Data correlation-based analysis methods for automatic memory forensic

被引:5
作者
Fu, X. [1 ]
Du, X. [2 ]
Luo, B. [1 ]
机构
[1] Nanjing Univ, Software Inst, Nanjing 210008, Jiangsu, Peoples R China
[2] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
基金
中国国家自然科学基金;
关键词
process correlation; memory forensics; event reconstruction; memory evidences analysis; clustering;
D O I
10.1002/sec.1337
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Memory forensics is an important technique for protecting network security and fighting against computer crimes. It has developed greatly in the past decade, because memory can provide more reliable information that other evidence sources do not contain. However, nowadays, when investigating network criminal cases, the Gigabyte (GB) and even Terabyte (TB) level memory and many such dumps have made memory analysis a difficult task. And investigators usually have to deal with complex operating system (OS) data structures, which they have little knowledge of. So how to analyze memory evidence automatically so as to find the hidden criminal behavior and reconstruct the scenario in an understandable way has become an important problem. This paper presents an automatic memory analysis methodology based on data correlation. Through analyzing key OS data structures and utilizing a clustering algorithm, this methodology can discover the relationships among processes, files, users, Dynamic-link library (DLLs), and network connections. By describing these relationships as correlation graphs, our methods can reorganize these independent memory evidences and disclose their meanings in a high semantic level. Experiments have proved that these correlation graphs can help investigators find hidden criminal behavior and reconstruct the criminal scenarios. And as we know, now, little work is in this field. Copyright (C) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:4213 / 4226
页数:14
相关论文
共 12 条
  • [1] Bilby D., 2006, P RUXC 2006, P34
  • [2] Forensic analysis of the Windows registry in memory
    Dolan-Gavitt, Brendan
    [J]. DIGITAL INVESTIGATION, 2008, 5 (S26-S32) : S26 - S32
  • [3] The VAD tree: A process-eye view of physical memory
    Dolan-Gavitt, Brendan
    [J]. DIGITAL INVESTIGATION, 2007, 4 : S62 - S64
  • [4] Duan Y., 2015, 2015 16th IEEE/ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD), P1
  • [5] Recovery of encryption keys from memory using a linear scan
    Hargreaves, Christopher
    Chivers, Howard
    [J]. ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 1369 - 1376
  • [6] Ionescu A, 2009, MICROSOFT WINDOWS IN, P56
  • [7] Windows operating systems agnostic memory analysis
    Okolica, James
    Peterson, Gilbert L.
    [J]. DIGITAL INVESTIGATION, 2010, 7 : S48 - S56
  • [8] Searching for processes and threads in Microsoft Windows memory dumps
    Schuster, Andreas
    [J]. DIGITAL INVESTIGATION, 2006, : S10 - S16
  • [9] Schuster Andreas., 2006, IMF, P104
  • [10] Extracting Windows command line details from physical memory
    Stevens, Richard M.
    Casey, Eoghan
    [J]. DIGITAL INVESTIGATION, 2010, 7 : S57 - S63