Automated Analysis for Digital Forensic Science: Semantic Integrity Checking

  • Authors:
  • Tye Stallard;Karl Levitt

  • Affiliations:
  • -;-

  • Venue:
  • ACSAC '03 Proceedings of the 19th Annual Computer Security Applications Conference
  • Year:
  • 2003

Quantified Score

Hi-index 0.00

Visualization

Abstract

When computer security violations are detected, computerforensic analysts attempting to determine the relevantcauses and effects are forced to perform the tedious tasks offinding and preserving useful clues in large networks of operationalmachines. To augment a computer crime investigator'sefforts, the approach presented in this paper is anexpert system with a decision tree that uses predeterminedinvariant relationships between redundant digital objectsto detect semantic incongruities. By analyzing data from ahost or network and searching for violations of known datarelationships, particularly when an attacker is attemptingto hide his presence, an attacker's unauthorized changesmay be automatically identified. Examples of such invariantdata relationships are provided, as are techniques toidentify new, useful ones. By automatically identifying relevantevidence, experts can focus on the relevant files, users,times and other facts first.