Presentation is loading. Please wait.

Presentation is loading. Please wait.

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Network Forensics September 26, 2007.

Similar presentations


Presentation on theme: "Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Network Forensics September 26, 2007."— Presentation transcript:

1 Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Network Forensics September 26, 2007

2 Outline l Review of Lectures 11 and 12 l Network Forensics l Conclusion and Links l References - Chapter 12 of text book - Additional links given at the end

3 Review of Lectures 11, 12 and 13 l Lecture 11 - Review of Part II - Digital Forensics Analysis Techniques - Reconstructing past events - Conclusion and Links l Lecture #12 - Guest lecture Honeynets l Lecture #13 - Guest lecture Richardson Police Department

4 Network Forensics l What is Network Forensics? - http://searchsecurity.techtarget.com/sDefinition/0,,sid14_ gci859579,00.html http://searchsecurity.techtarget.com/sDefinition/0,,sid14_ gci859579,00.html l Network Forensics Analysis l Relationship to Honeynets/Honeypots l Policies for Networks Forensics l Example Prototype System l Some Popular Networks Forensics Analysis Tools (NFAT)

5 What is Network Forensics? l Network forensics is the capture, recording, and analysis of network events in order to discover the source of security attacks or other problem incidents. l Network forensics systems can be one of two kinds: - "Catch-it-as-you-can" systems, in which all packets passing through a certain traffic point are captured and written to storage with analysis being done subsequently in batch mode. This approach requires large amounts of storage, usually involving a RAID system.packetRAID - "Stop, look and listen" systems, in which each packet is analyzed in a rudimentary way in memory and only certain information saved for future analysis. This approach requires less storage but may require a faster processor to keep up with incoming traffic.

6 Network Forensics Analysis Tools (NFAT): Relationships between IDS, Firewalls and NFAT l IDS attempts to detect activity that violates an organization’s security policy by implementing a set of rules describing preconfigures patterns of interest l Firewall allows or disallows traffic to or from specific networks, machine addresses and port numbers l NFAT synergizes with IDSs and Firewalls. - Preserves long term record of network traffic - Allows quick analysis of trouble spots identified by IDSs and Firewalls l NFATs must do the following: - Capture network traffic - Analyze network traffic according to user needs - Allow system users discover useful and interesting things about the analyzed traffic

7 NFAT Tasks l Traffic Capture - What is the policy? - What is the traffic of interest? - Intermal/Externasl? - Collect packets: tcpdump l Traffic Analysis - Sessionizing captured traffic (organize) - Protocol Parsing and analysis l Check for strings, use expert systems for analysis l Interacting with NFAT - Appropriate user interfaces, reports, examine large quantities of information and make it manageable

8 Honeynets/Honeypots l Network Forensics and honeynet systems have the same features of collecting information about computer misuses l Honeynet system can lure attackers and gain information about new types of intrusions l Network forensics systems analyze and reconstruct he attack behaviors l These two systems integrated together build a active self learning and response system to profile the intrusion behavior features and investigate the original source of the attack.

9 Policies: Computer Attack Taxonomy l Probing - Attackers reconnaissance - Attackers create a profile of an organization's structure, network capabilities and content, security posture - Attacker finds the targets and devices plans to circumvent the security mechanism l Penetration - Exploit System Configuration errors and vulnerabilities - Install Trojans, record passwords, delete files, etc. l Cover tracks - Configure event logging to a previous state - Clear event logs and hide files

10 Policies to enhance forensics l Retaining information l Planning the response l Training l Accelerating the investigation l Preventing anonymous activities l Protect the evidence

11 Example Prototype System: Iowa State University l Network Forensics Analysis mechanisms should meet the following: - Short response times; User friendly interfaces l Questions addresses - How likely is a specific host relevant to the attack? What is the role the host played in the attack? How strong are two hosts connected to the attack? l Features of the prototype - Preprocessing mechanism to reduce redundancy in intrusion alerts - Graph model for presenting and interacting with th3 evidence - Hierarchical reasoning framework for automated inference of attack group identification

12 Example Prototype System: Modules l Evidence collection module l Evidence preprocessing module l Attack knowledge base l Assets knowledge base l Evidence graph generation module l Attack reasoning module l Analyst interface module

13 Some Popular Tools l Raytheon’s SilentRunner - Gives administrators help as they attempt to protect their company’s assets - Collector, Analyzer and Visualize Modules l Sandstorm Enterprise’s NetIntercept - Hardware appliance focused on capturing network traffic l Niksun’s NetDetector - Its an appliance like NetIntercept - Has an alerting mechanism - Integrates with Cicso IDS for a complete forensic analysis

14 Conclusion l Network forensics is essentially about monitoring network traffic and determining if there is an attack and if so, determine the nature of the attack l Key tasks include traffic capture, analysis and visualization l Many tools are now available l Works together with IDs, Firewalls and Honeynets l Expert systems solutions show promise

15 Links l https://www.dfrws.org/2005/proceedings/wang_evidencegraphs.pdf https://www.dfrws.org/2005/proceedings/wang_evidencegraphs.pdf l http://www.cs.fsu.edu/~yasinsac/Papers/MY01.pdf http://www.cs.fsu.edu/~yasinsac/Papers/MY01.pdf l http://www.sandstorm.net/support/netintercept/downloads/ni- ieee.pdf http://www.sandstorm.net/support/netintercept/downloads/ni- ieee.pdf l http://www.giac.org/certified_professionals/practicals/gsec/2478.php http://www.giac.org/certified_professionals/practicals/gsec/2478.php l http://www.infragard.net/library/congress_05/computer_forensics/net work_primer.pdf http://www.infragard.net/library/congress_05/computer_forensics/net work_primer.pdf l http://dfrws.org/2003/presentations/Brief-Casey.pdf http://dfrws.org/2003/presentations/Brief-Casey.pdf l http://delivery.acm.org/10.1145/1070000/1066749/p302- ren.pdf?key1=1066749&key2=0512850911&coll=GUIDE&dl=GUIDE&C FID=36223233&CFTOKEN=49225512 http://delivery.acm.org/10.1145/1070000/1066749/p302- ren.pdf?key1=1066749&key2=0512850911&coll=GUIDE&dl=GUIDE&C FID=36223233&CFTOKEN=49225512 l http://dfrws.org/ http://dfrws.org/

16 Reference Books for Digital Forensics l Bruce Middleton, Cyber Crime Investigator's Field Guide, Boca Raton, Florida:Auerbach Publications, 2001, ISBN 0-8493-1192-6. l Brian Carrier, File System Forensic Analysis, Addison-Wesley, 2005, ISBN 0- 321-26817-2. l Chris Prosise and Kevin Mandia, Incident Response: Investigating Computer Crime, Berkeley, California: Osborne/McGraw-Hill, 2001, ISBN 0-07-213182-9. l Warren Kruse and Jay Heiser, Computer Forensics: Incident Response Essentials, Addition-Wesley, 2002, ISBN 0-201-70719-5. l Edward Amoroso, Intrusion Detection: An Introduction to Internet Surveillance, Correlation, Trace Back, Traps, and Response, Intrusion.Net Books, 1999, ISBN 0-9666700-7-8.


Download ppt "Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Network Forensics September 26, 2007."

Similar presentations


Ads by Google