[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1109/IWIA.2005.9guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

Forensic Analysis of File System Intrusions Using Improved Backtracking

Published: 23 March 2005 Publication History

Abstract

Intrusion detection systems alert the system administrators of intrusions but, in most cases, do not provide details about which system events are relevant to the intrusion and how the system events are related. We consider intrusions of file systems. Existing tools, like BackTracker, help the system administrator backtrack from the detection point, which is a file with suspicious contents, to possible entry points of the intrusion by providing a graph containing dependency information between the various files and processes that could be related to the detection point. We improve such backtracking techniques by logging certain additional parameters of the file system during normal operations (real-time) and examining the logged information during the analysis phase. In addition, we use data flow analysis within the processes related to the intrusion to prune unwanted paths from the dependency graph. This results in significant reduction in search space, search time, and false positives. We also analyze the effort required in terms of storage space and search time.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Guide Proceedings
IWIA '05: Proceedings of the Third IEEE International Workshop on Information Assurance
March 2005
167 pages
ISBN:076952317X

Publisher

IEEE Computer Society

United States

Publication History

Published: 23 March 2005

Author Tags

  1. Backtracking
  2. Data Flow Analysis
  3. Dynamic Slicing
  4. File System
  5. Intrusion Detection

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 11 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2018)LprovProceedings of the 34th Annual Computer Security Applications Conference10.1145/3274694.3274751(605-617)Online publication date: 3-Dec-2018
  • (2018)NodeMergeProceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security10.1145/3243734.3243763(1324-1337)Online publication date: 15-Oct-2018
  • (2017)A survey on forensic event reconstruction systemsInternational Journal of Information and Computer Security10.1504/IJICS.2017.0875659:4(337-360)Online publication date: 1-Jan-2017
  • (2016)High Fidelity Data Reduction for Big Data Security Dependency AnalysesProceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security10.1145/2976749.2978378(504-516)Online publication date: 24-Oct-2016
  • (2016)Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination ForensicsProceedings of the Sixth ACM Conference on Data and Application Security and Privacy10.1145/2857705.2857747(277-284)Online publication date: 9-Mar-2016
  • (2015)Accurate, Low Cost and Instrumentation-Free Security Audit Logging for WindowsProceedings of the 31st Annual Computer Security Applications Conference10.1145/2818000.2818039(401-410)Online publication date: 7-Dec-2015
  • (2014)Assisted deletion of related contentProceedings of the 30th Annual Computer Security Applications Conference10.1145/2664243.2664287(206-215)Online publication date: 8-Dec-2014
  • (2013)LogGCProceedings of the 2013 ACM SIGSAC conference on Computer & communications security10.1145/2508859.2516731(1005-1016)Online publication date: 4-Nov-2013
  • (2008)Efficiently tracking application interactions using lightweight virtualizationProceedings of the 1st ACM workshop on Virtual machine security10.1145/1456482.1456486(19-28)Online publication date: 27-Oct-2008
  • (2008)Computer forensics in forensisACM SIGOPS Operating Systems Review10.1145/1368506.136852142:3(112-122)Online publication date: 1-Apr-2008
  • Show More Cited By

View Options

View options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media