Featured Research

from universities, journals, and other organizations

Intruder Alert: Method Provides Double Computer Crime-Solving Evidence

Date:
November 30, 2004
Source:
University Of Florida
Summary:
Like an episode of "CSI: Computers," a UF researcher has developed a technique that gives digital detectives twice the forensic evidence they now have to catch all kinds of hackers, from curious teenagers to disgruntled employees to agents of foreign governments.

Like an episode of "CSI: Computers," a UF researcher has developed a technique that gives digital detectives twice the forensic evidence they now have to catch all kinds of hackers, from curious teenagers to disgruntled employees to agents of foreign governments.

Related Articles


Writing in the current issue of the International Journal of Digital Evidence, UF doctoral student Mark Foster proposes a new and improved method of computer crime solving, called “process forensics.”

“If a guy walks into a bank and robs it, leaving footprints behind or his fingerprints on the counter, the forensic analyst would come in and find those traces of what happened,” said Foster. In the same way, process forensics merges two existing types of digital evidence – intrusion-detection and checkpointing technology – to give an investigator the most possible information to crack a case, said Foster, a computer science and engineering student conducting the research for his dissertation with UF professor of computer science Joseph Wilson, who co-wrote the paper.

“If you detect the intruder – or even if you’re just suspicious that an intruder’s around – you start creating checkpoints,” Foster said. “And then later, those checkpoints will serve to give us some forensics.”

Checkpoints are essentially periodic snapshots of a running computer program, or process. Programmers use them as a safety backup – if the power goes out while a program is still running, they can return to the most recent checkpoint rather than starting over from the beginning.

Many current programs don’t have built-in checkpointing technology, creating more work for programmers, Foster said. So he developed a technique that automatically creates checkpoints within a program. After working separately on computer security and intrusion-detection software, he realized that combining checkpoints with intrusion detection would create an efficient forensics tool, he said.

“If the photographs are taken at the right times, then we can see how they got in, what was tampered with,” Foster said.

Foster targets intruders who want to break into systems that are host-based – or centrally located in one primary computer, which is then linked to numerous satellite workstations.

“You can have a scenario where user Bob – he’s malicious, he’s tired of class, and he wants to try to mess with everybody. In a multiuser environment, you’ve got to have boundaries set up and once you have those, somebody wants to come along and get through them.”

One way for an evil-minded hacker to break into a host-based computer system is to sneak in through a “hole,” a flaw in a running program the hacker can exploit to take control of the program, run his own programs or generally gum up the works, Foster said. This type of attack is called a buffer overflow attack, he said.

Current intrusion-detection software helps an investigator find out if someone has broken into a system, identifies the intruder and prevents future attacks. However, the software first has to learn the computer system well enough to detect anything out of the ordinary, such as unexpected changes to files and suspicious programs. Detection also can require more steps, such as additional software, modification of current software or preparing a program ahead of time for monitoring.

Foster’s process-forensics method also includes an intrusion-detection system that improves on current software by streamlining detection and eliminating the training phase.

“This is definitely an area that is up-and-coming in forensics,” said John Leeson, an associate professor of computer science at the University of Central Florida and an editor of the International Journal of Digital Evidence. “I like the fact that he’s taking a proactive approach – forensics for years has been a reactive field.

“The idea is that you kind of need to know when something is happening before you start collecting information, or it’ll be a lot of useless information,” Leeson said. “Mark’s proposing a tool that could be activated by an automatic intrusion-detection system. I think that’s going to definitely enhance the value of digital forensics, to be able to deal with incidents as they are occurring.”

Computer forensics is a broad field. “A lot of times it’s recovering deleted files or looking for hidden files,” Foster said. “You have a child stalker who’s on the Internet stalking children, and they track him down, they confiscate his computer, and they say to the forensic guy, 'What kind of evidence can you get from his computer?'”

Foster said his method targets a different kind of computer abuse – intruders who want to hijack a running program.

”This is definitely kind of a different angle than the traditional stuff,” he said.


Story Source:

The above story is based on materials provided by University Of Florida. Note: Materials may be edited for content and length.


Cite This Page:

University Of Florida. "Intruder Alert: Method Provides Double Computer Crime-Solving Evidence." ScienceDaily. ScienceDaily, 30 November 2004. <www.sciencedaily.com/releases/2004/11/041129101115.htm>.
University Of Florida. (2004, November 30). Intruder Alert: Method Provides Double Computer Crime-Solving Evidence. ScienceDaily. Retrieved March 2, 2015 from www.sciencedaily.com/releases/2004/11/041129101115.htm
University Of Florida. "Intruder Alert: Method Provides Double Computer Crime-Solving Evidence." ScienceDaily. www.sciencedaily.com/releases/2004/11/041129101115.htm (accessed March 2, 2015).

Share This


More From ScienceDaily



More Computers & Math News

Monday, March 2, 2015

Featured Research

from universities, journals, and other organizations


Featured Videos

from AP, Reuters, AFP, and other news services

HP to Buy Aruba Networks in $3B Deal

HP to Buy Aruba Networks in $3B Deal

Reuters - Business Video Online (Mar. 2, 2015) Hewlett-Packard is boosting its mobile computing business... buying California-based Aruba Networks- a wi-fi network gear maker for $24.67 per share. Leah Duncan reports. Video provided by Reuters
Powered by NewsLook.com
Can Curved Screen Give Samsung the Edge?

Can Curved Screen Give Samsung the Edge?

Reuters - Business Video Online (Mar. 2, 2015) South Korea&apos;s Samsung Electronics Co Ltd unveiled its latest Galaxy S smartphones, featuring a slim body made from aircraft-grade metal, in a bid to reclaim the throne of undisputed global smartphone leader from Apple Inc. Hayley Platt reports. Video provided by Reuters
Powered by NewsLook.com
Smartphone Giants Unveil Latest Models at Technology Show

Smartphone Giants Unveil Latest Models at Technology Show

AFP (Mar. 2, 2015) Mobile providers have been unveiling their upcoming models at the Mobile World Congress in Barcelona, showing off the latest in smartphone technology. Duration: 00:57 Video provided by AFP
Powered by NewsLook.com
Mobile World Looks to 5G

Mobile World Looks to 5G

Reuters - Business Video Online (Mar. 2, 2015) The wireless industry&apos;s annual conference gets underway in Barcelona with 85,000 executives taking part and numerous new smartphones and watches being launched. As Ivor Bennett reports from the show the race for 5G is one of the key themes. Video provided by Reuters
Powered by NewsLook.com

Search ScienceDaily

Number of stories in archives: 140,361

Find with keyword(s):
Enter a keyword or phrase to search ScienceDaily for related topics and research stories.

Save/Print:
Share:

Breaking News:

Strange & Offbeat Stories


Space & Time

Matter & Energy

Computers & Math

In Other News

... from NewsDaily.com

Science News

Health News

Environment News

Technology News



Save/Print:
Share:

Free Subscriptions


Get the latest science news with ScienceDaily's free email newsletters, updated daily and weekly. Or view hourly updated newsfeeds in your RSS reader:

Get Social & Mobile


Keep up to date with the latest news from ScienceDaily via social networks and mobile apps:

Have Feedback?


Tell us what you think of ScienceDaily -- we welcome both positive and negative comments. Have any problems using the site? Questions?
Mobile: iPhone Android Web
Follow: Facebook Twitter Google+
Subscribe: RSS Feeds Email Newsletters
Latest Headlines Health & Medicine Mind & Brain Space & Time Matter & Energy Computers & Math Plants & Animals Earth & Climate Fossils & Ruins