A Hierarchical Visibility theory for formal digital investigation of anti-forensic attacks

被引:3
|
作者
Rekhis, Slim [1 ]
Boudriga, Noureddine [1 ]
机构
[1] Univ Carthage, Commun Networks & Secur Res Lab, Tunis, Tunisia
关键词
Formal methods; Digital forensic investigation; Provable anti-forensics attacks; Hierarchical Visibility; Digital evidence modelling;
D O I
10.1016/j.cose.2012.06.009
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Among the leading topics of research in digital forensic investigation is the development of theoretical and scientifically proven techniques of incident analysis. However, two main problems, which remain unsolved in the literature, could lead the use of formal approaches of attack scenarios reconstruction and incident analysis to be inconclusive. The former is related to the absence of techniques to model and characterize anti-forensic attacks, and cope with the reconstruction of attack scenarios based on evidences compromised by these attacks. The latter is related to the lack of theoretical techniques usable during the preparation of systems to forensic analysis (i.e., the first phase of a forensic process that precedes the occurrence of an incident and the collection of evidences). These techniques are expected to determine the optimal set of security solutions to deploy so that the evidences to be generated further to a security incident would be sufficient to prove a wide range of anti-forensic attacks. In this paper we propose a formal approach, based on a novel theory of Hierarchical Visibility, allowing to forensically investigate security incidents that are conducted over complex systems and integrate anti-forensic attacks. We develop a formal logic-based model useful for the representation of complex systems and scenarios of attacks under different levels of abstractions, and the description of the deployed security solutions together with the evidences they generated. The theory of Hierarchical Visibility that we provide in this paper allows reasoning on anti-forensic attacks over complex systems, characterize situations under which they are provable, and prove their occurrence starting from incomplete evidences. An extension of the forensic process showing the use of Hierarchical Visibility theory to increase the number of provable anti-forensic attacks, is described. We illustrate the proposal using a case study related to the investigation of a denial of service attack over an SSH service. (C) 2012 Elsevier Ltd. All rights reserved.
引用
下载
收藏
页码:967 / 982
页数:16
相关论文
共 18 条
  • [1] A System for Formal Digital Forensic Investigation Aware of Anti-Forensic Attacks
    Rekhis, Slim
    Boudriga, Noureddine
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2012, 7 (02) : 635 - 650
  • [2] Digital Image Forensic Approach to Counter the JPEG Anti-Forensic Attacks
    Kumar, Amit
    Singh, Gurinder
    Kansal, Ankush
    Singh, Kulbir
    IEEE ACCESS, 2021, 9 : 4364 - 4375
  • [3] An Approach for Validation of Digital Anti-Forensic Evidence
    Shanmugam, Karthikeyan
    Powell, Roger
    Owens, Tom
    INFORMATION SECURITY JOURNAL, 2011, 20 (4-5): : 219 - 230
  • [4] Performance of Blind Microphone Recognition Algorithms in the Presence of Anti-Forensic Attacks
    Hafeez, Azeem
    Malik, Hafiz
    Mahmood, Khalid
    2017 AES INTERNATIONAL CONFERENCE ON AUDIO FORENSICS, 2017,
  • [5] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
    Rani, Deevi Radha
    Geethakumari, G.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2021, 14 (04) : 2385 - 2398
  • [6] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
    Rani, Deevi Radha
    Geethakumari, G.
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020,
  • [7] DETECTING ANTI-FORENSIC ATTACKS ON DEMOSAICING-BASED CAMERA MODEL IDENTIFICATION
    Chen, Chen
    Zhao, Xinwei
    Stamm, Matthew C.
    2017 24TH IEEE INTERNATIONAL CONFERENCE ON IMAGE PROCESSING (ICIP), 2017, : 1512 - 1516
  • [8] A framework for the identification of suspicious packets to detect anti-forensic attacks in the cloud environment
    Deevi Radha Rani
    G. Geethakumari
    Peer-to-Peer Networking and Applications, 2021, 14 : 2385 - 2398
  • [9] A Modified Anti-Forensic Technique for Removing Detectable Traces from Digital Images
    Kaimal, Athira B.
    Manimurugan, S.
    Anitha, J.
    2013 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS, 2013,
  • [10] Secure data transmission and detection of anti-forensic attacks in cloud environment using MECC and DLMNN
    Rani, Deevi Radha
    Geethakumari, G.
    COMPUTER COMMUNICATIONS, 2020, 150 : 799 - 810