IR4CF:用于计算机取证的入侵重播系统

Lei Xu, Zhihong Tian, Jianwei Ye, Hongli Zhang
{"title":"IR4CF:用于计算机取证的入侵重播系统","authors":"Lei Xu, Zhihong Tian, Jianwei Ye, Hongli Zhang","doi":"10.1109/CCIENG.2011.6007958","DOIUrl":null,"url":null,"abstract":"When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is to analysis and take the evidence of the compromised system. IR4CF: a system call based intrusion replay system for supporting the computer forensics. IR4CF uses three key mechanisms to improve the accuracy and reduce the human overhead of performing forensic analysis. First, it streams the kernel event information in real-time, to append-only storage on a separate, hardened, logging machine, making the system resilient to a wide variety of attacks. Second, it uses system-call hijacking technology to perform comprehensive monitoring of the execution of a target system at the kernel event level, giving a high-resolution, application-independent view of all activity. Third, it analyses and replays the intrusion actions dynamically, which can be used for evidence in a court of law.","PeriodicalId":6316,"journal":{"name":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","volume":"105 1","pages":"66-69"},"PeriodicalIF":0.0000,"publicationDate":"2011-09-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":"{\"title\":\"IR4CF: A intrusion replay system for computer forensics\",\"authors\":\"Lei Xu, Zhihong Tian, Jianwei Ye, Hongli Zhang\",\"doi\":\"10.1109/CCIENG.2011.6007958\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is to analysis and take the evidence of the compromised system. IR4CF: a system call based intrusion replay system for supporting the computer forensics. IR4CF uses three key mechanisms to improve the accuracy and reduce the human overhead of performing forensic analysis. First, it streams the kernel event information in real-time, to append-only storage on a separate, hardened, logging machine, making the system resilient to a wide variety of attacks. Second, it uses system-call hijacking technology to perform comprehensive monitoring of the execution of a target system at the kernel event level, giving a high-resolution, application-independent view of all activity. Third, it analyses and replays the intrusion actions dynamically, which can be used for evidence in a court of law.\",\"PeriodicalId\":6316,\"journal\":{\"name\":\"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering\",\"volume\":\"105 1\",\"pages\":\"66-69\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-09-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"2\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CCIENG.2011.6007958\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2011 IEEE 2nd International Conference on Computing, Control and Industrial Engineering","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CCIENG.2011.6007958","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 2

摘要

当发生计算机入侵时,最昂贵、最耗时、最需要人力的任务之一就是分析和获取被入侵系统的证据。IR4CF:基于系统调用的入侵重播系统,支持计算机取证。IR4CF使用三个关键机制来提高准确性并减少执行法医分析的人力开销。首先,它实时地将内核事件信息流式传输到单独的、经过加固的日志机上,仅用于附加存储,使系统能够抵御各种各样的攻击。其次,它使用系统调用劫持技术在内核事件级别对目标系统的执行执行进行全面监视,从而提供所有活动的高分辨率、独立于应用程序的视图。第三,对入侵行为进行动态分析和回放,可作为法庭证据。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
IR4CF: A intrusion replay system for computer forensics
When computer intrusions occur, one of the most costly, time-consuming, and human-intensive tasks is to analysis and take the evidence of the compromised system. IR4CF: a system call based intrusion replay system for supporting the computer forensics. IR4CF uses three key mechanisms to improve the accuracy and reduce the human overhead of performing forensic analysis. First, it streams the kernel event information in real-time, to append-only storage on a separate, hardened, logging machine, making the system resilient to a wide variety of attacks. Second, it uses system-call hijacking technology to perform comprehensive monitoring of the execution of a target system at the kernel event level, giving a high-resolution, application-independent view of all activity. Third, it analyses and replays the intrusion actions dynamically, which can be used for evidence in a court of law.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信