Catálogo de publicaciones - libros
Advances in Digital Forensics: IFIP International Conference on Digital Forensics, National Centre for Forensic Science, Orlando, Florida, January 28-January 31, 2007
Philip Craiger ; Sujeet Shenoi (eds.)
1.
En conferencia: 3º IFIP International Conference on Digital Forensics (DigitalForensics) . Orlando, FL, USA . January 28, 2007 - January 31, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
No disponibles.
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-0-387-73741-6
ISBN electrónico
978-0-387-73742-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© International Federation for Information Processing 2007
Cobertura temática
Tabla de contenidos
Calibration Testing Of Network Tap Devices
Barbara Endicott-Popovsky; Brian Chee; Deborah Frincke
Understanding the behavior of network forensic devices is important to support prosecutions of malicious conduct on computer networks as well as legal remedies for false accusations of network management negligence. Individuals who seek to establish the credibility of network forensic data must speak competently about how the data was gathered and the potential for data loss. Unfortunately, manufacturers rarely provide information about the performance of low-layer network devices at a level that will survive legal challenges. This paper proposes a first step toward an independent calibration standard by establishing a validation testing methodology for evaluating forensic taps against manufacturer specifications. The methodology and the theoretical analysis that led to its development are offered as a conceptual framework for developing a standard and to “operationalize” network forensic readiness. This paper also provides details of an exemplar test, testing environment, procedures and results.
I - Legal Issues | Pp. 3-19
On the Legality of Analyzing Telephone Call Records
C. Swenson; C. Adams; A. Whitledge; S. Shenoi
This paper examines the legal issues related to the access and use of call detail records (CDRs) of telephone subscribers that are maintained by service providers. The scenarios considered involve a federal law enforcement agency obtaining CDRs to identify suspects in a terrorism investigation; a federal, state or local law enforcement agency analyzing CDRs to gain insight into drug trafficking activities by an organized crime family; and a state or local law enforcement agency using CDRs to identify parole violators or motorists who exceed the posted speed limit. In addition, the legality of a service provider analyzing CDRs to support its direct marketing efforts is discussed.
I - Legal Issues | Pp. 21-39
Survey of Law Enforcement Perceptions Regarding Digital Evidence
M. Rogers; K. Scarborough; K. Frakes; C. San Martin
This paper analyzes state and local law enforcement agents’ perceptions about prosecutors’ knowledge of digital evidence and their willingness to prosecute cases involving digital evidence, and agents’ perceptions about judges’ knowledge of digital evidence and their willingness to admit digital evidence in legal proceedings, Statistical analysis indicates that a significant negative correlation exists between the size of the population served by law enforcement agents and their perceptions about judges’ knowledge of digital evidence and willingness to admit digital evidence. Also, positive relationships exist between the size of the population served and law enforcement perceptions of prosecutors’ knowledge of digital evidence and willingness to prosecute digital evidence cases, and perceptions about judges’ willingness to admit digital evidence. The implications of these findings are discussed along with suggestions for future research.
I - Legal Issues | Pp. 41-52
Insider Threat Analysis Using Information-Centric Modeling
D. Ha; S. Upadhyaya; H. Ngo; S. Pramanik; R. Chinchani; S. Mathew
Capability acquisition graphs (CAGs) provide a powerful framework for modeling insider threats, network attacks and system vulnerabilities. However, CAG-based security modeling systems have yet to be deployed in practice. This paper demonstrates the feasibility of applying CAGs to insider threat analysis. In particular, it describes the design and operation of an information-centric, graphics-oriented tool called ICMAP. ICMAP enables an analyst without any theoretical background to apply CAGs to answer security questions about vulnerabilities and likely attack scenarios, as well as to monitor network nodes. This functionality makes the tool very useful for attack attribution and forensics.
II - Insider Threat Detection | Pp. 55-73
An Integrated System for Insider Threat Detection
Daniel Ray; Phillip Bradford
This paper describes a proof-of-concept system for detecting insider threats. The system measures insider behavior by observing a user’s processes and threads, information about user mode and kernel mode time, network interface statistics, etc. The system is built using Microsoft’s Windows Management Instrumentation (WMI) implementation of the Web Based Enterprise Management (WBEM) standards. It facilitates the selection and storage of potential digital evidence based on anomalous user behavior with minimal administrative input.
II - Insider Threat Detection | Pp. 75-86
Analysis of Tools for Detecting Rootkits and Hidden Processes
A. Todd; J. Benson; G. Peterson; T. Franz; M. Stevens; R. Raines
Rootkits pose a dilemma in forensic investigations because hackers use them surreptitiously to mislead investigators. This paper analyzes the effectiveness of online and offline information analysis techniques in detecting rootkits and determining the processes and/or files hidden by rootkits. Five common rootkits were investigated using a live analysis tool, five rootkit detection tools (RDTs) and four offline analysis tools. The experimental results indicate that, while live analysis techniques provide a surprising amount of information and offline analysis provides accurate information, RDTs are the best approach for detecting rootkits and hidden processes.
III - Rootkit Detection | Pp. 89-105
A Method for Detecting Linux Kernel Module Rootkits
Doug Wampler; James Graham
Several methods exist for detecting Linux kernel module (LKM) rootkits, most of which rely on system-specific knowledge. We propose an alternative detection technique that only requires knowledge of the distribution of system call addresses in an uninfected system. Our technique relies on outlier analysis, a statistical technique that compares the distribution of system call addresses in a suspect system to that in a known uninfected system. Experimental results indicate that it is possible to detect LKM rootkits with a high degree of confidence.
III - Rootkit Detection | Pp. 107-116
Future Trends in Authorship Attribution
Patrick Juola
Authorship attribution, the science of inferring characteristics of an author from the characteristics of documents written by that author, is a problem with a long history and a wide range of application. This paper surveys the history and present state of the discipline — essentially a collection of methods with little formal data available to select among them. It also makes some predictions about the needs of the discipline and discusses how these needs might be met.
IV - Authorship Attribution | Pp. 119-132
The Keyboard Dilemma and Authorship Identification
Carole Chaski
The keyboard dilemma is the problem of identifying the authorship of a document that was produced by a computer to which multiple users had access. This paper describes a systematic methodology for authorship identification. Validation testing of the methodology demonstrated 95% cross validated accuracy in identifying documents from ten authors and 85% cross validated accuracy in identifying five-sentence chunks from ten authors.
IV - Authorship Attribution | Pp. 133-146
Factors Affecting One-Way Hashing of CD-R Media
Christopher Marberry; Philip Craiger
While conducting a validation study of proficiency test media we found that applying the same hash algorithm against a single CD using different forensic applications resulted in different hash values. We formulated a series of experiments to determine the cause of the anomalous hash values. Our results suggest that certain write options cause forensic applications to report different hash values. We examine the possible consequences of these anomalies in legal proceedings and provide best practices for the use of hashing procedures.
V - Forensic Techniques | Pp. 149-161