skip to main content
10.1145/1527017.1527023acmotherconferencesArticle/Chapter ViewAbstractPublication PagesidtrustConference Proceedingsconference-collections
research-article

Palantir: a framework for collaborative incident response and investigation

Published:14 April 2009Publication History

ABSTRACT

Organizations owning cyber-infrastructure assets face large scale distributed attacks on a regular basis. In the face of increasing complexity and frequency of such attacks, we argue that it is insufficient to rely on organizational incident response teams or even trusted coordinating response teams. Instead, there is need to develop a framework that enables responders to establish trust and achieve an effective collaborative response and investigation process across multiple organizations and legal entities to track the adversary, eliminate the threat and pursue prosecution of the perpetrators. In this work we develop such a framework for effective collaboration. Our approach is motivated by our experiences in dealing with a large-scale distributed attack that took place in 2004 known as Incident 216. Based on our approach we present the Palantir system that comprises conceptual and technological capabilities to adequately respond to such attacks. To the best of our knowledge this is the first work proposing a system model and implementation for a collaborative multi-site incident response and investigation effort.

References

  1. Cyber Storm Exercise Report. National Cyber Security Division, U.S. Department of Homeland Security, September, 2006, 2006.Google ScholarGoogle Scholar
  2. T. Ahmed and A. R. Tripathi. Specification and verification of security requirements in a programming model for decentralized cscw systems. ACM Trans. Inf. Syst. Secur., 10(2):7, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. C. Alberts, A. Dorofee, G. Killcrece, R. Ruefle, and M. Zajicek. Defining Incident Management Processes for CSIRTs: A Work in Progress. Technical Report CMU/SEI-2004-TR-015, Software Engineering Institute, Carnegie Mellon University, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  4. P. Bajcsy, R. Kooper, L. Marini, B. Minsker, and J. Myers. CyberIntegrator: A Meta-Workflow System Designed for Solving Complex Scientific Problems using Heterogeneous Tools. In Proceedings of the Geoinformatics Conference, May 2006.Google ScholarGoogle Scholar
  5. V. Baryamureeba and F. Tushabe. The Enhanced Digital Investigation Process Model. Process Model Asian Journal of Information Technology, 2006.Google ScholarGoogle Scholar
  6. N. Beebe and J. G. Clark. A hierarchical, objectives-based framework for the digital investigations process. Digital Investigation, 2(2):147--167, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. R. Bobba, J. Muggli, M. Pant, J. Basney, and H. Khurana. Usable secure mailing lists with untrusted servers. In Symposium on Identity and Trust on the Internet (IDtrust), 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. J. W. Brown, D. Stikvoort, K. P. Kossakowski, K. P. Kossakowski, G. Killcrece, R. Ruefle, and M. Zajicek. Handbook for Computer Security Incident Response Teams (CSIRTs). CMU/SEI-2003-HB-002, April, 2003, 2003.Google ScholarGoogle Scholar
  9. N. Brownlee and E. Guttman. Expectations for Computer Security Incident Response. IETF RFC 2350, June 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Y. D. Cai, D. Clutter, G. Pape, J. Han, M. Welge, and L. Auvil. Maids: mining alarming incidents from data streams. In SIGMOD '04: Proceedings of the 2004 ACM SIGMOD international conference on Management of data, pages 919--920, New York, NY, USA, 2004. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. B. Carrier and E. H. Spafford. Getting Physical with the Digital Investigation Process. International Journal of Digital Evidence, 2(2), Fall 2003.Google ScholarGoogle Scholar
  12. B. Carrier and E. H. Spafford. An Event-Based Digital Forensic Investigation Framework. In DFWRS'04: Proceedings of the 4th Digital Forensics Research Workshop, 2004.Google ScholarGoogle Scholar
  13. S. Ó. Ciardhuáin. An Extended Model of Cybercrime Investigations. International Journal of Digital Evidence, 3(1), Summer 2004.Google ScholarGoogle Scholar
  14. P. T. Devanbu and S. Stubblebine. Software engineering for security: a roadmap. In ICSE '00: Proceedings of the Conference on The Future of Software Engineering, pages 227--239, New York, NY, USA, 2000. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. B. Fraser. Site Security Handbook. IETF RFC 2196, Sept. 1997. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Giordano and C. Maciag. Cyber Forensics: A Military Operations Perspective. International Journal of Digital Evidence, 1(2), Summer 2002.Google ScholarGoogle Scholar
  17. T. Grance, K. Kent, and B. Kim. Computer Security Incident Handling Guide: Recommendations of the National Institute of Standards and Technology. NIST Special Publication 800-61, January 2004.Google ScholarGoogle Scholar
  18. R. S. C. Ieong. FORZA - Digital forensics investigation framework that incorporate legal issues. Digital Investigation, 3(Supplement-1):29--36, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. H. Khurana, J. Heo, and M. Pant. From proxy encryption primitives to a deployable secure-mailing-list solution. In ICICS'06: International Conference on Information and Communications Security, pages 260--281, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. H. Khurana, A. J. Slagell, and R. Bonilla. SELS: a secure e-mail list service. In ACM Symposium on Applied Computing (SAC), Security Track, pages 306--313, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. G. Killcrece, K.-P. Kossakowsk, R. Ruefle, and M. Zajicek. Organizational Models for Computer Security Incident Response Teams (CSIRTs). Technical Report Report: CMU/SEI-2003-HB-001, Carnegie Melon University/Software Engineering Institute, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  22. K. Leune and S. Tesink. Designing and developing an Application for Incident Response Teams. In FIRST'06: Forum for Incident Response Teams Conference, Baltimore, MD, USA, June 2006.Google ScholarGoogle Scholar
  23. S. Mitropoulos, D. Patsos, and C. Douligeris. On Incident Handling and Response: A state-of-the-art approach. Computers & Security, 25(5):351--370, July 2006.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. G. Palmer. A Road Map for Digital Forensic Research. Technical Report Technical Report DTR-T001-01, Report From the First Digital Forensic Research Workshop (DFRWS), 2001.Google ScholarGoogle Scholar
  25. M. Pollitt. Computer Forensics: an Approach to Evidence in Cyberspace. In Proceedings of the National Information Systems Security Conference, volume 2, pages 487--491, 1995.Google ScholarGoogle Scholar
  26. M. M. Pollitt. An Ad Hoc Review of Digital Forensic Models. In SADFE '07: Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering, pages 43--54, Washington, DC, USA, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. C. Prosise, K. Mandia, and M. Pepe. Incident Response and Computer Forensics, Second Edition. McGraw-Hill Osborne Media, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. M. Reith, C. Carr, and G. Gunsch. An Examination of Digital Forensic Models. International Journal of Digital Evidence, 1(3), Fall 2002.Google ScholarGoogle Scholar
  29. R. L. Rollason-Reese. Incident handling: an orderly response to unexpected events. In SIGUCCS '03: Proceedings of the 31st annual ACM SIGUCCS conference on User services, pages 97--102. ACM Press, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. R. Rowlingson. A Ten Step Process for Forensic Readiness. International Journal of Digital Evidence, 2(3), Winter 2004.Google ScholarGoogle Scholar
  31. G. Ruibin, C. Kai, Y. Tony, and M. Gaertner. Case-Relevance Information Investigation: Binding Computer Intelligence to the Current Computer Forensic Framework. International Journal of Digital Evidence, 4(1), Spring 2005.Google ScholarGoogle Scholar
  32. S. Schechter, J. Jung, W. Stockwell, and C. McLain. Inoculating SSH Against Address Harvesting. In NDSS'06: The 13th Annual Network and Distributed System Security Symposium, San Diego, CA, February 2006.Google ScholarGoogle Scholar
  33. A. Slagell, K. Lakkaraju, and K. Luo. FLAIM: A Multi-level Anonymization Framework for Computer and Network Logs. In LISA'06: 20th USENIX Large Installation System Administration Conference, Washington, D.C., Dec. 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. P. Stephenson. Modeling of Post-Incident Root Cause Analysis. International Journal of Digital Evidence, 2(2), Fall 2003.Google ScholarGoogle Scholar
  35. J. Vincent, R. Spier, D. Rolsky, D. Chamberlain, and R. Foley. RT Essentials. O'Reilly Media, Aug. 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. X. Yin, W. Yurcik, and A. Slagell. VisFlowCluster-IP: Connectivity-Based Visual Clustering of Network Hosts. In 21st IFIP TC-11 International Information Security Conference (SEC '06), May 2006.Google ScholarGoogle Scholar

Index Terms

  1. Palantir: a framework for collaborative incident response and investigation

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Other conferences
        IDtrust '09: Proceedings of the 8th Symposium on Identity and Trust on the Internet
        April 2009
        131 pages
        ISBN:9781605584744
        DOI:10.1145/1527017

        Copyright © 2009 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 14 April 2009

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader