Skip to main content

A Novel Methodology for Malware Intrusion Attack Path Reconstruction

  • Conference paper
Digital Forensics and Cyber Crime (ICDF2C 2011)

Abstract

After an intrusion has propagated between hosts, or even between networks, determining the propagation path is critical to assess exploited network vulnerabilities, and also to determine the vector and intent of the initial intrusion. This work proposes a novel method for malware intrusion attack path reconstruction that extends post-mortem system state comparison methods with network-level correlation and timeline analysis. This work shows that intrusion-related events can be reconstructed at the host level and correlated between related hosts and networks to reconstruct the overall path of an attack. A case study is given that demonstrates the applicability of the attack path reconstruction technique.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Symantec. Internet Security Threat Report, vol. 16 (2010)

    Google Scholar 

  2. Gladyshev, P., Patel, A.: Formalizing Event Time Bounding in Digital Investigations. International Journal of Digital Evidence 4(2) (2005)

    Google Scholar 

  3. Zhu, Y., James, J., Gladyshev, P.: A comparative methodology for the reconstruction of digital events using Windows Restore Points. Paper Presented at the Digital Investigation Conference (2009)

    Google Scholar 

  4. Microsoft. About System Restore (2010), http://msdn.microsoft.com/en-us/library/aa378724(v=vs.85).aspx (retrieved 2011)

    Google Scholar 

  5. Harms, K.: Forensic analysis of System Restore points in Microsoft Windows XP. Digital Investigation 3, 151–158 (2006)

    Article  Google Scholar 

  6. Carvey, H.: Windows Forensic Analysis DVD ToolKit (2009)

    Google Scholar 

  7. Kahvedzic, D., Kechadi, T.: Extraction of User Activity through Comparison of Windows Restore Points (2008)

    Google Scholar 

  8. Kahvedzic, D., Kechadi, T.: On the persistence of deleted windows registry data structures. Paper Presented at the ACM Symposium on Applied Computing, Honolulu, Hawaii (2009)

    Google Scholar 

  9. TechNet, Microsoft (2002). Windows XP System Restore, http://technet.microsoft.com/en-us/library/bb490854.aspx (2011)

  10. Microsoft. Monitored File Name Extensions (2010), http://msdn.microsoft.com/en-us/library/aa378870(v=vs.85).aspx (retrieved 2011)

    Google Scholar 

  11. Microsoft. Microsoft PE and COFF Specification (2011), http://msdn.microsoft.com/en-us/windows/hardware/gg463119.aspx (retrieved 2011)

  12. Zhu, Y., Gladyshev, P.: Temporal Analysis of Windows MRU registry Keys. Advances in Digital Forensics 306, 83–93 (2009)

    Google Scholar 

  13. Ammann, P., Wijesekera, D., Kaushik, S.: Scalable, graph-based network vulnerability analysis. Paper Presented at the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA (2002)

    Google Scholar 

  14. Ingols, K., Lippmann, R., Piwowarski, K.: Practical Attack Graph Generation for Network Defense. Paper Presented at the Annual Computer Security Applications Conference (2006)

    Google Scholar 

  15. Sheyner, O., Haines, J., Jha, S., Lippmann, R.: Automated Generation and Analysis of Attack Graphs. Paper Presented at the IEEE Symposium on Security and Privacy, Los Alamitos, CA, USA (2002)

    Google Scholar 

  16. http://www.offensivecomputing.net/

  17. http://www.nepenthespharm.com/

  18. AccessData. Forensic Toolkit (2010), http://www.accessdata.com/forensictoolkit.html (retrieved November 4, 2010)

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Shosha, A.F., James, J.I., Gladyshev, P. (2012). A Novel Methodology for Malware Intrusion Attack Path Reconstruction. In: Gladyshev, P., Rogers, M.K. (eds) Digital Forensics and Cyber Crime. ICDF2C 2011. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 88. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35515-8_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35515-8_11

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35514-1

  • Online ISBN: 978-3-642-35515-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics