An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS An Ontology for Digital Forensics in IT Security Incidents - OPUS

opus.bibliothek.uni.augsburg.de
from opus.bibliothek.uni.augsburg.de More from this publisher
15.01.2014 Views

12 CHAPTER 3. GOAL FORENSIC SEMANTIC MODEL gathered from the unit of analysis with several of the available tools which are presented in section 4.3. When all these pieces are put into the data store according to the structure given by the ontology, connections are re-established as they were on the computer system. For example, processes in the random access memory and corresponding open les on the hard disk get connected. The automatic creation of connections between dierent parts allows seamless transition between dierent data sources without the need to run dierent tools and to interpret the dierent output formats. 3.2 Example This example explained here will be used throughout the rest of this work. It will only contain a very small amount of data to keep it easy. It would be possible to use real data but that would just increase the amount of data and bring no further advantage for the understanding of the concepts. Nevertheless the application of the ontological approach on real cases will be discussed in section 8 where real malware samples are analysed. For the example we take a virtual computer with one hard disk, one network card, some random access memory and a Microsoft Windows like operating system. We have not been careful enough and some malware has caused damage on the system. To keep the example small, the system contains only a minimal amount of data. picture1 Registry_file Malware Hard Disk Partition File System Root Object UserData System ImportantDocument Kernel Programs Browser FileExplorer Figure 3.1: Hard Disk example The hard disk has the content shown in gure 3.1. The squares represent les and the ones with rounded corners are deleted. The le Malware is deleted because the malware wants to hide itself after it is started. The ImportantDocument le was deleted by the user. Whether this was done intentionally or by accident may be relevant for the case but not for the concept. In the case that the user has collected data he should

3.2. EXAMPLE 13 not possess, he deleted it to remove traces. On the other hand the malware might be intended to delete particular les. RAM Registry Processes Handles Kernel Browser FileExplorer Connections FileExplorer -> picture1 FileExplorer -> www.malicious-server.com Browser -> www.google.com Malware Figure 3.2: Random Access Memory example The random access memory contains a copy of the Registry, the three processes Kernel, Browser and FileExplorer, handles and connections between processes and to network resources. Figure 3.2 roughly visualizes the data that can be found. The Malware node is not connected to the Processes node because it is not listed in the normal list of processes but as it is stored there, it is connected to the RAM node. More details of the registry and the information available there, are explained in section 4.2.3.1. The Registry is a collection of key value pairs that is mainly used for the storage of conguration data. The information that can be found in the Processes section includes currently running processes, some processes that have already nished and processes that try to hide their existence. In the Connections category there are stored connections between programs and to network addresses that are currently open and some of them that are already closed. Handles include all other resources, for example les, that a process can access. The content of the Registry le and the Registry memory object will be explained later. The analysis of the data is continued in section 4.1.3.

3.2. EXAMPLE 13<br />

not possess, he deleted it to remove traces. On the other hand the malware<br />

might be <strong>in</strong>tended to delete particular les.<br />

RAM<br />

Registry<br />

Processes<br />

Handles<br />

Kernel Browser FileExplorer<br />

Connections<br />

FileExplorer -> picture1<br />

FileExplorer -> www.malicious-server.com<br />

Browser -> www.google.com<br />

Malware<br />

Figure 3.2: Random Access Memory example<br />

The random access memory conta<strong>in</strong>s a copy of the Registry, the three<br />

processes Kernel, Browser and FileExplorer, handles and connections between<br />

processes and to network resources. Figure 3.2 roughly visualizes the<br />

data that can be found. The Malware node is not connected to the Processes<br />

node because it is not listed <strong>in</strong> the normal list of processes but as it is stored<br />

there, it is connected to the RAM node. More details of the registry and the<br />

<strong>in</strong><strong>for</strong>mation available there, are expla<strong>in</strong>ed <strong>in</strong> section 4.2.3.1.<br />

The Registry is a collection of key value pairs that is ma<strong>in</strong>ly used <strong>for</strong><br />

the storage of conguration data. The <strong>in</strong><strong>for</strong>mation that can be found <strong>in</strong> the<br />

Processes section <strong>in</strong>cludes currently runn<strong>in</strong>g processes, some processes that<br />

have already nished and processes that try to hide their existence. In the<br />

Connections category there are stored connections between programs and<br />

to network addresses that are currently open and some of them that are<br />

already closed. Handles <strong>in</strong>clude all other resources, <strong>for</strong> example les, that a<br />

process can access.<br />

The content of the Registry le and the Registry memory object will<br />

be expla<strong>in</strong>ed later.<br />

The analysis of the data is cont<strong>in</strong>ued <strong>in</strong> section 4.1.3.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!