Full text

Turn on search term navigation

Copyright Association of Digital Forensics, Security and Law 2012

Abstract

Forensic readiness of business information systems can support future forensics investigation or auditing on external/internal attacks, internal sabotage and espionage, and business fraud. To establish forensics readiness, it is essential for an organization to identify which fingerprints are relevant and where they can be located, to determine whether they are logged in a forensically sound way and whether all the needed fingerprints are available to reconstruct the events successfully. Also, a fingerprint identification and locating mechanism should be provided to guide potential forensics investigation in the future. Furthermore, mechanisms should be established to automate the security incident tracking and reconstruction processes. In this research, external and internal attacks are first modeled as augmented attack trees based on the vulnerabilities of business information systems. Then, modeled attacks are conducted against a honeynet that simulates an online business information system, and a forensic investigation follows each attack. Finally, an evidence tree, which is expected to provide the necessary contextual information to automate the attack tracking and reconstruction process in the future, is built for each attack based on fingerprints identified and located within the system. [PUBLICATION ABSTRACT]

Details

Title
FORENSIC EVIDENCE IDENTIFICATION AND MODELING FOR ATTACKS AGAINST A SIMULATED ONLINE BUSINESS INFORMATION SYSTEM
Author
Tu, Manghui; Xu, Dianxiang; Butler, Eugene; Schwartz, Amanda
Pages
73-97
Publication year
2012
Publication date
2012
Publisher
Association of Digital Forensics, Security and Law
ISSN
15587215
e-ISSN
15587223
Source type
Scholarly Journal
Language of publication
English
ProQuest document ID
1345953072
Copyright
Copyright Association of Digital Forensics, Security and Law 2012