Digital Forensics

513 views
424 views

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
513
On SlideShare
0
From Embeds
0
Number of Embeds
5
Actions
Shares
0
Downloads
30
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Digital Forensics

  1. 1. Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #5 Forensics Systems September 5, 2007
  2. 2. Outline <ul><li>Some developments </li></ul><ul><li>Review of Lectures 3 and 4 </li></ul><ul><li>Lectures 5 </li></ul><ul><ul><li>Types of Computer Forensics Systems </li></ul></ul><ul><ul><li>Objective: Identify issues in corporate planning for computer forensics </li></ul></ul><ul><li>Tools for Digital Forensics </li></ul><ul><li>Assignment #1 </li></ul><ul><li>Lab Tour </li></ul>
  3. 3. Some Developments <ul><li>Internships positions available in commuter forensics with DFW area FBI and Law Enforcement </li></ul><ul><li>Guest lectures are being arranged to be given by DFW FBI and Law Enforcement </li></ul><ul><ul><li>Dates to be given </li></ul></ul><ul><li>Mid-term exam: week of October 9 or October 16 </li></ul>
  4. 4. Review of Lectures 3 and 4 <ul><li>Lecture 3 </li></ul><ul><ul><li>Forensics Technology </li></ul></ul><ul><ul><ul><li>Military, Law Enforcement, Business Forensics </li></ul></ul></ul><ul><ul><li>Forensics Techniques </li></ul></ul><ul><ul><ul><li>Finding Hidden Data, Spyware, Encryption, Data Protection, Tracing, Data Mining </li></ul></ul></ul><ul><ul><li>Security Technologies </li></ul></ul><ul><ul><ul><li>Wireless, Firewalls, Biometrics </li></ul></ul></ul><ul><ul><li>APPENDIX: Data Mining </li></ul></ul><ul><li>Lecture 4: Data Mining for Malicious Code Detection </li></ul>
  5. 5. Types of Computer Forensics Systems <ul><li>Internet Security Systems </li></ul><ul><li>Intrusion Detection Systems </li></ul><ul><li>Firewall Security Systems </li></ul><ul><li>Storage Area Network Security Systems </li></ul><ul><li>Network disaster recovery systems </li></ul><ul><li>Public key infrastructure systems </li></ul><ul><li>Wireless network security systems </li></ul><ul><li>Satellite encryption security systems </li></ul><ul><li>Instant Messaging Security Systems </li></ul><ul><li>Net privacy systems </li></ul><ul><li>Identity management security systems </li></ul><ul><li>Identify theft prevention systems </li></ul><ul><li>Biometric security systems </li></ul><ul><li>Homeland security systems </li></ul>
  6. 6. Internet Security Systems <ul><li>Security hierarchy </li></ul><ul><ul><li>Public, Private and Mission Critical data </li></ul></ul><ul><ul><li>Unclassified, Confidential, Secret and TopSecret data </li></ul></ul><ul><li>Security Policy </li></ul><ul><ul><li>Who gets access to what data </li></ul></ul><ul><ul><li>Bell LaPadula Security Policy, Noninterference Policy </li></ul></ul><ul><li>Access Control </li></ul><ul><ul><li>Role-based access control, Usage control </li></ul></ul><ul><li>Encryption </li></ul><ul><ul><li>Public/private keys </li></ul></ul><ul><ul><li>Secret payment systems </li></ul></ul><ul><li>Directions </li></ul><ul><ul><li>Smart cards </li></ul></ul>
  7. 7. Intrusion Detection Systems <ul><li>An intrusion can be defined as “any set of actions that attempt to compromise the integrity, confidentiality, or availability of a resource”. </li></ul><ul><li>Attacks are: </li></ul><ul><ul><li>Host-based attacks </li></ul></ul><ul><ul><li>Network-based attacks </li></ul></ul><ul><li>Intrusion detection systems are split into two groups: </li></ul><ul><ul><li>Anomaly detection systems </li></ul></ul><ul><ul><li>Misuse detection systems </li></ul></ul><ul><li>Use audit logs </li></ul><ul><ul><li>Capture all activities in network and hosts. </li></ul></ul><ul><ul><li>But the amount of data is huge! </li></ul></ul>
  8. 8. Our Approach: Overview Training Data Class Hierarchical Clustering (DGSOT) Testing Testing Data SVM Class Training DGSOT: Dynamically growing self organizing tree
  9. 9. Hierarchical clustering with SVM flow chart Our Approach Our Approach: Hierarchical Clustering
  10. 10. Worm Detection: Introduction <ul><li>What are worms? </li></ul><ul><ul><li>Self-replicating program; Exploits software vulnerability on a victim; Remotely infects other victims </li></ul></ul><ul><li>Evil worms </li></ul><ul><ul><li>Severe effect; Code Red epidemic cost $2.6 Billion </li></ul></ul><ul><li>Automatic signature generation possible </li></ul><ul><ul><li>EarlyBird System (S. Singh. -UCSD); Autograph (H. Ah-Kim. - CMU) </li></ul></ul><ul><li>Goals of worm detection </li></ul><ul><ul><li>Real-time detection </li></ul></ul><ul><li>Issues </li></ul><ul><ul><li>Substantial Volume of Identical Traffic, Random Probing </li></ul></ul><ul><li>Methods for worm detection </li></ul><ul><ul><li>Count number of sources/destinations; Count number of failed connection attempts </li></ul></ul><ul><li>Worm Types </li></ul><ul><ul><li>Email worms, Instant Messaging worms, Internet worms, IRC worms, File-sharing Networks worms </li></ul></ul>
  11. 11. Email Worm Detection using Data Mining Training data Feature extraction Clean or Infected ? Outgoing Emails Classifier Machine Learning Test data The Model <ul><li>Task: </li></ul><ul><ul><li>given some training instances of both “normal” and “viral” emails, </li></ul></ul><ul><ul><li>induce a hypothesis to detect “viral” emails. </li></ul></ul><ul><li>We used: </li></ul><ul><ul><li>Naïve Bayes </li></ul></ul><ul><ul><li>SVM </li></ul></ul>
  12. 12. Firewall Security Systems <ul><li>Firewall is a system or groups of systems that enforces an access control policy between two networks </li></ul><ul><li>Benefits </li></ul><ul><ul><li>Implements access control across networks </li></ul></ul><ul><ul><li>Maintains logs that can be analyzed </li></ul></ul><ul><ul><ul><li>Data mining for analyzing firewall logs and ensuring policy consistency </li></ul></ul></ul><ul><li>Limitatations </li></ul><ul><ul><li>No security within the network </li></ul></ul><ul><ul><li>Difficult to implement content based policies </li></ul></ul><ul><ul><li>Difficult to protect against malicious code </li></ul></ul><ul><ul><ul><li>Data driven attacks </li></ul></ul></ul>
  13. 13. Traffic Mining <ul><li>To bridge the gap between what is written in the firewall policy rules and what is being observed in the network is to analyze traffic and log of the packets– traffic mining </li></ul><ul><ul><ul><li>Network traffic trend may show that some rules are out-dated or not used recently </li></ul></ul></ul>Firewall Policy Rule Firewall Log File Mining Log File Using Frequency Filtering Rule Generalization Generic Rules Identify Decaying & Dominant Rules Edit Firewall Rules
  14. 14. <ul><li>Traffic Mining Results </li></ul>Anomaly Discovery Result Rule 1, Rule 2: ==> GENRERALIZATION Rule 1, Rule 16: ==> CORRELATED Rule 2, Rule 12: ==> SHADOWED Rule 4, Rule 5: ==> GENRERALIZATION Rule 4, Rule 15: ==> CORRELATED Rule 5, Rule 11: ==> SHADOWED 1: TCP,INPUT,129.110.96.117,ANY,*.*.*.*,80,DENY 2: TCP,INPUT,*.*.*.*,ANY,*.*.*.*,80,ACCEPT 3: TCP,INPUT,*.*.*.*,ANY,*.*.*.*,443,DENY 4: TCP,INPUT,129.110.96.117,ANY,*.*.*.*,22,DENY 5: TCP,INPUT,*.*.*.*,ANY,*.*.*.*,22,ACCEPT 6: TCP,OUTPUT,129.110.96.80,ANY,*.*.*.*,22,DENY 7: UDP,OUTPUT,*.*.*.*,ANY,*.*.*.*,53,ACCEPT 8: UDP,INPUT,*.*.*.*,53,*.*.*.*,ANY,ACCEPT 9: UDP,OUTPUT,*.*.*.*,ANY,*.*.*.*,ANY,DENY 10: UDP,INPUT,*.*.*.*,ANY,*.*.*.*,ANY,DENY 11: TCP,INPUT,129.110.96.117,ANY,129.110.96.80,22,DENY 12: TCP,INPUT,129.110.96.117,ANY,129.110.96.80,80,DENY 13: UDP,INPUT,*.*.*.*,ANY,129.110.96.80,ANY,DENY 14: UDP,OUTPUT,129.110.96.80,ANY,129.110.10.*,ANY,DENY 15: TCP,INPUT,*.*.*.*,ANY,129.110.96.80,22,ACCEPT 16: TCP,INPUT,*.*.*.*,ANY,129.110.96.80,80,ACCEPT 17: UDP,INPUT,129.110.*.*,53,129.110.96.80,ANY,ACCEPT 18: UDP,OUTPUT,129.110.96.80,ANY,129.110.*.*,53,ACCEPT
  15. 15. Storage Area Network Security Systems <ul><li>High performance networks that connects all the storage systems </li></ul><ul><ul><li>After as disaster such as terrorism or natural disaster (9/11 or Katrina), the data has to be availability </li></ul></ul><ul><ul><li>Database systems is a special kind of storage system </li></ul></ul><ul><li>Benefits include centralized management, scalability reliability, performance </li></ul><ul><li>Security attacks on multiple storage devices </li></ul><ul><ul><li>Secure storage is being investigated </li></ul></ul>
  16. 16. Network Disaster Recovery Systems <ul><li>Network disaster recovery is the ability to respond to an interruption in network services by implementing a disaster recovery palm </li></ul><ul><li>Policies and procedures have to be defined and subsequently enforced </li></ul><ul><li>Which machines to shut down, determine which backup servers to use, When should law enforcement be notified </li></ul>
  17. 17. Public Key Infrastructure Systems <ul><li>A certificate authority that issues and verifies digital certificates </li></ul><ul><li>A registration authority that acts as a verifier for the certificate authority before a digital certificate is issued to a requester </li></ul><ul><li>One or more directories where the certificates with their public keys are held </li></ul><ul><li>A certificate management systems </li></ul>
  18. 18. Digital Identity Management <ul><li>Digital identity is the identity that a user has to access an electronic resource </li></ul><ul><li>A person could have multiple identities </li></ul><ul><ul><li>A physician could have an identity to access medical resources and another to access his bank accounts </li></ul></ul><ul><li>Digital identity management is about managing the multiple identities </li></ul><ul><ul><li>Manage databases that store and retrieve identities </li></ul></ul><ul><ul><li>Resolve conflicts and heterogeneity </li></ul></ul><ul><ul><li>Make associations </li></ul></ul><ul><ul><li>Provide security </li></ul></ul><ul><li>Ontology management for identity management is an emerging research area </li></ul>
  19. 19. Digital Identity Management - II <ul><li>Federated Identity Management </li></ul><ul><ul><li>Corporations work with each other across organizational boundaries with the concept of federated identity </li></ul></ul><ul><ul><li>Each corporation has its own identity and may belong to multiple federations </li></ul></ul><ul><ul><li>Individual identity management within an organization and federated identity management across organizations </li></ul></ul><ul><li>Technologies for identity management </li></ul><ul><ul><li>Database management, data mining, ontology management, federated computing </li></ul></ul>
  20. 20. Identity Theft Management <ul><li>Need for secure identity management </li></ul><ul><ul><li>Ease the burden of managing numerous identities </li></ul></ul><ul><ul><li>Prevent misuse of identity: preventing identity theft </li></ul></ul><ul><li>Identity theft is stealing another person’s digital identity </li></ul><ul><li>Techniques for preventing identity thefts include </li></ul><ul><ul><li>Access control, Encryption, Digital Signatures </li></ul></ul><ul><ul><li>A merchant encrypts the data and signs with the public key of the recipient </li></ul></ul><ul><ul><li>Recipient decrypts with his private key </li></ul></ul>
  21. 21. Biometrics <ul><li>Early Identication and Authentication (I&A) systems, were based on passwords </li></ul><ul><li>Recently physical characteristics of a person are being used for identification </li></ul><ul><ul><li>Fingerprinting </li></ul></ul><ul><ul><li>Facial features </li></ul></ul><ul><ul><li>Iris scans </li></ul></ul><ul><ul><li>Voice recognition </li></ul></ul><ul><ul><li>Facial expressions </li></ul></ul><ul><li>Biometrics techniques will provide access not only to computers but also to building and homes </li></ul><ul><li>Systems are vulnerable to attack e.g., Fake biometrics </li></ul>
  22. 22. Homeland Security Systems <ul><li>Border and Transportation Security </li></ul><ul><ul><li>RFID technologies? </li></ul></ul><ul><li>Emergency preparedness </li></ul><ul><ul><li>After an attack happens what actions are to be taken? </li></ul></ul><ul><li>Chemical, Biological, Radiological and Nuclear security </li></ul><ul><ul><li>Sensor technologies </li></ul></ul><ul><li>Information analysis and Infrastructure protection </li></ul><ul><ul><li>Data mining, security technologies </li></ul></ul>
  23. 23. Other Types of Systems <ul><li>Wireless security systems </li></ul><ul><ul><li>Protecting PDAs and phones against denial of service and related attacks </li></ul></ul><ul><li>Satellite encryption systems </li></ul><ul><ul><li>Pretty Good Privacy – PGP that uses RSA security </li></ul></ul><ul><li>Instant messaging </li></ul><ul><ul><li>Deployment of instant messaging is usually not controlled </li></ul></ul><ul><ul><li>Should IM be blocked? </li></ul></ul><ul><li>Net Privavacy </li></ul><ul><ul><li>Can we ensure privacy on the networks and systems </li></ul></ul><ul><ul><li>Privacy preserving access? </li></ul></ul>
  24. 24. Conclusion <ul><li>We have discussed many types of forensics systems </li></ul><ul><li>These are systems that are secure, but can be attacked </li></ul><ul><li>Security solutions include policy enforcement, access control encryption, protecting against malicious code </li></ul><ul><li>How can these systems be compromised and what are the actions that need to be taken? </li></ul>
  25. 25. Open Source and Related Tools <ul><li>http://www.opensourceforensics.org/tools/index.html </li></ul><ul><li>http:// www.cerias.purdue.edu /research/forensics/ </li></ul><ul><li>http://www.digital-evidence.org/papers/opensrc_legal.pdf </li></ul><ul><li>http://digitalforensics.ch/nikkel05b.pdf </li></ul><ul><li>http://www.fukt.bth.se/~uncle/papers/master/thesis.pdf </li></ul><ul><li>http://www.vascan.org/webdocs/06confdocs/Day1-TechnicalTrack-DONE/CrimJesseDigital%20Forensics.pdf </li></ul>
  26. 26. Assignment #1 <ul><li>Four exercises at the end of Chapters 1, 2, 3 and 4 </li></ul><ul><li>Due date: September 24, 2007 </li></ul><ul><li>You can read the answers at the back, but please try to produce your own answers </li></ul>
  27. 27. Lab Tour and possible Programming projects <ul><li>SAIAL: Security Analysis and Information Assurance Laboratory </li></ul><ul><li>Develop programs to monitor what your adversary is doing </li></ul><ul><ul><li>Will help our research a lot </li></ul></ul><ul><li>Can you develop techniques that will put pieces of the deleted files together to create the original file? </li></ul><ul><li>Use data analysis/mining for intrusion detection </li></ul><ul><li>Simulate an attack and use the open source tools </li></ul><ul><li>Analyze a disk image </li></ul><ul><ul><li>Will try to give you a disk image to work with </li></ul></ul>

×