Reconstruction of falsified computer logs for digital forensics investigations


Autoria(s): Tang, Maolin; Fidge, Colin J.
Data(s)

01/01/2010

Resumo

Digital forensics investigations aim to find evidence that helps confirm or disprove a hypothesis about an alleged computer-based crime. However, the ease with which computer-literate criminals can falsify computer event logs makes the prosecutor's job highly challenging. Given a log which is suspected to have been falsified or tampered with, a prosecutor is obliged to provide a convincing explanation for how the log may have been created. Here we focus on showing how a suspect computer event log can be transformed into a hypothesised actual sequence of events, consistent with independent, trusted sources of event orderings. We present two algorithms which allow the effort involved in falsifying logs to be quantified, as a function of the number of `moves' required to transform the suspect log into the hypothesised one, thus allowing a prosecutor to assess the likelihood of a particular falsification scenario. The first algorithm always produces an optimal solution but, for reasons of efficiency, is suitable for short event logs only. To deal with the massive amount of data typically found in computer event logs, we also present a second heuristic algorithm which is considerably more efficient but may not always generate an optimal outcome.

Formato

application/pdf

Identificador

http://eprints.qut.edu.au/31102/

Publicador

Australian Computer Society

Relação

http://eprints.qut.edu.au/31102/1/c31102.pdf

http://crpit.com/confpapers/CRPITV105Tang.pdf

Tang, Maolin & Fidge, Colin J. (2010) Reconstruction of falsified computer logs for digital forensics investigations. In Information Security 2010: Proceedings of the Eight Australasian Information Security Conference [Conferences in Research and Practice in Information Technology, Volume 105], Australian Computer Society, Queensland University of Technology, Brisbane, Queensland, pp. 12-21.

http://purl.org/au-research/grants/ARC/LP0776344

Direitos

Copyright 2010 Australian Computer Society and the authors

Fonte

Faculty of Science and Technology; Information Security Institute

Palavras-Chave #080303 Computer System Security #Digital forensics #Computer logs #Event correlation
Tipo

Conference Paper