models for reasoning about digital...

21
MODELS FOR REASONING ABOUT DIGITAL EVIDENCE Advisor: Roy Campbell Imani Palmer

Upload: others

Post on 21-Aug-2020

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

MODELS FOR REASONING ABOUT DIGITAL EVIDENCE

Advisor: Roy Campbell

Imani Palmer

Page 2: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Outline§Motivation§Problem Statement§Analysis of Models§Discussion§Future Work§Conclusion

Page 3: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Motivation§Systems composed of a large number of components

vulnerable to attacks§Systems generate an enormous amount of digital evidence§ Incident responders/examiners determine the cause of the

intrusion§Analysis of digital evidence remains highly subjective to the

forensic practitioner

[1]

Page 4: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Case Study: Sony Hack§ “The Interview”: Depiction of an assassination attempt of Kim

Jong-Un of North Korea

§The Hack, November 2014

• Guardians Of Peace

• 100 terabytes of data

• Dump unreleased movies onto the internet

• Release private information about Sony employees [2]

Page 5: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

§Sony Employees

• Norse – CyberintelligenceFirm

• North Korean operatives don’t normally name themselves

• Lack of infrastructure

• Suspicious activity of disgruntled former Sony employees

§North Korea

• Poorly worded messages

• Blaming “The Interview”

• Similarities in the code used in the Sony hack and code North Korea used to target South Korean corporations

• FBI investigations supports this conclusion

[3]

Page 6: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Problem

Digital forensics is in need of a deterministic approach to obtain the most accurate conclusions from the evidence

Page 7: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Reasoning Models§Probabilistic Models

• Classical Probability• Bayesian Model• Dempster-Shafer Theory

§Reconstruction Models• Event Reconstruction• Back-Tracing Events• Attack Graphs

Page 8: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Probabilistic Models§ Assess the degree of certainty for which hypotheses and

evidence can be linked

Probabilistic Models• Assess the degree of certainty for which

hypotheses and evidence can be linked

Cause Effect

[2]

Page 9: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

0 1

File Does Not Exist

File Does Exist

[2]

Classical Probability

Page 10: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Classical Probability§ Provide a quantitative assessment of the likelihood of guilt§ Example: Likelihood of an intentional download of illegal

images versus accidental download• Illegal images seized was small compared to the total

amount of content• Illegal images downloaded over a long period of time• Probability of unintentionally downloading a small

amount of illegal images is below 10%§ Limited to investigations with few characteristics of evidential

Page 11: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Bayesian Model§ Bayes’ theorem determines probability of evidence resulting

from a hypothesis§ Bayesian model

• Root and sub hypothesis• Example: “The seized computer was used to send this

malicious file” • Possible states of the hypothesis – Yes, No, and

Uncertain§ Dependent on the assignment of prior probabilities

• Compute the probability for the modification of a particular registry key

• Compute the probability of a particular registry key being modified given that the malware did not gain privileged access

Page 12: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

[3]

Bayesian Model

Page 13: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Dempster-Shafer Theory§ Does not require one to provide a prior probability for the

hypothesis§ Does not require the use of conditional probabilities§ Presence of certain evidence during forensic analysis does

not necessarily indicate a malicious activity§ Example:

• A change in registry key could be either due to a malware or by a benign application

§ Provides rules for combining multiple evidences to calculate the overall belief in the hypothesis

Page 14: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Dempster-Shafer Theory

[2]

Page 15: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Event Reconstruction Models§ Determine all of possible routes connecting the gaps of a

specific trace§ Finding all possible routes may require exponential time;

therefore, the search area would need to be bounded§ Likelihood value measures how likely the target, could have

been observed in the current vertex if he took the leading edge

§ Connect all the routes with the highest likelihood value and form the final reconstructed trace

Page 16: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Event Reconstruction Models

Filed Deleted

User Input

Malware

Pop-up Error

Computer Crashed

Program Failed

Page 17: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Back-Tracing Event StatesBack-Tracing Event States

Filed Deleted

User Input

Malware

Pop-up Error

Computer Crashed

Program Failed

Page 18: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Attack Graphs§ Directed graphs where nodes represent pre and post

conditions of machine events§ Directed edges are conditions met between the nodes§ Lacking of any probabilistic inference § Combine attack graphs with Bayesian networks

Page 19: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Attack Graphs

Internet

Website

Server

DBMS

SQL Injection

Session Hijacking

Email Phishing

DoS

Attack Graphs

Page 20: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

Conclusion & Future Work§ Framework§ Rigorous testing§ Exploration of other methods

Page 21: MODELS FOR REASONING ABOUT DIGITAL EVIDENCEassured-cloud-computing.illinois.edu/files/2016/01/... · 2016. 3. 3. · Motivation §Systems composed of a large number of components

References1. http://media.economist.com/sites/default/files/cf_images/20010331/1301st1.jpg2. http://www.gannett-cdn.com/-mm-

/7bc135a2083eb61b1f0b781b9b336cd37c473e11/c=0-2-297-398&r=537&c=0-0-534-712/local/-/media/USATODAY/USATODAY/2014/12/04/635532898706495971-The-INterview-poster.jpg

3. Nagy, Stefan, et al. “An Empirical Study on Current Models for Reasoning about Digital Evidence.”

4. http://www.eecs.qmul.ac.uk/~norman/papers/inaugural_pics/Image67.gif5. UIUC Digital Forensics Education Initiative