An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004.

Slides:



Advertisements
Similar presentations
Complex Recovery/ Data Reduction DFRWS Technical Issues Lots of info to be recovered in in deleted file space Partial data recovery: does this give.
Advertisements

Six Blind Men from Indostan Mark M. Pollitt Digital Evidence Professional Services, Inc.
Crime Scene Investigation Roles 1.0 Describe responsibilities of various personnel involved in crime scene investigations. Examples: police, detectives,
MSc in Business Information Technology
We’ve got what it takes to take what you got! NETWORK FORENSICS.
Guide to Computer Forensics and Investigations, Second Edition
Computer Forensics and Digital Investigation – a brief introduction Ulf Larson/Erland Jonsson.
BACS 371 Computer Forensics
Forensic and Investigative Accounting
Evidence Computer Forensics. Law Enforcement vs. Citizens  Search must have probable cause –4 th amendment search warrant  Private citizen not subject.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J w/ T. Scocca.
T OWARDS S TANDARDS IN D IGITAL F ORENSICS E DUCATION.
COEN 152 Computer Forensics Introduction to Computer Forensics.
Introduction to Data Forensics CIS302 Harry R. Erwin, PhD School of Computing and Technology University of Sunderland.
Guide to Computer Forensics and Investigations, Second Edition
Defining Digital Forensic Examination & Analysis Tools Brian Carrier.
Investigating Cybercrime DATALAWS Information Technology Law Consultants Presented by F. F Akinsuyi (MSc, LLM)MBCS.
Digital Crime Scene Investigative Process
Introduction to ForensicsSection 1 Section 1: Introduction to Forensic Science Preview Bellringer Key Ideas What Is Forensic Science? Tools of Forensic.
Study of Comparison of Digital Forensic Investigation Models.
Computer Forensics Principles and Practices
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University.
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Ragib Hasan University of Alabama at Birmingham CS 491/691/791 Fall 2011 Lecture 11 09/27/2011 Security and Privacy in Cloud Computing.
Training and Certification. Who needs digital forensic training and professional certification? Forensic examiners Investigators Crime scene specialists.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. System Forensics, Investigation, and Response.
Computer Forensics Peter Caggiano. Outline My Background What is it? What Can it do and not do? Goals Evidence Types of forensics Future problems How.
The Nature of Evidence Chapter 3 ©2010 Elsevier, Inc.
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
COEN 252 Computer Forensics Introduction to Computer Forensics  Thomas Schwarz, S.J
Forensic Science: Fundamentals & Investigations, Chapter 16 1 Chapter 16 Tool Marks By the end of this chapter you will be able to: o Describe the three.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
MD5 Summary and Computer Examination Process Introduction to Computer Forensics.
Crime Scene Processing.  Any questions before we begin about anything?  Unit 2 Seminar -Chain of Custody -Modus Operandi (MO) -Criminal Profiling -Importance.
Chapter 5 Processing Crime and Incident Scenes Guide to Computer Forensics and Investigations Fourth Edition.
Forensic Science “ Oh, how simple it would all have been had I been here before they came like a herd of buffalo and wallowed all over it.” —A. Conan Doyle,
Using automation to enhance the process of Digital Forensic analysis Daniel Walton School of Computer and Information Science
Cyber Forensics From Data To Digital Evidence Book by - A. Marcella, F. Guillossou.
Crime Scene Investigator. About Crime scene investigators (CSIs) go by many names, including: –evidence technician, –crime scene technician, –forensic.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
FBI Method of Profiling Violent Serial Offenders
A Hierarchical, Objectives-Based Framework for the Digital Investigations Process Nicole Beebe & Jan Guynes Clark University of Texas at San Antonio DFRWS.
RESEARCH An Overview A tutorial PowerPoint presentation by: Ramesh Adhikari.
Chapter 3 Pre-Incident Preparation Spring Incident Response & Computer Forensics.
Unit 2 Seminar. The Objectives of a crime scene investigation are Reconstruct the incident Ascertain the sequence of events Determine the mode of operation.
Forensic and Investigative Accounting Chapter 13 Computer Forensics: A Brief Introduction © 2007 CCH. All Rights Reserved W. Peterson Ave. Chicago,
ONLINE COURSES - SIFS FORENSIC SCIENCE PROGRAMME - 2 Our online course instructors are working professionals handling real-life cases related to various.
By: Jeremy Henry. Road Map  What is a cybercrime?  Statistics.  Tools used by an investigator.  Techniques and procedures used.  Specific case.
Computer Forensics By Chris Brown. Computer Forensics Defined Applying computer science to aid in the legal process Utilization of predefined set of procedures.
Electronic Crime: Incident Reporting and Forensics Between Law Enforcement and Private Industry D/Sgt. Michael Harrington CEECS, CFCE, EnCE Michigan State.
Introduction to Computer Forensics Fall Computer Crime Computer crime is any criminal offense, activity or issue that involves computers (
MANAGEMENT of INFORMATION SECURITY, Fifth Edition
Unit 3: Impression Evidence tool marks
CJS 215 RANK creative knowledge /cjs215rank.com
PhD Oral Exam Presentation
Computer Forensics By: Chris Rozic.
Introduction to Computer Forensics
Introduction to Computer Forensics
FILE CARVING: Reassembling files from fragments of bytes/hex data on a digital device.
Chapter 3 Physical Evidence
Scientific Thinking and Processes Notes
Introduction to Digital Forensics
Chapter 16 Tool Marks By the end of this chapter you will be able to:
Fourth Amendment: “The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall.
Ad Hoc Phase Structured Phase Enterprise Phase
Cold Case File # This man and several others were gunned down in the street in front of a government building and many bystanders. Was it self-defense.
The Scientific Process
Presentation transcript:

An Event-based Digital Forensic Investigation Framework Brian D. Carrier Eugene H. Spafford DFRWS 2004

Outline Basic concepts The big picture of investigations Digital crime scene investigation Summary

Digital Data & Objects Digital data: Data represented in a numerical form Digital object: A discrete collection of digital data All digital data has a physical form –Magnetic Fields –Voltage Levels

States & Events State: The value of an object’s characteristics Event: An occurrence that changes the state of one or more objects –Cause: An object whose state was used by the event –Effect: An object whose state was changed by an event

Basic Event: Appending a File

Incidents & Investigations Incident/Crime: An event that violates a policy or law Investigation: A process that develops and tests hypotheses to answer questions about events that occurred

Evidence There is evidence of an event if the effect objects still exist Digital Evidence: A digital object that contains reliable information that supports or refutes a hypothesis about the incident –A hard disk is physical evidence

What about “Forensics”? “Relating to the use of science or technology in the investigation and establishment of facts or evidence in a court of law” –American Heritage Dictionary Digital Investigation vs. Digital Forensic Investigation: The legal requirements

Digital Forensic Investigation A process that uses science and technology to examine digital objects and that develops and tests theories, which can be entered into a court of law, to answer questions about events that occurred.

The Big Picture

Digital Crime Scene Investigation

Digital Crime Scene Investigation Goal: To determine what digital events occurred by recognizing digital evidence Three Phases: –Crime Scene Preservation & Documentation –Evidence Search & Documentation –Event Reconstruction & Documentation

Phase 1: Digital Crime Scene Preservation & Documentation

Scene Preservation & Documentation Goal: Preserve the state of as many digital objects as possible and document the crime scene. Methods: –Shut system down and copy it –Unplug from network & kill processes –Do nothing

Is it Necessary? An investigation does not need preservation A forensic investigation may need preservation Are bitwise-images needed? –Do we take buildings as evidence? Legal requirements dictate the technical requirements of this phase

Phase 2: Digital Evidence Searching and Documentation

Evidence Searching & Doc Need to find evidence of events Goal: To recognize the digital objects that may contain information about the incident and document them.

Existing Research (1) Target definition –Stallard & Levitt - Automated Analysis for Digital Forensic Science: Semantic Integrity Checking –Carrier & Spafford - Defining Searches of Digital Crime Scenes –Manually - experience and training –Stego & malware signatures –Many others….

Existing Research (2) Extraction –All current “forensic” tools –Carrier - Defining Digital Forensic Examination and Analysis Tools Comparison –Visual (most tools) –Equality (keyword searching)

Phase 3: Digital Event Reconstruction and Documentation

Event Reconstruction Need to translate evidence into events Goal: To determine and document the events for which evidence exists and has been collected Not currently supported by many tools

Evidence Examination Role Classification

Event ConstructionEvent Sequencing

Existing Research Carney & Rogers - The Trojan Made Me Do It: A First Step in Statistical Based Computer Forensics Event Reconstruction - IJDE Carrier & Spafford - Defining Digital Crime Scene Event Reconstruction - JFS Gladyshev & Patel - Finite State Machine Approach to Digital Event Reconstruction - JDI Stephenson - Modeling of Post-Incident Root Cause Analysis - IJDE

Conclusion High-level phases based on investigation goals: –Digital Crime Scene Preservation –Digital Evidence Search –Digital Event Reconstruction Similar to physical crime scene investigation