[go: up one dir, main page]

skip to main content
10.1145/1141277.1141346acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Automated recognition of event scenarios for digital forensics

Published: 23 April 2006 Publication History

Abstract

The authors have previously developed the ECF (Event Correlation for Forensics) framework for scenario matching in the forensic investigation of activity manifested in digital transactional logs. ECF incorporated a suite of log parsers to reduce event records from heterogeneous logs to a canonical form for lodging in an SQL database. This paper presents work since then, the Auto-ECF system, which represents significant advances on ECF. The paper reports on the development and implementation of the new event abstraction and scenario specification methodology and on the development of the Auto-ECF system which builds on that to achieve the automated recognition of event scenarios. The paper also reports on the evaluation of Auto-ECF using three scenarios including one from the well known DARPA test data.

References

[1]
Chen Kevin, Andrew Clark, Olivier De Vel and George Mohay "ECF - Event Correlation for Forensics" In Proceedings of 1st Australian Computer, Network & Information Forensics Conference Perth, Western Australia, 2003.
[2]
NetForensics, "NetForensics," http://www.netforensics.com/, 2003.
[3]
GuardedNet, "GuardedNet neuSECURE," http://www.guarded.net/, 2003.
[4]
e-Security Inc., "e-Security Management System," http://www.esecurityinc.com/, 2003.
[5]
GFI Software USA, "LANguard Security Event Log Monitor," http://www.gfisoftware.de/, 2003.
[6]
Sawmill, "Flowerfire," www.sawmill.net, 2003.
[7]
TNT Software, "ELM Log Manager," https://www.tnttechnology.com/, 2003.
[8]
I3P - Institute for Information Infrastructure Protection, "National Information Infrastructure Protection Research and Development Agenda Initiative Report, Information Infrastructure Protection: Survey of Products, Tools and Services," http://www.thei3p.org, 9 Sept 2002.
[9]
Haines Joshua, Dorene Kewley Ryder, Laura Tinnel, Stephen Taylor, "Validation of Sensor Alert Correlators," IEEE Security & Privacy, vol. 1, 2003.
[10]
Bishop M. "A Standard Audit Trail Format" In Proceedings of 18th National Information Systems Security Conference, 1995. pp. 136--145.
[11]
CERIAS, "Audit Trails Format Group," http://www.cerias.purdue.edu/about/history/coast/projects/audit-trails-format.php: Purdue University, 2003.
[12]
CERIAS Audit Trail Reduction Group, http://www.cerias.purdue.edu/about/history/coast/projects/audit-trails-reduce.php: Purdue University, 2003.

Cited By

View all
  • (2018)An ontology-based approach for the reconstruction and analysis of digital incidents timelinesDigital Investigation: The International Journal of Digital Forensics & Incident Response10.1016/j.diin.2015.07.00515:C(83-100)Online publication date: 20-Dec-2018
  • (2017)On evidence preservation requirements for forensic-ready systemsProceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering10.1145/3106237.3106308(559-569)Online publication date: 21-Aug-2017
  • (2015)Event ReconstructionHandbook of Research on Digital Crime, Cyberspace Security, and Information Assurance10.4018/978-1-4666-6324-4.ch015(231-245)Online publication date: 2015
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '06: Proceedings of the 2006 ACM symposium on Applied computing
April 2006
1967 pages
ISBN:1595931082
DOI:10.1145/1141277
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 April 2006

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. computer forensics
  2. event correlation
  3. events
  4. heterogeneous event logs
  5. logs

Qualifiers

  • Article

Conference

SAC06
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)1
Reflects downloads up to 25 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2018)An ontology-based approach for the reconstruction and analysis of digital incidents timelinesDigital Investigation: The International Journal of Digital Forensics & Incident Response10.1016/j.diin.2015.07.00515:C(83-100)Online publication date: 20-Dec-2018
  • (2017)On evidence preservation requirements for forensic-ready systemsProceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering10.1145/3106237.3106308(559-569)Online publication date: 21-Aug-2017
  • (2015)Event ReconstructionHandbook of Research on Digital Crime, Cyberspace Security, and Information Assurance10.4018/978-1-4666-6324-4.ch015(231-245)Online publication date: 2015
  • (2013)A Comprehensive Survey of Event AnalyticsEmerging Digital Forensics Applications for Crime Detection, Prevention, and Security10.4018/978-1-4666-4006-1.ch012(166-180)Online publication date: 2013
  • (2013)CAT Record (computer activity timeline record): A unified agent based approach for real time computer forensic evidence collection2013 8th International Workshop on Systematic Approaches to Digital Forensics Engineering (SADFE)10.1109/SADFE.2013.6911539(1-8)Online publication date: Nov-2013
  • (2012)A Comprehensive Survey of Event AnalyticsInternational Journal of Digital Crime and Forensics10.4018/jdcf.20120701034:3(33-46)Online publication date: 1-Jul-2012
  • (2012)A partially reconstructed previous Gmail session by live digital evidences investigation through volatile data acquisitionSecurity and Communication Networks10.1002/sec.5115:10(1193-1198)Online publication date: 26-Apr-2012
  • (2011)Detection of anomalies from user profiles generated from system logsProceedings of the Ninth Australasian Information Security Conference - Volume 11610.5555/2460416.2460421(23-32)Online publication date: 17-Jan-2011
  • (2006)Using a virtual security testbed for digital forensic reconstructionJournal in Computer Virology10.1007/s11416-006-0033-x2:4(275-289)Online publication date: 21-Dec-2006

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media