Principles-driven forensic analysis

  • Authors:
  • Sean Peisert;Sidney Karin;Matt Bishop;Keith Marzullo

  • Affiliations:
  • University of California, San Diego, La Jolla, CA;University of California, San Diego, La Jolla, CA;University of California, Davis, Davis, CA;University of California, San Diego, La Jolla, CA

  • Venue:
  • NSPW '05 Proceedings of the 2005 workshop on New security paradigms
  • Year:
  • 2005

Quantified Score

Hi-index 0.00

Visualization

Abstract

It is possible to enhance our understanding of what has happened on a computer system by using forensic techniques that do not require prediction of the nature of the attack, the skill of the attacker, or the details of the system resources or objects affected. These techniques address five fundamental principles of computer forensics. These principles include recording data about the entire operating system, particularly user space events and environments, and interpreting events at different layers of abstraction, aided by the context in which they occurred. They also deal with modeling the recorded data as a multi-resolution, finite state machine so that results can be established to a high degree of certainty rather than merely inferred.