Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, 247-255 Date : Mar. 7 th, 2006.

Slides:



Advertisements
Similar presentations
The At-Large Advisory Committee (ALAC) An Introduction by Dr. Olivier MJ Crépin-Leblond ALAC Chair.
Advertisements

International Telecommunication Union ENUM Issues and Solutions Houlin Zhao Director Telecommunication Standardization Bureau International Telecommunication.
Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Can you walk away from your current website? In short, yes. However how depends on whether you intend to remain with the same web host and use the same.
The At-Large Advisory Committee (ALAC) An Introduction by Dr. Olivier MJ Crépin-Leblond ALAC Chair.
Rob Smets A user centred approach IPv6 deployment monitoring.
Managing IP addresses for your private clouds 2013 ASEAN CAS Summit Bangkok, Thailand 7 February 2013 George Kuo Member Services Manager.
NetScanTools ® LE Law Enforcement Version of NetScanTools ® from Northwest Performance Software, Inc. netscantools.com.
Handling Internet Network Abuse Reports at APNIC 21 October 2010 LAP-CNSA Workshop, Melbourne George Kuo.
Yerevan, July 11, Armenian edition of Jovan Kurbalija’s book “Internet Governance” I.Mkrtumyan, ISOC AM H.Baghyan, MediaEducation Center.
June 24, 2003 Montréal, Public Forum Whois and ccTLD naming policy Whois and ccTLD naming policy Bart Boswinkel SIDN.
CSC586 Network Forensics IP Tracing/Domain Name Tracing.
Guide to admin procedures on the internet infrastructure William Tevie.
CONSUMMATE TECHNOLOGIES
1 China Internet Network Information Center ( CNNIC ) Administrative Practice of.CN Domain Names.
Mapping Out Cyber Crime Infrastructure A Law Enforcement Approach Jon Flaherty UK National Cyber Crime Unit 13 th May 2015 RIPE 70 - Amsterdam.
Domain Name System | DNSSEC. 2  Internet Protocol address uniquely identifies laptops or phones or other devices  The Domain Name System matches IP.
1 The Impact of IPv6 on Society ~ a Government Perspective ~ Kaori ITO Ministry of Public Management, Home Affairs, Posts and Telecommunications ( MPHPT)
The.CA Registry Yesterday, Today, Tomorrow wwTLD Session, Vancouver November 30, 2005 Norm Ritchie Director of Computer Operations Canadian Internet Registration.
Network Abuse Handling in CNNIC and JPNIC Terence Zhang, CNNIC Izumi Okutani, JPNIC.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
Greg Rattray ICANN Chief Internet Security Advisor
Prepared by The Regional Internet Registries [APNIC, ARIN, LACNIC and RIPE NCC]
Defining Digital Forensic Examination & Analysis Tools Brian Carrier.
Recordkeeping for Good Governance Toolkit Digital Recordkeeping Guidance Funafuti, Tuvalu – June 2013.
1 Mirjam KühneINET MEA, Cairo, May 2004 Welcome to INET MEA Cairo, Egypt 8 May 2005 Mirjam Kühne, ISOC.
1 Internet Presentation GCC-IT commity Saleem Al-Balooshi ETISALAT.
Using Web Cameras & OneNote to Record Student Performance Increasing the Effectiveness of Deliberate and Reflective Practice Exercises in Skills Courses.
ICANN COMMUNITY STRATEGIC PLANNING DISCUSSION Brussels, June
1 APTLD Meeting - Manila – IPv6 ccTLDs Experiences – 24 Feb 2009 AFNIC’s IPv6 Experience For the French Registries APTLD Meeting Manila, 24 February 2009.
Mirjam Kühne 1 RIPE 33, May 1999 Introduction to the RIPE NCC presented by Mirjam Kühne.
1 ICANN & Global Partnerships Baher Esmat Manager, Regional Relations Middle East ccTLD Training, Amman Nov, 2007.
Text #ICANN50 #ATLAS2#ATLAS2. Text #ICANN50 The At-Large Advisory Committee (ALAC) An Introduction by Dr. Olivier MJ Crépin-Leblond ALAC Chair.
© 2006 Pearson Education Canada Inc.4-1 Chapter 4 Telecommunications and the Internet PowerPoint Presentation Jack Van Deventer Ward M. Eagen.
International Telecommunication Union ENUM Implementation Robert Shaw ITU Internet Strategy and Policy Advisor International Telecommunication Union ICANN.
The Domain Name System and DNS Blocking Malcolm Hutty Head of Public Affairs, LINX February 2011.
Anne Lord & Mirjam Kühne. AfNOG Workshop, 10 May IP Address Management AfNOG Workshop, 11 May 2001 Accra, Ghana presented by:
1 IPv6 Allocation Policy and Procedure Global IPv6 Summit in China 2007 April 13, 2007 Gerard Ross and Guangliang Pan.
Patrik Fältström. ITU Tutorial Workshop on ENUM. Feb 8, 2002, Geneva Explanation of ENUM (RFC 2916) Patrik Fältström Area Director, Applications Area,
Management of Internet Resources ITU Workshop on Developing a Policy and Regulatory Framework for Developing Economies of the Pacific 1 December 2003 Suva,
IP Addressing and ICT Development in the Pacific Islands Anne Lord and Save Vocea, APNIC ICT Workshop, Fiji, November, 2002.
Securing Future Growth: Getting Ready for IPv6 NOW! ccTLD Workshop, 8 th April 2011 Noumea, New Caledonia Miwa Fujii, Senior IPv6 Program Specialist, APNIC.
ICANN Regional Outreach Meeting, Dubai 1–3 April Toward a Global Internet Paul Twomey President and CEO 1 April 2008 ICANN Regional Meeting 1–3.
Registry Functions Essential components for operating a ccTLD registry.
30 April 2003 ITU SG2, Geneva, Switzerland Axel Pawlik, RIPE NCC Information Document 21-E ITU-T Study Group 2 May 2003 Question:1/2 Source:TSB Title:The.
Internet Protocol Addresses What are they like and how are the managed? Paul Wilson APNIC.
A S I A P A C I F I C N E T W O R K I N F O R M A T I O N C E N T R E Emerging Registry Criteria ASO General Assembly Budapest, 19 May 2000.
1 Dr. Olivier MJ Crépin-Leblond ISOC UK England Chair ALAC Chair at ICANN Presentation at 3 nd Ukraine Internet Governance Forum Kyiv, Ukraine,
1 The Internet Registry System Mirjam Kühne RIPE NCC EC-POP Brussels 5 July 1999.
1 Welcome to Designing a Microsoft Windows 2000 Network Infrastructure.
1 IPv6 Allocation and Policy Update Global IPv6 Summit in China 2007 April 12, 2007 Guangliang Pan.
Mirjam Kühne. AfNOG Conference, 11 May Operational Co-ordination in the RIPE Region presented by: Mirjam Kühne RIPE NCC.
1 27Apr08 Some thoughts on Internet Governance and expansion of the Domain Name space Paul Twomey President and CEO 9 August 2008 Panel on Internet Governance.
Whois & Data Accuracy Across the RIRs. Terms ISP – An Internet Service Provider is allocated address space by an RIR for the purpose of providing connectivity.
“ICT Policy for Civil Society” Curriculum Produced by APC and CTO
Getting started with ICANN
Public Safety Working Group (PSWG)
ICANN Multi-Stakeholder Model
Unit 36: Internet Server Management
Research & Liaison Officer (Pacific)
A proposal to deprecate ip6.int reverse DNS service in APNIC
Partnership of Governments, Businesses and Civil Society: the ICANN example in coordinating resources and policy making Dr. Olivier MJ Crépin-Leblond
Rodrigo de la Parra / Laurent Ferrali ICANN org
U.S. Department of Justice
An Introduction by Dr. Olivier MJ Crépin-Leblond EURALO Chair
Christopher Wilkinson Head, GAC Secretariat
A Proposal for IPv4 Essential Infrastructure
Digital Forensics Chris Rozic.
IPv6 Policy and Allocation Update
IPv6 Allocation Service in JPNIC
Presentation transcript:

Domain name forensics: a systematic approach to investing an internet presence Source : Digital Investigation (2004) 1, Date : Mar. 7 th, 2006 Reporter : Sparker, Yao Professor : Shiuh-Jeng, Wang

Our scheme Introduction Advantages of complexity Identifying points of responsibility --- Domain name registrars --- Domain name registrants --- DNS server owners --- Regional Internet registries --- Network owners --- Web server owners --- server owners --- Upstream ISP --- Telecommunications carriers --- Routes and AS owners --- Other responsible parties --- The next generation, IPv6

Our scheme (cont.) Collecting and preserving the evidence --- Preparing for the investigation --- Investigating the domain registry and registrant --- Investigating the DNS owners --- Investigating the IP network owners --- Investigating the reverse DNS --- Investigating the webserver owner --- Investigating the upstream ISPs --- Investigating the routing information --- Investigating the physical location --- Investigating the owners --- Finding additional information

Our scheme (cont.) Packaging and preserving the evidence Presenting the evidence Conclusion and future work

Motivation Finding the parties responsible for the different infrastructure areas has become time consuming and error prone. Systematic approach to investigating a complex Internet presence --- collecting --- time-stamping --- packaging --- preserving --- presenting

Advantages of complexity Having critical infrastructure spread across multiple parties can help investigators overcome legal jurisdiction hurdles, as well as solve issues regarding anonymity. Illegal activity done using Internet infrastructure residing outside a local jurisdiction has always been difficult to bring under control. The more parties involved in the existence of an Internet presence, the more difficult it becomes for an entry to remain completely anonymous.

Identifying points of responsibility Domain name registrars : --- TLD (top level domain) --- ccTLD (country code TLDs) --- gTLD (generic TLDs) Regional Internet registries : --- ARIN --- LACNIC --- APNIC --- RIPE

Collecting and preserving the evidence Use the Unix script command to keep a record of everything we see or type, for human errors from graphical interactions such as coping and pasting are eliminated. For example : $ mkdir evidence $ cd evidence $ script record.txt $ ntpq –p > timesync.txt $ date

Collecting and preserving the evidence (cont.) --- Investigating the domain registry and registrant --- Investigating the DNS owners --- Investigating the IP network owners --- Investigating the reverse DNS --- Investigating the webserver owner --- Investigating the upstream ISPs --- Investigating the routing information --- Investigating the physical location --- Investigating the owners --- Finding additional information

Packaging and preserving the evidence Package the collected evidence using the Unix tar command : $ exit $ cd.. $ tar cvf evidence.tar evidence Make a cryptographic hash of the tar file : $ md5 evidence.tar > evidence.md5

Presenting the evidence Without going into too much technical detail, we have created a report during the course of the investigation that non- technical staff can use within the content of their roles. The information in the report can be independently verified based on the data in the evidence.tar file. The integrity of the evidence.tar file can be verified with the evidence.md5 file.

Conclusion and future work Defined the points of responsibility related to an Internet presence. Systematically collected and time-stamped the evidence which identifies these parties. Saved and packaged the evidence in an organized manner. Created a cryptographic hash of the evidence to ensure integrity is preserved. Created a verifiable report presenting the contact information found in the evidence.

簡報完畢 敬請指教 !