Failure Detection in Network Forensics for Volatile Data Acquisition

被引:0
作者
Nassif, Lilian Noronha [1 ]
机构
[1] Univ South Santa Catarina, Palhoca, Brazil
来源
PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS-2014) | 2014年
关键词
network forensics; network management; information security;
D O I
暂无
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Acts committed in cyber attacks are often difficult to identify because attackers remove incriminating traces. Digital forensics provides evidence of illegal actions in the digital world. One of its branches, network forensics, can record the entire communication flow between the attacker and the victim, but it is unfeasible to capture all packets traveling on the network all the time. Such recording requires excessive storage space and time consumption for data analyses. The work developed here presents a framework that uses security management as a trigger for volatile data acquisition in networks as soon as a security failure is detected. Initially, some security metrics and corresponding thresholds are defined to indicate the violation risk for each monitored server. Such security metrics include password file modification, server restarting, and excessive users. Once a security violation is detected, the management system sends a remote command to start a complete datagram acquisition directed at the target. This data acquisition can be compared to a video recording when the motion sensor camera records after being triggered by a movement. The management system also emails the security team, which then prevents further server damage and decides when to stop data capture. The solution is appropriate for enterprises since the network packet capture software must be preconfigured. Network data acquisition becomes essential when a successful attack leaves no hints on the target server. Proof of concept for the framework is presented in a real environment, demonstrating the feasibility of the solution and its accessible implementation by using open software tools.
引用
收藏
页码:342 / 347
页数:6
相关论文
共 11 条
  • [11] Ponec M, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P150