140 likes | 268 Views
Recovering and Examining Computer Forensic Evidence. Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google Scholar) Presentation by Bryan Pass. Significance.
E N D
Recovering and ExaminingComputer Forensic Evidence Noblett, Pollit, & Presley Forensic Science Communications October 2000 (Cited by 13 according to Google Scholar) Presentation by Bryan Pass
Significance • “Forensic Science Communications is a peer-reviewed forensic science journal published quarterly in January, April, July, and October by FBI Laboratory personnel. It is a means of communication between forensic scientists.” • An overview of Computer Forensic methods from the forensics authority, the FBI. • Not really new, more of an overview of current methods and thinking
Outline • Significance • Open Research Topics • Computer Forensics for Traditional Crimes • Computer Forensics for Computer Crimes • Who are we dealing with? • Data Recovery • BackTracker • S-TLA+
Open Research Topics • Education – How to better educate forensics and computer students about computer security and forensic methods • Honeypots / Honeynets – Setting up networks to attract hackers in order to study how they operate • Automated log examination – Filtering raw data to lower the amount of information that a human has to review • Data Recovery – Recovering data from physically damage media as well as recovering intentionally deleted information
Computer Forensics for Traditional Crimes • Computer forensic science is the science of acquiring, preserving, retrieving, and presenting data that has been processed electronically and stored on computer media. • Computer evidence is becoming more and more common place in investigations of traditional crimes. • Focus on extracting text, spreadsheets, human readable information • Computer Forensics relies on extracting only useful information. Unlike traditional forensics which attempts to gather all information from a piece of evidence. • 12 GB of printed text data would create a stack of paper 24 stories high.
Traditional Crimes (cont.) • Constantly adapting to changing technology instead of static techniques • Finger printing, DNA Analysis, etc. • Set procedures and guidelines are difficult or impossible to follow because of the variation in equipment used • Operating System, File System, Physical Medium, and Application • Can make copies of the original evidence • Verification of copy • Privacy / Legality Concerns • Attorney’s data protected by confidentiality • E-mail or File servers with many users
A Three-Level Hierarchical Model for Developing Guidelines for Computer Forensic Evidence
Computer Forensics for Computer Crimes • Focus on analyzing log data from computer systems • Often one attack impacts multiple applications, physical systems, and even companies • Logs from applications on the target machine • Logs from other affected machines • Logs from routers, edge routers, firewalls, etc
Computer Crimes (cont.) • Different crimes could result in very different kinds of evidence • DDoS could produce router logs and packet captures • Defacement could produce application logs, router logs, and more traditional evidence (linguistics, etc) • Routinely create legal nightmares of crossed borders and innocent participants • Data recovery techniques • Encryption schemes and export laws
Who are we dealing with? • Determining the sophistication of the suspects • Tamper alarms, and traps • Must appear like a normal user to the device • Cutting the power might not be a good idea • Information in volatile memory even the user didn’t know was there
Data Recovery • Physical damage • It might be harder than you think to destroy a medium beyond partial reconstruction • Clean rooms • Expensive and time consuming – is it worth it for the crime being investigated? • Using Magnetometers to reconstruct disk images • How to really erase something • Overwrite with 0, with random, with patterns, with compliment
BackTracker • Backtracking Intrusions • Log access to other processes, files, sockets, etc • Construct a timeline of what happens after the initial intrusion (filtered dependency graph for bind attack)
S-TLA+ • A formal logic-based language for computer forensics investigations • Describes evidence, helps construct and test hypotheses for hacking scenarios • S-TLAC – automated formal verification tool • Doesn’t seem to really be useful at all
References • “Recovering and Examining Computer Forensic Evidence.” Noblett et al. Forensic Science Communications. October 2000. (http://www.fbi.gov/hq/lab/fsc/backissu/oct2000/computer.htm) (Cited by 13). • “Backtracking Intrusions.” King & Chen. ACM Transactions on Computer Systems. February 2005. (Cited by 29). • “A Formal Logic-based Language and an Automated Verification Tool For Computer Forensic Investigation.” Rehkis & Boudriga. 2005 ACM Symposium on Applied Computing.