An Ontology for Digital Forensics in IT Security Incidents - OPUS

An Ontology for Digital Forensics in IT Security Incidents - OPUS An Ontology for Digital Forensics in IT Security Incidents - OPUS

opus.bibliothek.uni.augsburg.de
from opus.bibliothek.uni.augsburg.de More from this publisher
15.01.2014 Views

Acknowledgement I would like to thank all those who participated in making this piece of work a reality. Special thanks go to Thomas Schreck who suggested the topic of this thesis and guided me through the eld of forensics. Additionally I would like to express my gratitude towards Dr. Kurt Stenzel who made this work possible. Special thanks also to all further proof readers who gave me valuable feedback, namely Gabriele Binner and Christoph Lassner. Last but not least I would like to thank my family and my girlfriend for supporting me during all the time of work.

Contents 1 Introduction 7 2 Related Work 9 3 Goal Forensic Semantic Model 11 3.1 Ontology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11 3.2 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 4 Forensics 15 4.1 Forensics Basics . . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.1.1 Real Case . . . . . . . . . . . . . . . . . . . . . . . . . 15 4.1.2 Cyber Forensics . . . . . . . . . . . . . . . . . . . . . . 15 4.1.2.1 Hard Disk . . . . . . . . . . . . . . . . . . . . 17 4.1.2.2 Random Access Memory . . . . . . . . . . . 18 4.1.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . 18 4.2 Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.1 Hard Disk . . . . . . . . . . . . . . . . . . . . . . . . . 19 4.2.2 Random Access Memory . . . . . . . . . . . . . . . . . 20 4.2.3 Additional information . . . . . . . . . . . . . . . . . . 21 4.2.3.1 Registry . . . . . . . . . . . . . . . . . . . . . 22 4.2.3.2 Network . . . . . . . . . . . . . . . . . . . . . 22 4.2.3.3 Other data on a computer . . . . . . . . . . . 22 4.2.4 Example . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.3 Forensic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 4.3.1 The Sleuth Kit . . . . . . . . . . . . . . . . . . . . . . 25 4.3.2 Volatility . . . . . . . . . . . . . . . . . . . . . . . . . 26 4.3.3 reglookup . . . . . . . . . . . . . . . . . . . . . . . . . 28 4.3.4 bkhive + samdump2 . . . . . . . . . . . . . . . . . . . 29 5 Ontology 31 5.1 Ontology Basics . . . . . . . . . . . . . . . . . . . . . . . . . . 31 5.1.1 Creating an ontology . . . . . . . . . . . . . . . . . . . 34 5.1.2 Advantages of ontologies for forensics . . . . . . . . . . 35 5.1.3 XML/RDF(S)/OWL . . . . . . . . . . . . . . . . . . . 35 3

Contents<br />

1 Introduction 7<br />

2 Related Work 9<br />

3 Goal Forensic Semantic Model 11<br />

3.1 <strong>Ontology</strong> . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11<br />

3.2 Example . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12<br />

4 <strong>Forensics</strong> 15<br />

4.1 <strong>Forensics</strong> Basics . . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />

4.1.1 Real Case . . . . . . . . . . . . . . . . . . . . . . . . . 15<br />

4.1.2 Cyber <strong>Forensics</strong> . . . . . . . . . . . . . . . . . . . . . . 15<br />

4.1.2.1 Hard Disk . . . . . . . . . . . . . . . . . . . . 17<br />

4.1.2.2 Random Access Memory . . . . . . . . . . . 18<br />

4.1.3 Example . . . . . . . . . . . . . . . . . . . . . . . . . . 18<br />

4.2 Data . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />

4.2.1 Hard Disk . . . . . . . . . . . . . . . . . . . . . . . . . 19<br />

4.2.2 Random Access Memory . . . . . . . . . . . . . . . . . 20<br />

4.2.3 Additional <strong>in</strong><strong>for</strong>mation . . . . . . . . . . . . . . . . . . 21<br />

4.2.3.1 Registry . . . . . . . . . . . . . . . . . . . . . 22<br />

4.2.3.2 Network . . . . . . . . . . . . . . . . . . . . . 22<br />

4.2.3.3 Other data on a computer . . . . . . . . . . . 22<br />

4.2.4 Example . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />

4.3 Forensic Tools . . . . . . . . . . . . . . . . . . . . . . . . . . . 24<br />

4.3.1 The Sleuth Kit . . . . . . . . . . . . . . . . . . . . . . 25<br />

4.3.2 Volatility . . . . . . . . . . . . . . . . . . . . . . . . . 26<br />

4.3.3 reglookup . . . . . . . . . . . . . . . . . . . . . . . . . 28<br />

4.3.4 bkhive + samdump2 . . . . . . . . . . . . . . . . . . . 29<br />

5 <strong>Ontology</strong> 31<br />

5.1 <strong>Ontology</strong> Basics . . . . . . . . . . . . . . . . . . . . . . . . . . 31<br />

5.1.1 Creat<strong>in</strong>g an ontology . . . . . . . . . . . . . . . . . . . 34<br />

5.1.2 Advantages of ontologies <strong>for</strong> <strong>for</strong>ensics . . . . . . . . . . 35<br />

5.1.3 XML/RDF(S)/OWL . . . . . . . . . . . . . . . . . . . 35<br />

3

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!