Presentation is loading. Please wait.

Presentation is loading. Please wait.

Suntisak Thammavongsa 28-11-2011 Bachelor of IT (Honours) Supervised by Dr Raymond Choo University of South Australia Investigating a Private Ubuntu Enterprise.

Similar presentations


Presentation on theme: "Suntisak Thammavongsa 28-11-2011 Bachelor of IT (Honours) Supervised by Dr Raymond Choo University of South Australia Investigating a Private Ubuntu Enterprise."— Presentation transcript:

1 Suntisak Thammavongsa 28-11-2011 Bachelor of IT (Honours) Supervised by Dr Raymond Choo University of South Australia Investigating a Private Ubuntu Enterprise Cloud

2 Background Research Topic Research Method Research Findings Outline

3 Cloud Computing Background “A whole broad range of IT services as long as those IT services are delivered on demand and they’re delivered elastically in terms of being able scale out and scale in” defined by Dasmalchi (2010)Dasmalchi (2010)

4 Traditional Physical Hosting Internet Web 1 Web 2 Directory E-Mail File Database Background

5 Private Cloud Internet Cloud Controller Database Centralized Data Storage Web 1 Web 2 Web 3 Directory 1 Directory 2 CRM APP DHCP Email DNS Background

6 Private Cloud Internet Cloud Controller Database Email 1 Email 2 DNS DHCP Centralized Data Storage Background Web 1 Web 2 Web 3 Directory 1 Directory 2 CRM 1 CRM 2 APP 1 APP 2

7 Digital Forensics “The process of identifying, preserving, analysing and presenting digital evidence in a manner that is legally acceptable” defined by McKemmish (1999)McKemmish (1999) Background

8 Digital Forensics Primary questions What happened? When did it happen? How did it happen? Who was involved? Background

9 Investigate a private Ubuntu Enterprise Cloud v10.10 powered by Eucalyptus open source edition v2.0 SRQ1: What are the artefacts of interest? SRQ2: How to recover deleted artefacts? SRQ3: What are other sources of evidence? Research Topic

10 Desk-based A more comprehensive literature review To gain a deeper understanding of how the technology works Laboratory-based Build a dual-node private cloud Generate text files for a data recovery experiment Research Method

11 Block Storage Controller (EBS) Node Controller (NC) Block Storage Controller (EBS) Node Controller (NC) Cluster Controller (CC) Walrus Storage Controller (WS3) Cloud Controller (CLC) Storage Server Cluster Controller (CC) iSCSI Eucalyptus Architecture Research Findings

12 Linux system artefacts on Eucalyptus controllers SWAP space under /proc Linux logs under /var Temporary files under /tmp SRQ1: What are the artefacts of interest? Research Findings

13 Cluster Controller (CC) cc.log, httpd-cc_error.log, registration.log Node Controller (NC) nc.log, httpd-nc_error.log, euca_test_nc.log Cloud Controller (CLC) cloud-debug.log, cloud-error.log, cloud-output.log, axis2c.log Elastic Block Storage Controller (EBS) sc-state.log, registration.log Walrus Storage Controller (WS3) walrus-state.log, registration.log Eucalyptus logs SRQ1: What are the artefacts of interest? Research Findings

14 Cloud Controller (CLC) $EUCALYPTUS/etc/eucalyptus.conf Cloud Controller (CLC) $EUCALYPTUS/var/lib/eucalyptus/db Cloud Controller (CLC) $EUCALYPTUS/var/lib/eucalyptus/keys Elastic Block Storage Controller (EBS) $EUCALYPTUS/var/lib/eucalyptus/bukkits Walrus Storage Controller (WS3) $EUCALYPTUS/var/lib/eucalyptus/volumes Eucalyptus essential files SRQ1: What are the artefacts of interest? Research Findings

15 Virtual machine files VM images & associated XML files on WS3 Virtual hard disk files on NC User data files User persistent data volumes on EBS Snapshots of volumes on WS3 SRQ1: What are the artefacts of interest? Research Findings

16 The process would be the same as the process in the traditional physical hosting Each Eucalyptus controller is essentially a standard Linux server with Eucalyptus software Data files are stored with EXT4 SRQ2: How to recover deleted artefacts? Research Findings

17 If a forensic copy of the local storage of each Eucalyptus controller can be acquired, current forensic tools like EnCase can access and recover the following deleted files: Linux system artefacts on Eucalyptus controllers Eucalyptus logs Eucalyptus essential files VM images & associated XML files on WS3 Virtual hard disk files on NC Snapshots of volumes on WS3 SRQ2: How to recover deleted artefacts? Research Findings

18 User data files on EBS volumes Data files may be stored in different filesystems The underlying hardware storage technology could be NAS, SAN, etc. SRQ2: How to recover deleted artefacts? Research Findings

19 Artefacts inside virtual machines Use VM ID to track down the NC Recover virtual hard disk files Recover deleted files on the virtual hard disk files SRQ2: How to recover deleted artefacts? Research Findings

20

21 Virtualization Dynamic nature of resource usage Increased number of nodes involved Centralised data storage Summary of additional challenges Research Findings

22 Client side investigation VNC, RDP, SSH, FireFox, etc. Live investigation EnCase Enterprise Virtual Introspection Network level monitoring IDS, Firewall, WAF, etc. SRQ3: What are some other sources of evidence? Research Findings

23 Thank you


Download ppt "Suntisak Thammavongsa 28-11-2011 Bachelor of IT (Honours) Supervised by Dr Raymond Choo University of South Australia Investigating a Private Ubuntu Enterprise."

Similar presentations


Ads by Google