现场检查到获取,搜索和恢复的整个法医过程。从那以后,Linux一直是最受欢迎的操作系统,但在某些情况下,基于windows的live - cd也很有用。在本次研讨会中,我们将介绍不同的实际案例场景和相应的实时启动解决方案。自2.6内核以来,Linux甚至能够创建具有奇数扇区的分区/硬盘的可靠映像。但是必须意识到许多其他可能改变证据的情况:挂载文件系统、自动激活软件RAID阵列、在目标磁盘上使用lvm或交换空间。许多linux - boot - cd似乎处理了所有的关键点,但实际上只有很少有文档完备的可用测试。随时可下载的Linux Live-CD映像的另一个问题是缺乏对全新硬件的支持。因此,使用当前内核版本和软件包构建自定义linux实时系统的框架将非常有帮助。我们将介绍grml,一个基于Debian的实时系统,由奥地利Debian开发人员Michael Prokop和grml团队开发。该系统满足上述所有初始条件,甚至更多。各种引导参数允许控制活动系统的行为,例如参数“forensic”,这是“nofstab noraid noautoconfig noswap raid=noautodetect readonly…”的快捷方式。此外,grml系统可以从CD/DVD, USB-/火线设备,远程适配器(iLO, RSA2,…),闪存卡和PXE启动。在本研讨会中,您将学习如何使用grml进行取证调查,以及如何使用grml-live框架构建自己的实时系统。在一些全新的主板上,grml系统可能仍然会失败,因为linux内核还不支持芯片组,特别是板载raid芯片组。对于这些情况,需要一个可靠的基于windows的启动cd作为B计划。因此,研讨会将介绍一种方法来建立一个法医健全的基于windows的启动CD使用标准的windows自动安装套件的windows Vista以及一些注册表修改。
{"title":"Workshop: Digital Discovery with Bootable CDs","authors":"R. Moll, M. Prokop, H. Morgenstern","doi":"10.1109/IMF.2009.20","DOIUrl":"https://doi.org/10.1109/IMF.2009.20","url":null,"abstract":"Boot-CDs are a flexible and powerful method to assist in the whole forensic process from live examination to acquisition, searching and recovery. Linux was ever since the most popular OS for this purpose, but in some cases windows-based Live-CDs are also useful. In this workshop we present different real-life case scenarios and the corresponding live-boot-solution. Since kernel 2.6 Linux is able to create forensically sound images even of partitions/harddisks with odd sectors. But one has to be aware of a lot of other circumstances which can alter the evidence: mounting filesystems, automatic activation of software RAID arrays, using LVMs or swap-space on the target disk. A lot of Linux-Boot-CDs seem to take care of all the critical points, but in fact there are only few well documented tests available. Another problem of the ready-to-download Linux Live-CD images is the lack of support for brand new hardware. So a framework to build a custom linux-live-system with current kernel versions and packages would be really helpful. We will present grml, a Debian based live system, developed by the Austrian Debian Developer Michael Prokop and the grml team. This system satisfies all the above mentioned initial conditions and much more. Various boot parameters allow to control the behavior of the live system, e.g. the parameter \"forensic\", which is a shortcut for \"nofstab noraid noautoconfig noswap raid=noautodetect readonly ...\". Additionally the grml system can be booted from CD/DVD, USB-/Firewire-Device, Remote-Adapter (iLO, RSA2, ...), Flash-Card and PXE. In this workshop you'll learn how to use grml for forensic investigations and how to build your own live system using the grml-live framework. On some brand-new mainboards the grml system might still fail, because the chipset, especially the onboard-raid-chipset is not yet supported by the linux kernel. For these cases a forensically sound windows-based boot-CD as plan B is needed. So the workshop will present a way to build a forensically sound windows based boot CD using the standard Windows Automated Installation Kit for Windows Vista along with some registry modifications.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-10-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129737281","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination 半自治链路层漏洞发现和缓解传播
Ziyad S. Al-Salloum, S. Wolthusen
Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether these are known to an organization’s asset database or not. This is particularly critical if a security incident is in progress and the exposure to a vulnerability must be assessed and potentially mitigated as quickly and completely as possible. In this paper we therefore propose a probabilistic discovery and mitigation algorithm traversing a network with only knowledge of the immediate network neighborhood as can be obtained from passive observation of the LLDP protocol to minimize bandwidth consumption in con- junction with persistent agents deployed by the traversal to capture transient or intermittently active nodes and provide an analysis of the algorithm’s efficiency under different topologies and taking into account link failure as well as inconclusive or failed discovery and mitigation operation probabilities.
风险和漏洞管理是维护任何重要网络的关键任务,但由于互联网的动态性、瞬时连接和间歇性连接的虚拟机的使用,风险和漏洞管理变得越来越困难,而真实主机和虚拟主机都可能存在漏洞,必须解决这些漏洞,以保护易受攻击的主机及其环境,无论这些漏洞是否为组织的资产数据库所知。如果正在发生安全事件,并且必须对暴露于漏洞的情况进行评估,并尽可能迅速和彻底地进行潜在的缓解,那么这一点尤其重要。因此,在本文中,我们提出了一种概率发现和缓解算法,该算法仅具有直接网络邻居的知识,可以从LLDP协议的被动观察中获得,以最大限度地减少带宽消耗,并与遍历部署的持久代理相结合,以捕获瞬态或间歇活动节点,并提供了算法在不同拓扑下的效率分析,并考虑到链路故障以及不确定或失败的发现和缓解操作概率。
{"title":"Semi-autonomous Link Layer Vulnerability Discovery and Mitigation Dissemination","authors":"Ziyad S. Al-Salloum, S. Wolthusen","doi":"10.1109/IMF.2009.14","DOIUrl":"https://doi.org/10.1109/IMF.2009.14","url":null,"abstract":"Risk and vulnerability management is a critical task in maintaining any nontrivial network, but made increasingly difficult by the dynamic nature of internetworking, transient connectivity, and the use of virtual machines that are connected intermittently, while both real and virtual hosts may harbor vulnerabilities that must be addressed to protect both the vulnerable host and its environment whether these are known to an organization’s asset database or not. This is particularly critical if a security incident is in progress and the exposure to a vulnerability must be assessed and potentially mitigated as quickly and completely as possible. In this paper we therefore propose a probabilistic discovery and mitigation algorithm traversing a network with only knowledge of the immediate network neighborhood as can be obtained from passive observation of the LLDP protocol to minimize bandwidth consumption in con- junction with persistent agents deployed by the traversal to capture transient or intermittently active nodes and provide an analysis of the algorithm’s efficiency under different topologies and taking into account link failure as well as inconclusive or failed discovery and mitigation operation probabilities.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128982469","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 8
Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team 僵尸网络统计分析工具的有限资源计算机应急响应小组
K. Kaemarungsi, Nawattapon Yoskamtorn, Kitisak Jirawannakool, Nuttapong Sanglerdsinlapachai, C. Luangingkasut
Botnet is recognized as one of the fastest growing threat to the Internet and most users do not aware that they were victimized. ThaiCERT is one of many computer emergency response teams that have limited resources in term of budget to monitor and handle this kind of threat. An interim solution for teams with limited resource is to subscribe to the Shadowserver Foundation’s mailing list instead of deploying their own capturing and monitoring tools. The valuable information from the Shadowserver Foundation in form of plaintext e-mails may be difficult to manage and analyze. However, there is a need to analyze information provided by the Shadowserver Foundation to be able to efficiently handle botnet’s incidents for our own constituency. In this manuscript, we present our approach to handle the botnet threat using available information from the Shadowserver Foundation and describe our automate tool using by our incident handling team. Finally, we present our statistical data on botnet’s threat in our constituency over the last two years.
僵尸网络被认为是互联网上增长最快的威胁之一,大多数用户都没有意识到他们是受害者。泰国cert是众多计算机应急响应小组之一,这些小组在监测和处理这类威胁方面的预算资源有限。对于资源有限的团队来说,一个临时解决方案是订阅Shadowserver基金会的邮件列表,而不是部署他们自己的捕获和监控工具。来自Shadowserver基金会的有价值的信息以明文电子邮件的形式出现,可能很难管理和分析。然而,有必要分析Shadowserver基金会提供的信息,以便能够有效地为我们自己的选区处理僵尸网络事件。在这篇文章中,我们使用来自Shadowserver基金会的可用信息展示了我们处理僵尸网络威胁的方法,并描述了我们的事件处理团队使用的自动化工具。最后,我们展示了过去两年僵尸网络在我们选区的威胁统计数据。
{"title":"Botnet Statistical Analysis Tool for Limited Resource Computer Emergency Response Team","authors":"K. Kaemarungsi, Nawattapon Yoskamtorn, Kitisak Jirawannakool, Nuttapong Sanglerdsinlapachai, C. Luangingkasut","doi":"10.1109/IMF.2009.13","DOIUrl":"https://doi.org/10.1109/IMF.2009.13","url":null,"abstract":"Botnet is recognized as one of the fastest growing threat to the Internet and most users do not aware that they were victimized. ThaiCERT is one of many computer emergency response teams that have limited resources in term of budget to monitor and handle this kind of threat. An interim solution for teams with limited resource is to subscribe to the Shadowserver Foundation’s mailing list instead of deploying their own capturing and monitoring tools. The valuable information from the Shadowserver Foundation in form of plaintext e-mails may be difficult to manage and analyze. However, there is a need to analyze information provided by the Shadowserver Foundation to be able to efficiently handle botnet’s incidents for our own constituency. In this manuscript, we present our approach to handle the botnet threat using available information from the Shadowserver Foundation and describe our automate tool using by our incident handling team. Finally, we present our statistical data on botnet’s threat in our constituency over the last two years.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129119362","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 3
Technique to Interrogate an Image of RAM 询问RAM映像的技术
Mark Wozar
Using Mr. Aaron Walters' Python script, nistpe.py, which generates hash values for sections within Microsoft Windows portable executables (PE), I will present a technique allowing industry, academia, law-enforcement, and other government bodies to create custom reference sets that detect sections within a raw bit image of random access memory. The technique identifies PE sections within a raw bit image of random access memory by comparing SHA-1 hash values from page-aligned segments to SHA-1 reference file entries. This technique expands on the “immutable sections of known executables” reported earlier. Being able to identify PEs by hash values may facilitate volatile memory analysis and warn of malicious logic.
我将使用Aaron Walters先生的Python脚本nistpe.py(该脚本为Microsoft Windows可移植可执行文件(PE)中的部分生成散列值),介绍一种技术,该技术允许工业、学术界、执法部门和其他政府机构创建自定义参考集,以检测随机访问内存的原始位映像中的部分。该技术通过比较页对齐段与SHA-1参考文件项的SHA-1哈希值,在随机访问内存的原始位映像中识别PE部分。这种技术扩展了前面报道的“已知可执行文件的不可变部分”。能够通过散列值识别pe可能有助于易失性内存分析并警告恶意逻辑。
{"title":"Technique to Interrogate an Image of RAM","authors":"Mark Wozar","doi":"10.1109/IMF.2009.10","DOIUrl":"https://doi.org/10.1109/IMF.2009.10","url":null,"abstract":"Using Mr. Aaron Walters' Python script, nistpe.py, which generates hash values for sections within Microsoft Windows portable executables (PE), I will present a technique allowing industry, academia, law-enforcement, and other government bodies to create custom reference sets that detect sections within a raw bit image of random access memory. The technique identifies PE sections within a raw bit image of random access memory by comparing SHA-1 hash values from page-aligned segments to SHA-1 reference file entries. This technique expands on the “immutable sections of known executables” reported earlier. Being able to identify PEs by hash values may facilitate volatile memory analysis and warn of malicious logic.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"41 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116225150","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
An Automated User Transparent Approach to log Web URLs for Forensic Analysis 一种自动用户透明的方法来记录用于取证分析的Web url
Muhammad Kamran Ahmed, Mukhtar Hussain, Asad Raza
This paper presents an automated approach to record web activity as the user connects to Internet. It includes monitoring and logging of web URLs visited by the user. The distinctive features of this approach are a) it starts automatically, b) it is transparent to users, c) it is robust against intentional or un-intentional process kill, and d) it is robust against intentional or un-intentional corruption or deletion of log file. The first feature is achieved as the program/application will run with svchost.exe service which is initiated automatically. Transparency is achieved by storing the log file to a default hidden location defined by system variables as well as at a third location (logging server) on the network. Process killing is prevented through dependencies of this application on essential service required to connect to network and thus World Wide Web. The last feature determines that a log activity is also stored in logging server (not accessible to users) even if a user deletes or corrupts it from his local system. The log file contains important information of client, username, date and time of activity and URLs visited. The approach can give vital and potential evidential information of corporate web policy violations, employee monitoring, and law enforcement agencies (digital forensics investigators). This paper also carries out a comparative analysis of the performance and security of proposed scheme against some existing Web forensic and antiforensic tools.
本文提出了一种自动记录用户连接到Internet时的网络活动的方法。它包括监视和记录用户访问的web url。这种方法的显著特点是:a)自动启动;b)对用户透明;c)对有意或无意的进程终止具有鲁棒性;d)对有意或无意的日志文件损坏或删除具有鲁棒性。第一个特性是在程序/应用程序运行时自动启动的svchost.exe服务。通过将日志文件存储到由系统变量定义的默认隐藏位置以及网络上的第三个位置(日志服务器),可以实现透明度。通过此应用程序对连接到网络和万维网所需的基本服务的依赖,可以防止进程终止。最后一个特性确定日志活动也存储在日志服务器中(用户无法访问),即使用户从其本地系统中删除或损坏了日志活动。日志文件包含客户端、用户名、活动日期和时间以及访问的url等重要信息。该方法可以提供公司网络政策违规、员工监控和执法机构(数字取证调查员)的重要和潜在证据信息。本文还与现有的Web取证和反取证工具进行了性能和安全性的对比分析。
{"title":"An Automated User Transparent Approach to log Web URLs for Forensic Analysis","authors":"Muhammad Kamran Ahmed, Mukhtar Hussain, Asad Raza","doi":"10.1109/IMF.2009.12","DOIUrl":"https://doi.org/10.1109/IMF.2009.12","url":null,"abstract":"This paper presents an automated approach to record web activity as the user connects to Internet. It includes monitoring and logging of web URLs visited by the user. The distinctive features of this approach are a) it starts automatically, b) it is transparent to users, c) it is robust against intentional or un-intentional process kill, and d) it is robust against intentional or un-intentional corruption or deletion of log file. The first feature is achieved as the program/application will run with svchost.exe service which is initiated automatically. Transparency is achieved by storing the log file to a default hidden location defined by system variables as well as at a third location (logging server) on the network. Process killing is prevented through dependencies of this application on essential service required to connect to network and thus World Wide Web. The last feature determines that a log activity is also stored in logging server (not accessible to users) even if a user deletes or corrupts it from his local system. The log file contains important information of client, username, date and time of activity and URLs visited. The approach can give vital and potential evidential information of corporate web policy violations, employee monitoring, and law enforcement agencies (digital forensics investigators). This paper also carries out a comparative analysis of the performance and security of proposed scheme against some existing Web forensic and antiforensic tools.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"38 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129515544","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 14
Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges 使用安全日志协议安全保存数字证据:技术现状和挑战
R. Accorsi
While log data are being increasingly used as digital evidence in court, the extent to which existing secure logging protocols used to collect log data fulfill the legal requirements for admissible evidence remain largely unclear. This paper elucidates a subset of the necessary secure requirements for digital evidence and extensively surveys the state of the art secure logging protocols, thereby demonstrating that none of the current protocols completely fulfills the elucidated requirements for admissible evidence. In analyzing the shortcoming of logging protocols, the paper also elaborates on the related research challenges.
虽然日志数据越来越多地被用作法庭上的数字证据,但用于收集日志数据的现有安全记录协议在多大程度上满足了可采证据的法律要求,这在很大程度上仍不清楚。本文阐述了数字证据的必要安全要求的一个子集,并广泛调查了最先进的安全日志协议的现状,从而表明目前的协议都不能完全满足所阐明的可采证据的要求。在分析当前测井协议的不足之处的同时,阐述了相关的研究挑战。
{"title":"Safe-Keeping Digital Evidence with Secure Logging Protocols: State of the Art and Challenges","authors":"R. Accorsi","doi":"10.1109/IMF.2009.18","DOIUrl":"https://doi.org/10.1109/IMF.2009.18","url":null,"abstract":"While log data are being increasingly used as digital evidence in court, the extent to which existing secure logging protocols used to collect log data fulfill the legal requirements for admissible evidence remain largely unclear. This paper elucidates a subset of the necessary secure requirements for digital evidence and extensively surveys the state of the art secure logging protocols, thereby demonstrating that none of the current protocols completely fulfills the elucidated requirements for admissible evidence. In analyzing the shortcoming of logging protocols, the paper also elaborates on the related research challenges.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116902418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 50
Fast User Classifying to Establish Forensic Analysis Priorities 快速用户分类建立法医分析优先级
A. Grillo, Alessandro Lentini, G. Me, M. Ottoni
In computer and common crimes, important evidence or clues are increasingly stored in the computers hard disks. The huge and increasing penetration of computers in the daily life together with a considerable increase of storage capacity in mass-market computers, pose, currently, new challenges to forensic operators. Usually a digital forensic investigator has to spend a lot of time in order to find documents, clues or evidence related to the investigation among the huge amount of data extracted from one or more sized hard drive. In particular, the seized material could be very huge, and, very often, only few devices are considered relevant for the investigation. In this paper we propose a methodology and a tool to support a fast computer user profiling via a classification into investigator-defined categories in order to quickly classify the seized computer user. The main purpose of the methodology discussed is to define the class of the user in order to establish an effective schedule with priorities based on the computer user content.
在计算机和普通犯罪中,越来越多的重要证据或线索存储在计算机硬盘中。计算机在日常生活中的广泛和日益普及,以及大众市场计算机存储容量的大幅增加,目前对法医操作员提出了新的挑战。通常,数字法医调查员必须花费大量时间才能在从一个或多个大小的硬盘驱动器中提取的大量数据中找到与调查相关的文件,线索或证据。特别是,查获的材料可能非常巨大,而且通常只有少数设备被认为与调查有关。在本文中,我们提出了一种方法和工具来支持快速的计算机用户分析,通过分类到调查员定义的类别,以便快速分类被查获的计算机用户。所讨论的方法的主要目的是定义用户的类别,以便根据计算机用户内容建立具有优先级的有效时间表。
{"title":"Fast User Classifying to Establish Forensic Analysis Priorities","authors":"A. Grillo, Alessandro Lentini, G. Me, M. Ottoni","doi":"10.1109/IMF.2009.16","DOIUrl":"https://doi.org/10.1109/IMF.2009.16","url":null,"abstract":"In computer and common crimes, important evidence or clues are increasingly stored in the computers hard disks. The huge and increasing penetration of computers in the daily life together with a considerable increase of storage capacity in mass-market computers, pose, currently, new challenges to forensic operators. Usually a digital forensic investigator has to spend a lot of time in order to find documents, clues or evidence related to the investigation among the huge amount of data extracted from one or more sized hard drive. In particular, the seized material could be very huge, and, very often, only few devices are considered relevant for the investigation. In this paper we propose a methodology and a tool to support a fast computer user profiling via a classification into investigator-defined categories in order to quickly classify the seized computer user. The main purpose of the methodology discussed is to define the class of the user in order to establish an effective schedule with priorities based on the computer user content.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116310434","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 17
Self-Forensics Through Case Studies of Small-to-Medium Software Systems 通过中小型软件系统的案例研究进行自我取证
Serguei A. Mokhov, Emil Vassev
The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record their own states, events, and others encoded in a forensic form suitable for (potentially automated) forensic analysis, evidence modeling and specification, and event reconstruction for various system components. For self-forensics, “self-dissection” is possible for analysis using a standard language and decision making if the system includes such a self-forensic subsystem. The self-forensic evidence is encoded in a cyberforensic investigation case and event reconstruction language, Forensic Lucid. The encoding of the stories depicted by the evidence comprise a context as a first-class value of a Forensic Lucid “program”, after which an investigator models the case describing relationships between various events and pieces of information. It is important to get the context right for the case to have a meaning and the proper meaning computation, so we perform case studies of some small-to-medium, distributed and not, primarily academic open-source software systems. In this work, for the purpose of implementation of the small self-forensic modules for the data structures and event flow, we specify the requirements of what the context should be for those systems. The systems share in common the base programming language – Java, so our self-forensic logging of the Java data structures and events as Forensic Lucid context specification expressions is laid out ready for an investigator to examine and model the case.
自取证的概念和定义是由Mokhov引入的,它包含了自主系统和其他系统的软件和硬件功能,用于记录自己的状态、事件和其他以取证形式编码的系统,适合(潜在的自动化)取证分析、证据建模和规范,以及各种系统组件的事件重建。对于自鉴定,如果系统包含这样的自鉴定子系统,则可以使用标准语言和决策制定进行“自解剖”分析。自取证证据被编码为网络取证调查案件和事件重建语言“取证清醒”。证据所描述的故事的编码构成了一个上下文,这是Forensic Lucid“程序”的头等价值,在此之后,调查人员对案件进行建模,描述各种事件和信息片段之间的关系。重要的是要让上下文正确,以使案例具有意义和适当的意义计算,因此我们对一些中小型,分布式而非主要学术的开源软件系统进行案例研究。在这项工作中,为了实现数据结构和事件流的小型自取证模块,我们指定了这些系统的上下文应该是什么。这些系统共享基本编程语言—Java,因此我们将Java数据结构和事件的自取证日志作为取证Lucid上下文规范表达式进行了布局,以便调查人员检查和建模案例。
{"title":"Self-Forensics Through Case Studies of Small-to-Medium Software Systems","authors":"Serguei A. Mokhov, Emil Vassev","doi":"10.1109/IMF.2009.19","DOIUrl":"https://doi.org/10.1109/IMF.2009.19","url":null,"abstract":"The notion and definition of self-forensics was introduced by Mokhov to encompass software and hardware capabilities for autonomic and other systems to record their own states, events, and others encoded in a forensic form suitable for (potentially automated) forensic analysis, evidence modeling and specification, and event reconstruction for various system components. For self-forensics, “self-dissection” is possible for analysis using a standard language and decision making if the system includes such a self-forensic subsystem. The self-forensic evidence is encoded in a cyberforensic investigation case and event reconstruction language, Forensic Lucid. The encoding of the stories depicted by the evidence comprise a context as a first-class value of a Forensic Lucid “program”, after which an investigator models the case describing relationships between various events and pieces of information. It is important to get the context right for the case to have a meaning and the proper meaning computation, so we perform case studies of some small-to-medium, distributed and not, primarily academic open-source software systems. In this work, for the purpose of implementation of the small self-forensic modules for the data structures and event flow, we specify the requirements of what the context should be for those systems. The systems share in common the base programming language – Java, so our self-forensic logging of the Java data structures and events as Forensic Lucid context specification expressions is laid out ready for an investigator to examine and model the case.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114735975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 21
The Forensic Image Generator Generator (Forensig2) 法医图像生成器(Forensig2)
Christian Moch, F. Freiling
We describe a system that allows to produce file system images for training courses in forensic computing. The instructor can “program” certain user behavior (like copying files and deleting them) in a script file which is then executed by the system using a combination of Python and Qemu. The result is a file system image that can be analysed by students within exercises on forensic computing. The analysis results of the students can then be compared with the “truth” encoded in the input script. The system therefore allows to easily generate large numbers of artificial but still challenging images without the privacy concerns of, for example, using and analysing second hand hard disks.
我们描述了一个系统,该系统允许为取证计算培训课程生成文件系统图像。讲师可以在脚本文件中“编程”某些用户行为(如复制和删除文件),然后由系统使用Python和Qemu的组合执行。结果是一个文件系统映像,学生可以在取证计算练习中分析它。然后,学生的分析结果可以与输入脚本中编码的“真相”进行比较。因此,该系统可以轻松生成大量人工但仍然具有挑战性的图像,而无需担心使用和分析二手硬盘等隐私问题。
{"title":"The Forensic Image Generator Generator (Forensig2)","authors":"Christian Moch, F. Freiling","doi":"10.1109/IMF.2009.8","DOIUrl":"https://doi.org/10.1109/IMF.2009.8","url":null,"abstract":"We describe a system that allows to produce file system images for training courses in forensic computing. The instructor can “program” certain user behavior (like copying files and deleting them) in a script file which is then executed by the system using a combination of Python and Qemu. The result is a file system image that can be analysed by students within exercises on forensic computing. The analysis results of the students can then be compared with the “truth” encoded in the input script. The system therefore allows to easily generate large numbers of artificial but still challenging images without the privacy concerns of, for example, using and analysing second hand hard disks.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"188 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123032187","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors 开源和闭源软件厂商补丁行为的综合对比分析
G. Schryen
While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments is still weak. Addressing this research gap, this paper presents a comprehensive empirical investigation of the patching behavior of software vendors/communities of widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. As the value of any empirical study relies on the quality of data available, this paper also discusses in detail data issues, explains to what extent the empirical analysis can be based on vulnerability data contained in the NIST National Vulnerability Database, and shows how data on vulnerability patches was collected by the author to support this study. The results of the analysis suggest that it is not the particular software development style that determines patching behavior, but rather the policy of the particular software vendor.
虽然已经出现了许多反对或支持开源和闭源软件开发的理论争论,但是评估争论的经验基础仍然很薄弱。为了弥补这一研究缺口,本文对广泛部署的开源和闭源软件包(包括操作系统、数据库系统、web浏览器、电子邮件客户端和办公系统)的软件供应商/社区的补丁行为进行了全面的实证调查。由于任何实证研究的价值都取决于可用数据的质量,本文还详细讨论了数据问题,说明了在多大程度上可以基于NIST国家漏洞数据库中的漏洞数据进行实证分析,并展示了作者是如何收集漏洞补丁数据来支持本研究的。分析的结果表明,决定打补丁行为的不是特定的软件开发风格,而是特定软件供应商的策略。
{"title":"A Comprehensive and Comparative Analysis of the Patching Behavior of Open Source and Closed Source Software Vendors","authors":"G. Schryen","doi":"10.1109/IMF.2009.15","DOIUrl":"https://doi.org/10.1109/IMF.2009.15","url":null,"abstract":"While many theoretical arguments against or in favor of open source and closed source software development have been presented, the empirical basis for the assessment of arguments is still weak. Addressing this research gap, this paper presents a comprehensive empirical investigation of the patching behavior of software vendors/communities of widely deployed open source and closed source software packages, including operating systems, database systems, web browsers, email clients, and office systems. As the value of any empirical study relies on the quality of data available, this paper also discusses in detail data issues, explains to what extent the empirical analysis can be based on vulnerability data contained in the NIST National Vulnerability Database, and shows how data on vulnerability patches was collected by the author to support this study. The results of the analysis suggest that it is not the particular software development style that determines patching behavior, but rather the policy of the particular software vendor.","PeriodicalId":370893,"journal":{"name":"2009 Fifth International Conference on IT Security Incident Management and IT Forensics","volume":"70 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2009-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132803214","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 27
期刊
2009 Fifth International Conference on IT Security Incident Management and IT Forensics
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1