Skip to main content
Top
Published in: International Journal of Information Security 3/2015

01-06-2015 | Regular contribution

Automated inference of past action instances in digital investigations

Authors: Joshua I. James, Pavel Gladyshev

Published in: International Journal of Information Security | Issue 3/2015

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

As the amount of digital devices suspected of containing digital evidence increases, case backlogs for digital investigations are also increasing in many organizations. To ensure timely investigation of requests, this work proposes the use of signature-based methods for automated action instance approximation to automatically reconstruct past user activities within a compromised or suspect system. This work specifically explores how multiple instances of a user action may be detected using signature-based methods during a postmortem digital forensic analysis. A system is formally defined as a set of objects, where a subset of objects may be altered on the occurrence of an action. A novel action-trace update time threshold is proposed that enables objects to be categorized by their respective update patterns over time. By integrating time into event reconstruction, the most recent action instance approximation as well as limited past instances of the action may be differentiated and their time values approximated. After the formal theory if signature-based event reconstruction is defined, a case study is given to evaluate the practicality of the proposed method.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Footnotes
1
For more information on Regular Expressions, see http://​www.​bsd.​org/​regexintro.​html.
 
2
The open source tool implementing the proposed theory can be found at http://​github.​com/​hvva/​IoAF.
 
Literature
2.
go back to reference Casey, E.: Digital forensics: coming of age. Digit. Investig. 6(1–2), 1–2 (2009)CrossRef Casey, E.: Digital forensics: coming of age. Digit. Investig. 6(1–2), 1–2 (2009)CrossRef
3.
go back to reference Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Investig. 7(Supplement 1), S64–S73 (2010)CrossRef Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Investig. 7(Supplement 1), S64–S73 (2010)CrossRef
4.
go back to reference Gogolin, G.: The digital crime tsunami. Digit. Investig. 7(1–2), 3–8 (2010)CrossRef Gogolin, G.: The digital crime tsunami. Digit. Investig. 7(1–2), 3–8 (2010)CrossRef
5.
go back to reference Casey, E., Ferraro, M., Nguyen, L.: Investigation delayed is justice denied: proposals for expediting forensic examinations of digital evidence*. J. Forensic Sci. 54(6), 1353–1364 (2009)CrossRef Casey, E., Ferraro, M., Nguyen, L.: Investigation delayed is justice denied: proposals for expediting forensic examinations of digital evidence*. J. Forensic Sci. 54(6), 1353–1364 (2009)CrossRef
10.
go back to reference Gladyshev, P., Patel, A.: Finite state machine approach to digital event reconstruction. Digit. Investig. 1(2), 130–149 (2004)CrossRef Gladyshev, P., Patel, A.: Finite state machine approach to digital event reconstruction. Digit. Investig. 1(2), 130–149 (2004)CrossRef
11.
go back to reference Carrier, B.D., Spafford, E.H.: A hypothesis-based approach to digital forensic investigations. CERIAS, PhD (2006) Carrier, B.D., Spafford, E.H.: A hypothesis-based approach to digital forensic investigations. CERIAS, PhD (2006)
12.
go back to reference Arasteh, A.R., Debbabi, M., Sakha, A., Saleh, M.: Analyzing multiple logs for forensic evidence. Digit. Investig. 4, 82–91 (2007)CrossRef Arasteh, A.R., Debbabi, M., Sakha, A., Saleh, M.: Analyzing multiple logs for forensic evidence. Digit. Investig. 4, 82–91 (2007)CrossRef
13.
go back to reference James, J., Gladyshev, P., Abdullah, M.T., Zhu, Y.: Analysis of evidence using formal event reconstruction. Digit. Forensics Cyber Crime 31, 85–98 (2010)CrossRef James, J., Gladyshev, P., Abdullah, M.T., Zhu, Y.: Analysis of evidence using formal event reconstruction. Digit. Forensics Cyber Crime 31, 85–98 (2010)CrossRef
14.
go back to reference Marrington, A., Mohay, G., Morarji, H., Clark, A.: A Model for Computer Profiling. pp. 635–640. IEEE (2010) Marrington, A., Mohay, G., Morarji, H., Clark, A.: A Model for Computer Profiling. pp. 635–640. IEEE (2010)
15.
go back to reference Khan, M.N.A., Wakeman, I.: Machine Learning for Post-Event Timeline Reconstruction, pp. 112–121 (2006) Khan, M.N.A., Wakeman, I.: Machine Learning for Post-Event Timeline Reconstruction, pp. 112–121 (2006)
16.
go back to reference Khan, M.N.A., Chatwin, C.R., Young, R.C.D.: A framework for post-event timeline reconstruction using neural networks. Digit. Investig. 4(3–4), 146–157 (2007)CrossRef Khan, M.N.A., Chatwin, C.R., Young, R.C.D.: A framework for post-event timeline reconstruction using neural networks. Digit. Investig. 4(3–4), 146–157 (2007)CrossRef
17.
go back to reference James, J.: Survey of evidence and forensic tool usage in digital investigations (2010). In: Digital forensic investigation research laboratory in corporation with INTERPOL working party on IT crime. Dublin. Retrieved from http://digitalfire.ucd.ie/?p=858 (2010) James, J.: Survey of evidence and forensic tool usage in digital investigations (2010). In: Digital forensic investigation research laboratory in corporation with INTERPOL working party on IT crime. Dublin. Retrieved from http://​digitalfire.​ucd.​ie/​?​p=​858 (2010)
19.
go back to reference James, J.I., Gladyshev, P., Zhu, Y.: Signature based detection of user events for post-mortem forensic analysis. In: Baggili I. (ed.) Digital Forensics and Cyber Crime, vol 53, pp. 96–109 (2011). doi:10.1007/978-3-642-19513-6_8 James, J.I., Gladyshev, P., Zhu, Y.: Signature based detection of user events for post-mortem forensic analysis. In: Baggili I. (ed.) Digital Forensics and Cyber Crime, vol 53, pp. 96–109 (2011). doi:10.​1007/​978-3-642-19513-6_​8
20.
go back to reference Carney, M., Rogers, M.: The Trojan made me do it: a first step in statistical based computer forensics event reconstruction. Int. J. Digit. Evid. 2(4), 1–11 (2004) Carney, M., Rogers, M.: The Trojan made me do it: a first step in statistical based computer forensics event reconstruction. Int. J. Digit. Evid. 2(4), 1–11 (2004)
21.
go back to reference Kwan, M., Chow, K.P., Law, F., Lai, P.: Reasoning about evidence using Bayesian networks. In: Ray I., Shenoi S. (eds.) Advances in Digital Forensics IV, vol 285, pp. 275–289 (2008). doi:10.1007/978-0-387-84927-0 _ 22 Kwan, M., Chow, K.P., Law, F., Lai, P.: Reasoning about evidence using Bayesian networks. In: Ray I., Shenoi S. (eds.) Advances in Digital Forensics IV, vol 285, pp. 275–289 (2008). doi:10.​1007/​978-0-387-84927-0 _​ 22
Metadata
Title
Automated inference of past action instances in digital investigations
Authors
Joshua I. James
Pavel Gladyshev
Publication date
01-06-2015
Publisher
Springer Berlin Heidelberg
Published in
International Journal of Information Security / Issue 3/2015
Print ISSN: 1615-5262
Electronic ISSN: 1615-5270
DOI
https://doi.org/10.1007/s10207-014-0249-6

Other articles of this Issue 3/2015

International Journal of Information Security 3/2015 Go to the issue

Regular Contribution

GPU-assisted malware

Premium Partner