Theoretical Aspects of Digital Investigation of Security Incidents
نویسندگان
چکیده
Slim Rekhis. Theoretical Aspects of Digital Investigation of Security Incidents. PhD thesis, Engineering School of Communications (Sup’Com), Networks and Security Research Lab (CN&S), February 2007. (Under the direction of Pr. Noureddine Boudriga). While research in computer security has started giving importance to digital investigation of security incidents, the focus is still on the development of procedural guidelines and technical documents for specific software investigation. Several issues remain unsolved including a) the need of formalization in the investigation reasoning, b) misconception of uncertainty in the investigators knowledge and collected evidences; c) tolerance to digital anti-forensic attacks, and d) network digital investigation in wireless networks. This thesis enriches the digital investigation by several formal theories and techniques and uses them to alleviate the above shortcomings, providing three-axis based contribution. In the first axis, we took interest to providing a logic-based investigation theory. We brought out a novel logic entitled Temporal Logic of Security Actions and its logic-based language. The latter are used to formally specify the set of available evidences and the investigator knowledge and infer the potential attack scenarios as a series of events that moves the system from a safe state to a set of final states satisfying evidences. To tolerate missing evidences and information about the incident and the investigated systems, two different techniques for reasoning with hypotheses were prospected. A Model Checker that integrates automated generation and management of hypotheses was also provided. In the second axis, we developed a formal verification theory for digital investigation based on the concept of Opacity that we extended by new classes and properties to support multiobservations and handle cooperative digital investigation. Such concept was integrated to the Temporal Logic of Security Actions to automate the reconstruction of potential attack scenarios with respect to investigators’ observations, and verify the Opacity properties. We also provided a novel theoretical concept entitled Visibility and set up its relation with network digital investigation, particularly the investigation of source address spoofing attacks in packet switching communication protocols. In the third axis, we extended the scope of digital investigation at different layers, particularly systems, networks, and disks. First, we set up a formal and automated approach based on the use of the Temporal Logic of Security Actions to support computer investigation of systems that are exposed to disk-based anti-forensic attacks. Second, we proposed two novel techniques for tracing intruders’ sources in wired and wireless ad-hoc networks, respectively. Third, we provided a Cooperative Intrusion Detection and Tolerance System that uses network-level, host-level and storage-level information to better detect intrusion attempts in their early stages, and allows tracing users’ activities in terms of opened sockets, involved processes, and read/write disk blocks requests.
منابع مشابه
Investigating Attack Scenarios in Multihop Wireless Systems
Digital investigation of security incidents in the context of wireless networks, has scarcely interested the recent research works. The existing schemes, which were developed for wireline networks, are unable to address the mobility of attackers, the lack of infrastructure, and the evidence collection in hostile environment. To cope with multihop systems, digital investigation schemes require c...
متن کاملIranian Electrical Production and Consumption System Modeling: A Theoretical Study for Investigation of Possible Scenarios
Concerns related to climate change and security of energy supply is pushing various countries to make strategic energy planning decisions. In this regard, energy system modelling is an appropriate method to find out the utilization of current declining non-renewable energy resources and other possible scenarios. Consequently, it is available to consider various aspects of energy system decision...
متن کاملForensic Investigation in Communication Networks Using Incomplete Digital Evidences
Security incidents targeting information systems have become more complex and sophisticated, and intruders might evade responsibility due to the lack of evidence to convict them. In this paper, we develop a system for Digital Forensic in Networking, called DigForNet, which is useful to analyze security incidents and explain the steps taken by the attackers. DigForNet combines intrusion response...
متن کاملAn Exploratory Investigation of Factors Affecting Computer Security Incident Response Team Performance
There has been a huge amount of organizational investment to cope with computer security incidents, but the incidents continue and are expected to increase. Computer security incidents in organizations are primarily dealt with by computer security incident response teams (CSIRT). How the team successfully develops and operates is critical for effective and efficient responses to the incidents. ...
متن کاملNMBaaS (Non-Malicious Botnet as a service): Achieving Digital forensic Readiness in a private cloud using NMBaaS
The pervasiveness of the Internet, increased number of devices and the dissemination of ICT have played a big role in the increase in number of security incidents and adversaries in the cloud. However, there are limited proactive strategies that can enable mitigation of these incidents given the distributed nature of cloud resources. Therefore, the primary aim of the work described in this prop...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2007