2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA Automatically Creating Realistic Targets for Digital Forensics Investigation  Frank Adelstein.

Slides:



Advertisements
Similar presentations
INDIANAUNIVERSITYINDIANAUNIVERSITY GENI Global Environment for Network Innovation James Williams Director – International Networking Director – Operational.
Advertisements

5 th Annual Workshop on the Teaching Computer Forensics Virtualising Computer Forensics Dr. Jianming Cai Mr. Ayoola Afonja
Jillian Brown. Develop realistic, high quality case material for computer forensic investigations Suitably complex primary data Apply theoretical aspects.
Barry Spencer An introduction to the Moodle VLE Glossaries Assignments Editing Tracking Forums Resources Managing.
Virtualisation and Visualisation – Improving Teaching and Learning in Computer Science Seán Duignan School of Science GMIT Tony Hall Education Department.
Online Computer Based Tutorial
COS/PSA 413 Day 3. Agenda Questions? Blackboard access? Assignment 1 due September 3:35PM –Hands-On Project 1-2 and 2-2 on page 26 of the text Finish.
Homeland Security Exercise and Evaluation Program HSEEP.
Guide to Computer Forensics and Investigations, Second Edition
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Review for Final Exam November 19, 2010.
Transforming Delivery E-Learning for RTO’s What’s in it for you.
Breaking the Performance Wall: The Case for Distributed Digital Forensics Golden G. Richard III Associate Professor, Dept. of Computer Science, University.
1.1 1 Introduction Foundations of Computer Science  Cengage Learning.
Kaseya Fundamentals Workshop Developed by Kaseya University Powered by IT Scholars Kaseya Version 6.5 Last updated March, 2014 DAY FOUR.
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
11 SECURITY TEMPLATES AND PLANNING Chapter 7. Chapter 7: SECURITY TEMPLATES AND PLANNING2 OVERVIEW  Understand the uses of security templates  Explain.
“Knowing Revisited” And that’s how we can move toward really knowing something: Richard Feynman on the Scientific Method.
Chapter 22 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved. Applying Forensic Science to Networks.
SOS EGEE ‘06 GGF Security Auditing Service: Draft Architecture Brian Tierney Dan Gunter Lawrence Berkeley National Laboratory Marty Humphrey University.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 24, 2011.
Automatic Software Testing Tool for Computer Networks ADD Presentation Dudi Patimer Adi Shachar Yaniv Cohen
Ben Livelsberger NIST Information Technology Laboratory, CFTT Program
Building Mobile Augmented Reality Services in Pervasive Computing Environment Hiroaki Kimura Eiji Tokunaga
Study of Comparison of Digital Forensic Investigation Models.
1 Apache. 2 Module - Apache ♦ Overview This module focuses on configuring and customizing Apache web server. Apache is a commonly used Hypertext Transfer.
Models of Models: Digital Forensics and Domain-Specific Languages Daniel A. Ray and Phillip G. Bradford The University of Alabama Tuscaloosa, AL
A Virtual Honeypot Framework Author: Niels Provos Published in: CITI Report 03-1 Presenter: Tao Li.
The Open Source Virtual Lab: a Case Study Authors: E. Damiani, F. Frati, D. Rebeccani, M. Anisetti, V. Bellandi and U. Raimondi University of Milan Department.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #29 Information/Data Hiding and Counter-forensics November 5, 2007.
1 520 Student Presentation GridSim – Grid Modeling and Simulation Toolkit.
Module 5 A system where in its parts perform a unified job of receiving inputs, processes the information and transforms the information into a new kind.
The System and Software Development Process Instructor: Dr. Hany H. Ammar Dept. of Computer Science and Electrical Engineering, WVU.
Chapter 13 ©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.. Investigating Computer Intrusions.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course August 20, 2007.
An Introduction to Computer Forensics Jim Lindsey Western Kentucky University September 28, 2007.
Kenfe-Mickael Laventure Laurent Malvert Macquarie University LEMONA Linux Enhanced Monitoring Architecture Linux zest for security.
Developing and Maintaining a User Community Todd Swarthout Economic Science Laboratory University of Arizona.
Chapter 2 Understanding Computer Investigations Guide to Computer Forensics and Investigations Fourth Edition.
Information Security Audit Tool Presented by Bandar Almarashi Supervisor by Dr. Neville Williams.
REVIEW OF ACTIVITIES OF THE WORK GROUP FOR INTERNET AND e -TECHNOLOGIES Prof. Dr Milena Stanković Faculty of Electronic Engineering TEMPUS Project CD-JEP.
Mobile Agents For Mobile Computing Department Of Computer Science – Dartmouth College Robert Gray David Kotz Saurab Nog Daniela Rus George Cybenko.
Investigating Sophisticated Security Breaches Digital Forensics has proven tough in the age of sophisticated Intruders.
& Selected Topics: Digital Forensics Introduction Xinwen Fu.
Software Engineering for Capstone Courses Richard Anderson CSE 481b Winter 2007.
Design and implementation Chapter 7 – Lecture 1. Design and implementation Software design and implementation is the stage in the software engineering.
Systems Analysis and Design in a Changing World, 6th Edition 1 Chapter 6 - Essentials of Design an the Design Activities.
SQL Server 2012 Session: 1 Session: 4 SQL Azure Data Management Using Microsoft SQL Server.
Software Architecture Exercise 3 System Architecture © Ingo Arnold Department Computer Science University of Basel Introduction.
Free, online, technical courses Take a free online course. Microsoft Virtual Academy.
Digital Evidence Acquisition Using Cyberforensics Tools Oral Paper Presentation Graduate Student Research Development Day Virtual Conference October 25,
Computer Forensics. OVERVIEW OF SEMINAR Introduction Introduction Defining Cyber Crime Defining Cyber Crime Cyber Crime Cyber Crime Cyber Crime As Global.
Workshop on Machine Intelligence & Data Science Departments of Computer / Information Science Sri Jayachamarajendra College of Engineering Mysuru
Models of Models: Digital Forensics and Domain-Specific Languages
Testbed for Medical Cyber-Physical Systems
OpenLabs Security Laboratory
Workshop on Security and Privacy Engineering NII, Tokyo, 2016/03/22
Digital Forensics Dr. Bhavani Thuraisingham
Knut Kröger & Reiner Creutzburg
MIK 2.1 DBNS - introduction to WS-PGRADE, 2013
Introduction to Cloud Computing
Introduction to Software Engineering
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Smart Learning concepts to enhance SMART Universities in Africa
Chapter 7 –Implementation Issues
Digital Forensics Chris Rozic.
©2011 Eoghan Casey. Published by Elsevier Inc. All rights reserved.
Sensor Networks – Motes, Smart Spaces, and Beyond
Open Cloud Ecosystem for New Value Creation (OCEAN)
Peter E, Ayemholan1, Garba, Suleiman2 and Osaigbovo Timothy3
Digital Forensics Dr. Bhavani Thuraisingham
Presentation transcript:

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA Automatically Creating Realistic Targets for Digital Forensics Investigation  Frank Adelstein  ATC-NY  33 Thornwood Drive, Suite 500  Ithaca, NY  Contact: nycorp.com nycorp.com  Yun Gao  Golden G. Richard III Department of Computer Science University of New Orleans  New Orleans, LA  Contact: August 17, 2005

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA Abstract  The need for computer forensics education continues to grow.  An essential component of training is hands-on, realistic assignments.  Creating detailed, realistic lab is a difficult task.  FALCON (Framework for Laboratory exercises Conducted Over Networks)

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA 1. Introduction  Keywords: computer forensics, computer security, education  Computer forensic training schools.  The weakness of the computer forensics education  FALCON cycle.

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA Figure 1: FALCON and the lab development process

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA 2. FALCON Architecture  2.1 Lab Creation Tool(LCT)  To automatically configure a set of target machines  Allow an instructor to carefully specify the types of activity.

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA  2.2 Lab Execution Environment  To provide an interactive environment.  Set up scenarios on virtual target machines for the students to investigate.  Support the forensic investigation itself.  Logging the activities of the students.  OnLine DFS

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA  2.3 Lab Evaluation Tool  Use to evaluate a laboratory exercise.  Help evaluate performance.  Provide details on what actions students took.  Use to gather information to gauge the level of difficulty of the lab. (e.g. time spent)

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA 3. Preliminary Results  All students complete the assignments.

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA Figure 2: Network configuration in proof-of-concept experiment.

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA 4. Conclusions and Future Work  To provide adequate training to students of digital forensics.  An architecture for the creation, deployment, and evaluation of laboratory exercises to support education.  Future -To improve the education in digital forensics. -To improve the education in digital forensics. -To get feedback from the students. -To get feedback from the students.

2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA 5. References  [1]Sleuthkit and Autopsy,  [2]Encase forensics software,  [3]ForensicsToolkit(FTK),  [4]iLook Investigator forensic software,  [5]SMART forensics software,  [6]F. Adelstein, “MFP: The Mobile Forensics Platform,” Proceedings of the 2002 Digital Forensics Research Workshop,  [7]F. Adelstein, “MFP: The Mobile Forensic Platform,” International Journal of Digital Evidence, 2(1),  [8]E. Casey,Digital Evidence and Computer Crime, Academic Press, 2nd Edition, March  [9]E. Casey, Handbook of Computer Crime Investigation: Forensic Tools & Technology, Academic Press, October 2001, pp  [10]E. Casey, “Network traffic as a source of evidence: tool strengths, weak- nesses, and future needs,” Digital Investiga- tion, 1(1), Elsevier, 2004, pp  [11]P. Sealey, “Remote forensics,” Digi- tal Investigation, 1(4), Elsevier, 2004, pp