Download presentation
Presentation is loading. Please wait.
Published byRandolph Blankenship Modified over 9 years ago
1
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Network Forensics September 26, 2007
2
Outline l Review of Lectures 11 and 12 l Network Forensics l Conclusion and Links l References - Chapter 12 of text book - Additional links given at the end
3
Review of Lectures 11, 12 and 13 l Lecture 11 - Review of Part II - Digital Forensics Analysis Techniques - Reconstructing past events - Conclusion and Links l Lecture #12 - Guest lecture Honeynets l Lecture #13 - Guest lecture Richardson Police Department
4
Network Forensics l What is Network Forensics? - http://searchsecurity.techtarget.com/sDefinition/0,,sid14_ gci859579,00.html http://searchsecurity.techtarget.com/sDefinition/0,,sid14_ gci859579,00.html l Network Forensics Analysis l Relationship to Honeynets/Honeypots l Policies for Networks Forensics l Example Prototype System l Some Popular Networks Forensics Analysis Tools (NFAT)
5
What is Network Forensics? l Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. l Network forensics systems can be one of two kinds: - "Catch-it-as-you-can" systems, in which all packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage, usually involving a RAID system.packetRAID - "Stop, look and listen" systems, in which each packet is analyzed in a rudimentary way in memory and only certain information saved for future analysis. This approach requires less storage but may require a faster processor to keep up with incoming traffic.
6
Network Forensics Analysis Tools (NFAT): Relationships between IDS, Firewalls and NFAT l IDS attempts to detect activity that violates an organization’s security policy by implementing a set of rules describing preconfigures patterns of interest l Firewall allows or disallows traffic to or from specific networks, machine addresses and port numbers l NFAT synergizes with IDSs and Firewalls. - Preserves long term record of network traffic - Allows quick analysis of trouble spots identified by IDSs and Firewalls l NFATs must do the following: - Capture network traffic - Analyze network traffic according to user needs - Allow system users discover useful and interesting things about the analyzed traffic
7
NFAT Tasks l Traffic Capture - What is the policy? - What is the traffic of interest? - Intermal/Externasl? - Collect packets: tcpdump l Traffic Analysis - Sessionizing captured traffic (organize) - Protocol Parsing and analysis l Check for strings, use expert systems for analysis l Interacting with NFAT - Appropriate user interfaces, reports, examine large quantities of information and make it manageable
8
Honeynets/Honeypots l Network Forensics and honeynet systems have the same features of collecting information about computer misuses l Honeynet system can lure attackers and gain information about new types of intrusions l Network forensics systems analyze and reconstruct he attack behaviors l These two systems integrated together build a active self learning and response system to profile the intrusion behavior features and investigate the original source of the attack.
9
Policies: Computer Attack Taxonomy l Probing - Attackers reconnaissance - Attackers create a profile of an organization's structure, network capabilities and content, security posture - Attacker finds the targets and devices plans to circumvent the security mechanism l Penetration - Exploit System Configuration errors and vulnerabilities - Install Trojans, record passwords, delete files, etc. l Cover tracks - Configure event logging to a previous state - Clear event logs and hide files
10
Policies to enhance forensics l Retaining information l Planning the response l Training l Accelerating the investigation l Preventing anonymous activities l Protect the evidence
11
Example Prototype System: Iowa State University l Network Forensics Analysis mechanisms should meet the following: - Short response times; User friendly interfaces l Questions addresses - How likely is a specific host relevant to the attack? What is the role the host played in the attack? How strong are two hosts connected to the attack? l Features of the prototype - Preprocessing mechanism to reduce redundancy in intrusion alerts - Graph model for presenting and interacting with th3 evidence - Hierarchical reasoning framework for automated inference of attack group identification
12
Example Prototype System: Modules l Evidence collection module l Evidence preprocessing module l Attack knowledge base l Assets knowledge base l Evidence graph generation module l Attack reasoning module l Analyst interface module
13
Some Popular Tools l Raytheon’s SilentRunner - Gives administrators help as they attempt to protect their company’s assets - Collector, Analyzer and Visualize Modules l Sandstorm Enterprise’s NetIntercept - Hardware appliance focused on capturing network traffic l Niksun’s NetDetector - Its an appliance like NetIntercept - Has an alerting mechanism - Integrates with Cicso IDS for a complete forensic analysis
14
Conclusion l Network forensics is essentially about monitoring network traffic and determining if there is an attack and if so, determine the nature of the attack l Key tasks include traffic capture, analysis and visualization l Many tools are now available l Works together with IDs, Firewalls and Honeynets l Expert systems solutions show promise
15
Links l https://www.dfrws.org/2005/proceedings/wang_evidencegraphs.pdf https://www.dfrws.org/2005/proceedings/wang_evidencegraphs.pdf l http://www.cs.fsu.edu/~yasinsac/Papers/MY01.pdf http://www.cs.fsu.edu/~yasinsac/Papers/MY01.pdf l http://www.sandstorm.net/support/netintercept/downloads/ni- ieee.pdf http://www.sandstorm.net/support/netintercept/downloads/ni- ieee.pdf l http://www.giac.org/certified_professionals/practicals/gsec/2478.php http://www.giac.org/certified_professionals/practicals/gsec/2478.php l http://www.infragard.net/library/congress_05/computer_forensics/net work_primer.pdf http://www.infragard.net/library/congress_05/computer_forensics/net work_primer.pdf l http://dfrws.org/2003/presentations/Brief-Casey.pdf http://dfrws.org/2003/presentations/Brief-Casey.pdf l http://delivery.acm.org/10.1145/1070000/1066749/p302- ren.pdf?key1=1066749&key2=0512850911&coll=GUIDE&dl=GUIDE&C FID=36223233&CFTOKEN=49225512 http://delivery.acm.org/10.1145/1070000/1066749/p302- ren.pdf?key1=1066749&key2=0512850911&coll=GUIDE&dl=GUIDE&C FID=36223233&CFTOKEN=49225512 l http://dfrws.org/ http://dfrws.org/
16
Reference Books for Digital Forensics l Bruce Middleton, Cyber Crime Investigator's Field Guide, Boca Raton, Florida:Auerbach Publications, 2001, ISBN 0-8493-1192-6. l Brian Carrier, File System Forensic Analysis, Addison-Wesley, 2005, ISBN 0- 321-26817-2. l Chris Prosise and Kevin Mandia, Incident Response: Investigating Computer Crime, Berkeley, California: Osborne/McGraw-Hill, 2001, ISBN 0-07-213182-9. l Warren Kruse and Jay Heiser, Computer Forensics: Incident Response Essentials, Addition-Wesley, 2002, ISBN 0-201-70719-5. l Edward Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, 1999, ISBN 0-9666700-7-8.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.