Improving the trustworthiness of evidence derived from security trace files

  • Authors:
  • Ennio Pozzetti;Vidar Vetland

  • Affiliations:
  • Politecnico di Milano, Dip. Elettronica e Informazione, Milano, Italy;Carleton University, Dept. Systems and Computer Engineering, Ottawa, Ontario, Canada

  • Venue:
  • SSYM'95 Proceedings of the 5th conference on USENIX UNIX Security Symposium - Volume 5
  • Year:
  • 1995

Quantified Score

Hi-index 0.00

Visualization

Abstract

Evidence is required to prosecute intruders in computer systems and networks. Reliable trace files are needed to obtain such evidence. Trace files normally contain vast amounts of data of which only small portions are useful as evidence. Use of temporary files during analysis of the data is dangerous because inconsistencies may be introduced in that way. Since one inconsistency is enough to reduce the trustworthiness of the evidence, it is of paramount importance to develop a consistent way to extract and analyze information from trace files. In this paper we suggest such a method accompanied by proper tool support. We conclude that the raw trace files should never be altered, not even for the purpose of making them readable. All extraction and purification should be the result of systematic application of data filters. The systematic use of filters should be repeatable so that anyone can apply the filters. Thus the filters document the process from raw traces to information used as evidence.