Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008.

Slides:



Advertisements
Similar presentations
Guide to Computer Forensics and Investigations Third Edition
Advertisements

Guide to Computer Forensics and Investigations Fourth Edition Chapter 11 Virtual Machines, Network Forensics, and Live Acquisitions.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 11 Virtual Machines, Network Forensics, and Live Acquisitions.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Guide to Computer Forensics and Investigations1 Network Forensics Overview Network forensics –Systematic tracking of incoming and outgoing traffic To ascertain.
1 Figure 6-16: Advanced Server Hardening Techniques Reading Event Logs (Chapter 10)  The importance of logging to diagnose problems Failed logins, changing.
Guide to Network Defense and Countermeasures Second Edition
Honeypots Margaret Asami. What are honeypots ? an intrusion detection mechanism entices intruders to attack and eventually take over the system, while.
Security Awareness: Applying Practical Security in Your World
Network Security. Network security starts from authenticating any user. Once authenticated, firewall enforces access policies such as what services are.
Guide to Computer Forensics and Investigations Third Edition Chapter 11 Network Forensics.
Lesson 19: Configuring Windows Firewall
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Lecture 11 Intrusion Detection (cont)
Department Of Computer Engineering
INTRUSION DETECTION SYSTEM
INTRUSION DETECTION SYSTEMS Tristan Walters Rayce West.
Internet Relay Chat Chandrea Dungy Derek Garrett #29.
Hands-on: Capturing an Image with AccessData FTK Imager
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
AIS, Passwords Should not be shared Should be changed by user Should be changed frequently and upon compromise (suspected unauthorized disclosure)
COEN 252 Computer Forensics
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
What is FORENSICS? Why do we need Network Forensics?
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #6 Forensics Services September 10, 2007.
ECE4112 Lab 7: Honeypots and Network Monitoring and Forensics Group 13 + Group 14 Allen Brewer Jiayue (Simon) Chen Daniel Chu Chinmay Patel.
COEN 252 Computer Forensics Collecting Network-based Evidence.
Guide to Computer Forensics and Investigations Fifth Edition
Honeypot and Intrusion Detection System
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Forensic and Investigative Accounting Chapter 14 Internet Forensics Analysis: Profiling the Cybercriminal © 2005, CCH INCORPORATED 4025 W. Peterson Ave.
Guide to Computer Forensics and Investigations Fifth Edition
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #8 Computer Forensics Data Recovery and Evidence Collection September.
Linux Networking and Security
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #14 Network Forensics September 26, 2007.
7400 Samsung Confidential & Proprietary Information Copyright 2006, All Rights Reserved. -0/17- OfficeServ 7400 Enterprise IP Solutions Quick Install Guide.
1 Implementing Monitoring and Reporting. 2 Why Should Implement Monitoring? One of the biggest complaints we hear about firewall products from almost.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #4 Data Acquisition September 8, 2008.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #30 Network Forensics (Revisited) November 7, 2007.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
Lesson 11: Configuring and Maintaining Network Security
Module 11: Designing Security for Network Perimeters.
1 HoneyNets, Intrusion Detection Systems, and Network Forensics.
Guide to Computer Forensics and Investigations, Second Edition Chapter 12 Network Forensics.
 Forensics  Application of scientific knowledge to a problem  Computer Forensics  Application of the scientific method in reconstructing a sequence.
Defense in Depth. 1.A well-structured defense architecture treats security of the network like an onion. When you peel away the outermost layer, many.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #21 Network Forensics October 27, 2008.
DoS/DDoS attack and defense
Intrusion Detection System
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Role Of Network IDS in Network Perimeter Defense.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Basic Security Networking for Home and Small Businesses – Chapter 8.
Guide to Computer Forensics and Investigations Fourth Edition Chapter 11 Virtual Machines, Network Forensics, and Live Acquisitions.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
Using Honeypots to Improve Network Security Dr. Saleh Ibrahim Almotairi Research and Development Centre National Information Centre - Ministry of Interior.
CompTIA Security+ Study Guide (SY0-401)
Chapter 6 Application Hardening
CONNECTING TO THE INTERNET
Backdoor Attacks.
To Join the Teleconference
CompTIA Security+ Study Guide (SY0-401)
Honeypots and Honeynets
IS4680 Security Auditing for Compliance
Presentation transcript:

Digital Forensics Dr. Bhavani Thuraisingham The University of Texas at Dallas Network Forensics - III November 3, 2008

Outline l Network Forensics l Performing Live Acquisitions l Standard procedures for network forensics l Network tools l Honeynet project l Review of paper by Iowa State l Presentation by PhD Student Clay Woolam on TCPDump analysis l References: - Chapter 11 of Textbook - Paper: raphs.pdf raphs.pdf

Network Forensics l Network Forensics is the process of collecting and analyzing raw network data and then tracking network traffic to determine how an attack took place l When intruders break into a network they leave a trail. Need to spot variations in network traffic; detect anomalies l Network forensics can usually help to determine whether network has been attacked or there is a user error l Examiners must establish standards procedures to carry out forensics

Securing a Network l Need measures to secure a network and prevent breaches l Apply patches; User a layered network defense strategy l NSA (National Security Agency) ahs developed DiD Defense in Depth) and has three models of protection - People, Technology, Operations - People: Employees are trained well - Technology: Strong network architecture and testing tools - Operations: applying security patches, anti-virus software, etc.

Performing Live Acquisitions l Insert bootable forensics CD in the suspect system l Keep a log of all the actions l Send collected information to a network drive l Copy the physical memory l Determine if root kit is present; access system’s firmware, - - l Get forensics hash value of all files

Performing Live Acquisitions: Windows l Setup NetCat listener to send the forensics data l Load Helix CD in the CD-ROM drive l Click appropriate buttons – System Information; Glad arrow etc l Click Acquire Live Image if Widows System l Connect to NetCat listener to send the collected data (e.g., enter IP address of NetCat listener) l Click Incidence Response Tools l Click on appropriate tools to collect data

Standard procedures l Standard installation image, hash schemes (e.g., MD5, SHA-1) l Fix vulnerabilities if intrusion is detected l Retrieve volatile data (RAM, processes) l Acquire compromised drive and make forensics image of it l Compare forensics image and standard image and determine if anything has changed

Network Logs l Network logs record traffic in and out of network l Network servers, routers, firewalls record activities and events that move through them l One ways is to run Tcpdump l When viewing network log, port information can give clues about suspicious activity l Use network analysis tool

Network Tools l Network Forensics tools help in the monitoring of the network l Example: the records that Ps tools generate can prove that an employee ran a program without permission l Can also monitor machines/processes that may be harmful l Problem is the attacker can get administrator rights and start using the tools l Chapter 11 discusses tools for Windows and Linux

Packet Sniffers l Devices or software to monitor (sniff) traffic l TCP/IP sniffers operate at the Packet level; in OSI operates at the Layer 2 or 3 level (e.g. Data link or Network layers) l Some sniffers perform packet captures, some perform analysis and some perform both l Tools exist for examining (i) packets with certain flags set (ii) headers (iii) IRC chats

Honeynet project l Honeynet project was established to make information about network attacks and solutions widely available l Objectives: Awareness, information, tools l Attacks: distributed Denial of Service, Zero day attacks l Honeypot is a computer set up to lure attackers l Honeywalls are computers set up to monitor what is happening to the honeypots in the network

Example Prototype System: Iowa State University l Network Forensics Analysis mechanisms should meet the following: - Short response times; User friendly interfaces l Questions addresses - How likely is a specific host relevant to the attack? What is the role the host played in the attack? How strong are two hosts connected to the attack? l Features of the prototype - Preprocessing mechanism to reduce redundancy in intrusion alerts - Graph model for presenting and interacting with th3 evidence - Hierarchical reasoning framework for automated inference of attack group identification

Example Prototype System: Modules l Evidence collection module l Evidence preprocessing module l Attack knowledge base l Assets knowledge base l Evidence graph generation module l Attack reasoning module l Analyst interface module

Summary l Network Forensics is the process of collecting and analyzing raw network data and then tracking network traffic to determine how an attack took place l Layered defense strategies to the network architecture l Live acquisitions are needed to retrieve volatile items l Standard procedure are needed to establish how to proceed after a network attack occurs l By monitoring network traffic can establish normal operations; then determine if there is an anomaly l Network tools used to monitor networks; but intruders can get admin rights to attack from the inside l Tools are available for monitoring network traffic for both Windows and Linux systems l Honeynet project enables people to learn latest intrusion techniques