5 th Annual Workshop on the Teaching Computer Forensics Virtualising Computer Forensics Dr. Jianming Cai Mr. Ayoola Afonja

Slides:



Advertisements
Similar presentations
John Howard IT Pro Evangelist Microsoft UK Microsoft.
Advertisements

Honeynet Introduction Tang Chin Hooi APAN Secretariat.
University of St Andrews School of Computer Science Experiences with a Private Cloud St Andrews Cloud Computing co-laboratory James W. Smith Ali Khajeh-Hosseini.
Secure Virtual Machine Execution Under an Untrusted Management OS Chunxiao Li Anand Raghunathan Niraj K. Jha.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 IT Essentials PC Hardware and Software v4.0 Speaker Name March 2009.
Desktop and Application Virtualization OHECC 2009.
Ljubomir Ivaniš CPU d.o.o.
Copyright © 2006 by The McGraw-Hill Companies, Inc. All rights reserved. McGraw-Hill Technology Education Introduction to Computer Administration Introduction.
Honeypot Research Hung Nguyen Brendan Roberts Comp 4027 Forensic and Analytical Computing.
Chris Page - Technical Development Manager Dan Pilling - Microsoft Doing more with less.
Finnet's Supermatrix Marko Tyrväinen T Seminar on Multimedia Cloud Computing.
Ed Duguid with subject: MACE Cloud
1 Chapter 11: Data Centre Administration Objectives Data Centre Structure Data Centre Structure Data Centre Administration Data Centre Administration Data.
1 Dell World 2014 Dell & Trend Micro Boost VM Density with AV Designed for VDI TJ Lamphier, Sr. Director Trend Micro & Aaron Brace, Solution Architect.
Visualization tool for network forensics analysis using an Intrusion Detection System ( Cyber ViZ )
Virtualization and Cloud Computing. Definition Virtualization is the ability to run multiple operating systems on a single physical system and share the.
Quick Overview of Virtual PC Tyler S. Farmer Sr. Technology Specialist II Education Solutions Group Microsoft Corporation.
Introducing WatchGuard Dimension. Oceans of Log Data The 3 Dimensions of Big Data Volume –“Log Everything - Storage is Cheap” –Becomes too much data –
Cybersecurity Training in a Virtual Environment By Chinedum Irrechukwu.
 Max Planck Institute for Software Systems Towards trusted cloud computing Nuno Santos, Krishna P. Gummadi, and Rodrigo Rodrigues MPI-SWS.
Virtualization Ryan Cahoon Timothy Farkas Christopher Garcia Jeremy Slovak.
Guide to Computer Forensics and Investigations Third Edition Chapter 11 Network Forensics.
Server Virtualization Gina Myers. Definition Creating virtual machines (VMs) “VMs are software entities that emulate a real machine’s functionality” ◦
Presented by Sujit Tilak. Evolution of Client/Server Architecture Clients & Server on different computer systems Local Area Network for Server and Client.
INFORMATION SECURITY UPDATE Al Arboleda Chief Information Security Officer.
Virtualization for Cloud Computing
ProjectWise Virtualization Kevin Boland. What is Virtualization? Virtualization is a technique for deploying technologies. Virtualization creates a level.
© 2012 The McGraw-Hill Companies, Inc. All rights reserved. 1 Third Edition Chapter 3 Desktop Virtualization McGraw-Hill.
Citrix Academic Network Leaders to power the world’s transformation to virtual computing.
To run the program: To run the program: You need the OS: You need the OS:
Virtualization and Open source Software Mr. Lau Ka Lun – Lai King Catholic Secondary School Date: 9 th, 21 st, 22 nd March, 2011.
Introducing Kerio Control Unified Threat Management Solution Release date: June 1, 2010 Kerio Technologies, Inc.
6 th Annual Workshop on the Teaching Computer Forensics 6 th Annual Teaching Computer Forensics Workshop Enhancing the Experience in Network Incident Investigations.
Virtualization Week 20. This week Virtualization – What is it? – Software on different operating systems? Group Presentations – minutes per group.
Teaching Digital Forensics w/Virtuals By Amelia Phillips.
A look at the current initiatives within UWE such as SharePoint, consolidation and virtualisation as well as some of the technology trends we can see coming.
SAIGONTECH COPPERATIVE EDUCATION NETWORKING Spring 2010 Seminar #1 VIRTUALIZATION EVERYWHERE.
Introduction to VMware Virtualization
Virtualization. ABCs Special software: hypervisors or virtual machine managers Guest OS (virtual machine) sits on top of host OS (Win 7 in our case) We.
Designing Security for Microsoft® Networks Course 2830B.
Copyright © 2011 EMC Corporation. All Rights Reserved. MODULE – 6 VIRTUALIZED DATA CENTER – DESKTOP AND APPLICATION 1.
©2014 Bit9. All Rights Reserved Endpoint Threat Prevention Charles Roussey | Sr. Sales Engineer Detection and Response in Seconds.
Using Virtualization in the Classroom. Using Virtualization in the Classroom Session Objectives Define virtualization Compare major virtualization programs.
Improving Network I/O Virtualization for Cloud Computing.
School of Electrical Engineering & Computer Science National University of Sciences & Technology (NUST), Pakistan Research Profile Fauzan Mirza.
VirtualBox What you need to know to build a Virtual Machine.
Network Plus Virtualization Concepts. Virtualization Overview Virtualization is the emulation of a computer environment called a Virtual Machine. A Hypervisor.
How to use Remote Desktop and Remote Support. What is remote desktop? Remotely control your computer from another office, from home, or while traveling.
Instruction Set Virtualization
VIRTUAL MACHINES AND OPEN SOURCE SOFTWARE Installing multiple Operating Systems.
Desktop Virtualization
Mastering Windows Network Forensics and Investigation Chapter 17: The Challenges of Cloud Computing and Virtualization.
Introduction TO Network Administration
The Personal Server Changing the Way We Think About Ubiquitous Computing Roy Want, et al. / Intel Research UBICOMP 2002 Nov Seungjae Lee
Virtual Machines. A virtual machine takes the layered approach to its logical conclusion. It treats hardware and the operating system kernel as though.
Group # 14 Dhairya Gala Priyank Shah. Introduction to Grid Appliance The Grid appliance is a plug-and-play virtual machine appliance intended for Grid.
VIRTUALIZATION TECHNOLOGIES BY COLLIN DONALDSON. PHYSICAL COMPUTING Install Hardware Load Operating System and other software Deploy either manually or.
© ExplorNet’s Centers for Quality Teaching and Learning 1 Explain the purpose of Microsoft virtualization. Objective Course Weight 2%
Moving Small Business Server into the Future. STANDARD Workload Optimized DATACENTER Virtualization Optimized Virtualization SKUs ESSENTIALS Small Business,
Introduction Name Company affiliation Title/function Job responsibility Windows experience Your expectations for the course.
Unit 2: Cyber Security Part 3 Monitoring Tools & other Security Products.
Geeks Need Basements. Who am I? Started in computer industry in 1982 Specializing in security for the past 15 years ASS (Application Security Specialist)
Citrix Academic Network
Creighton Barrett Dalhousie University Archives
Introduction to VMware Virtualization
Virtual Machines.
Hands-On Virtualization in the Classroom
Easily and Affordably Manage and Distribute Online Training Labs with the Power of Azure “When we compared university learning environments with business.
Azure Cloud Solution Enables a More Powerful, Robust Multilayer Security for Client Web Assets “Microsoft Azure’s cloud technologies allow us to provide.
Presentation transcript:

5 th Annual Workshop on the Teaching Computer Forensics Virtualising Computer Forensics Dr. Jianming Cai Mr. Ayoola Afonja Faculty of Computing London Metropolitan University

5 th Annual Workshop on the Teaching Computer ForensicsTopics Problems with Teaching Computer Forensics Introduction to Virtualisation Technology Moving towards the Virtual Environment A Case Study Summary

5 th Annual Workshop on the Teaching Computer Forensics Problems with Teaching Computer Forensics Digital evidence from different hard/software platforms University labs normally equipped with PCs and Ms Windows O.S. Specialised Computer Forensic Labs needed What kind of labs we can afford?

5 th Annual Workshop on the Teaching Computer Forensics Introduction to Virtualisation Technology Virtualisation - the current trend reshaping the software technology industry Multiple Virtual Machines (VMs) run concurrently on a physical machine. Supported by the powerful processors and very large storages VMware – the leading software, 100% Fortune companies deployed its software

5 th Annual Workshop on the Teaching Computer Forensics The VM Layer Structure

5 th Annual Workshop on the Teaching Computer Forensics Moving towards the Virtual Environment The desktop VMware installed on each PC Both virtual Windows XP and virtual Linux then installed on top of this VMware layer Students have admin access to each virtual machine. Both Windows-based and Linux-based Computer Forensics toolkits are running concurrently.

5 th Annual Workshop on the Teaching Computer Forensics The Virtual Windows XP Running EnCase

5 th Annual Workshop on the Teaching Computer Forensics The Virtual Linux Running Autopsy

5 th Annual Workshop on the Teaching Computer Forensics A Case Study A network incident investigation Evidence collected from Linux O.S. Not intended to show Network Forensics techniques Rather to demonstrate the viability of Forensic Analysis based on VMs

5 th Annual Workshop on the Teaching Computer Forensics Snort HTTP Packet Inspection Results

5 th Annual Workshop on the Teaching Computer Forensics Nmap Attack Identification

5 th Annual Workshop on the Teaching Computer Forensics Inspecting Grouped Snort Log

5 th Annual Workshop on the Teaching Computer ForensicsSummary Teaching Computer Forensics is not only demanding but also expensive. The Virtual Environment is one of the low cost and efficient solutions. Its full benefit is being exploited as the Virtualisation Technology advances. Are we prepared for the Virtualisation era?

5 th Annual Workshop on the Teaching Computer ForensicsReference [1] Virtualize Your Business Infrastructure, viewed on 10/11/2009 [2] viewed on 27/10/09 [3] viewed on 05/05/2009 [4] viewed on 10/11/2009 [5] viewed on 10/11/2009 [6] Keith J. Jones et al (2006), Real Digital Forensics Computer Security and Incident response, Addison-Wesley, USA. [7] viewed on 10/11/2009 [8] Dan Farmer and Wietse Venema (2005) Forensic Discovery, Addison-Wesley, ISBN X [9] Intrusion Detection Level Analysis of Nmap and Queso, viewed on [10] viewed on 10/11/2009