Download presentation
Presentation is loading. Please wait.
Published byEmily Brown Modified over 8 years ago
1
Chapter 11 Analysis Methodology Spring 2016 - Incident Response & Computer Forensics
2
Define Objectives Well-defined objectives help achieve better results It is important to determine who will define the objectives Objectives are usually defined as a series of questions. Some objectives are hard to achieve Example: Proving that the system has not been compromised Stay focused - do not run after tempting artifacts
3
Know Your Data Data available in many formats and locations Explore possible data sources and know how they can be used It will help you decide what to collect
4
Where is Data Stored? Desktops and laptops Hard drives and external storage OS, Applications, and associated data If virtualized, data in central infrastructure Servers Hard drives - OS External storage solutions – (likely) Application and other data Mobile devices Small amount of storage, normally nonvolatile (flash) memory Cloud (??)
5
Where is Data Stored? Storage solutions and media USB flash drives, USB hard drives, CDs, DVDs, Network Attached Storage (NAS), Storage Area Networks (SAN) Network Devices Firewalls, switches, routers Cloud services Data belonging to organizations and individual users Backups On-site and off-site storage
6
What is Available Operating System File systems, State information (info on processes, ports, etc.), OS Logs, etc. Application Application specific artifacts (logs, e-mails, browser cache, etc.) Some artifacts are left behind even after the application is removed User data Documents, e-mails, source-code, etc. Network service and instrumentation DHCP, DNS, proxy server information, firewall, etc.
7
Access Your Data Issues: data formats vary, storage media are different, data may have been encrypted, compressed, etc. Disk images Which system? How was it obtained? etc. What does it look like? How was data encoded? Things looking different may have similar information What to search and how to search? Example: a string may appear disconnected and search may not work
8
Analyze Your Data Outline an approach Where to start, what to look for Network and hosts Abnormal user activities Abnormal connection durations Abnormally high CPU activity Recently installed or modified services Programs that automatically start Integrity of system binaries …
9
Select Methods Use of external resources Using methods and tools developed by others Manual inspection of data Particularly when amount of data collected is small Use of specialized tools Can help in data visualization, malware identification, browser artifact analysis, etc. Data minimization through sorting and filtering Helps in focusing on a subsection of data
10
Select Methods Statistical analysis Helps in discovering patterns or anomalies Keyword searching Be careful of cases such as encoding or formatting Search unallocated spaces and slack spaces as well File and record carving Searching for file information based on content – not based on metadata The method works even if a file is deleted or renamed
11
Evaluate Results Evaluate results periodically Can correct or change the method early enough, if results are not satisfactory After finishing data analysis, evaluate how well the result answers the investigative questions If result does not help, try a different method or sources of evidence
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.