Title : ( Event reconstruction using temporal pattern of file system modification )
Authors: somayeh soltani , Seyed Amin Hosseini Seno , Hadi Sadoghi Yazdi ,Access to full-text not allowed by authors
Abstract
Nowadays, several digital forensic tools extract a lot of low-level information from different parts of the system. Constructing high-level information from low-level ones is very challenging. This study reconstructs high-level events by using the traces of applications that are found in the file system metadata. In this regard, an event reconstruction framework is proposed that determines which applications have been run on a compromised system. The proposed framework works in two phases. In the training phase, the signatures of various applications are constructed. The signature of an application is the temporal pattern of file system modification of the application. In the detection phase, at first, the temporal pattern of file system modification of the hard disk -TPFSM-D- of the compromised system is constructed. Then in order to determine whether a particular application has been run on the compromised system, the distance between the signature of the application and the TPFSM-D of the hard disk is calculated by using a proposed distance measure. Finally, a decision engine decides whether the application has been run on the compromised system. The proposed event reconstruction framework has been tested on different scenarios. The empirical results suggest that the framework is effective in reconstructing events.
Keywords
, forensic, event Reconstruction, NTFS@article{paperid:1072830,
author = {Soltani, Somayeh and Hosseini Seno, Seyed Amin and Sadoghi Yazdi, Hadi},
title = {Event reconstruction using temporal pattern of file system modification},
journal = {IET Information Security},
year = {2019},
volume = {10},
number = {10},
month = {January},
issn = {1751-8709},
pages = {1--11},
numpages = {10},
keywords = {forensic; event Reconstruction; NTFS},
}
%0 Journal Article
%T Event reconstruction using temporal pattern of file system modification
%A Soltani, Somayeh
%A Hosseini Seno, Seyed Amin
%A Sadoghi Yazdi, Hadi
%J IET Information Security
%@ 1751-8709
%D 2019