首页 | 本学科首页   官方微博 | 高级检索  
     


Forensic analysis of logs: Modeling and verification
Affiliation:1. School of Biological Sciences, The University of Adelaide, South Australia 5005, Australia;2. Centre for Australian Forensic Soil Science, CSIRO Land and Water, Urrbrae, Waite Road, South Australia, Australia;3. Mineral Resources Tasmania, P.O. Box 56, Rosny Park, Tasmania 7018, Australia;4. Forensic Science Research Centre, Flinders University, G.P.O. Box 2100, South Australia 5001, Australia;1. Department of ECE, Thiagarajar College of Engineering, Madurai 15, Tamilnadu, India;2. Best Dental Science College, Madurai 15, Tamilnadu, India;3. Mepco Schlenk Engineering College, Sivakasi, Tamilnadu, India;4. Kamaraj College of Engineering and Technology, Virudhunagar, Tamilnadu, India;1. Gulf Coast Research Laboratory, University of Southern Mississippi, 703 East Beach Drive, Ocean Springs, MS 39564, United States;2. Northeast Fisheries Science Center, 166 Water St. Woods Hole, MA 02543, United States
Abstract:Information stored in logs of a computer system is of crucial importance to gather forensic evidence of investigated actions or attacks against the system. Analysis of this information should be rigorous and credible, hence it lends itself to formal methods. We propose a model checking approach to the formalization of the forensic analysis of logs. The set of logs of a certain system is modeled as a tree whose labels are events extracted from the logs. In order to provide a structure to these events, we express each event as a term of a term algebra. The signature of the algebra is carefully chosen to include all relevant information necessary to conduct the analysis. Properties of the model are expressed as formulas of a logic having dynamic, linear, temporal, and modal characteristics. Moreover, we provide a tableau-based proof system for this logic upon which a model checking algorithm can be developed. In order to illustrate the proposed approach, the Windows auditing system is studied. The properties that we capture in our logic include invariant properties of a system, forensic hypotheses, and generic or specific attack signatures. Moreover, we discuss the admissibility of forensics hypotheses and the underlying verification issues.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号