Mô hình phân tích pháp y sử dụng ghi nhật ký hướng mục tiêu - Sean Peisert

Trường ĐH

University of California, San Diego

Chuyên ngành

Computer Science

Tác giả

Ẩn danh

Thể loại

Luận án

Năm xuất bản

Số trang

183

Thời gian đọc

28 phút

Lượt xem

0

Lượt tải

0

Phí lưu trữ

50 Point

Mục lục chi tiết

Signature Page

List of Tables

List of Figures

Vita, Publications, and Fields of Study

Organization of the Dissertation

3. A Method of Forensic Analysis Using Sequences of Function Calls

3.1. Experiments and Results

3.2. Conclusions on Forensics Using Sequences of Function Calls

4. Toward Forensic Models

4.1. Principles of Forensic Analysis

4.1.1. Principle 1: Consider the Entire System

4.1.2. Principle 2: Log Information without Regard to Assumptions

4.1.3. Principle 3: Consider the Effects, Not Just the Actions

4.1.4. Principle 4: Consider Context to Assist in Understanding

4.1.5. Principle 5: Present and Process Actions and Results in an Understandable Way

4.2. Current Problems with Forensics

4.3. Summary of Current Problems with Forensics

4.4. Principles-Driven Solutions

4.4.1. Principles-Driven Logging

4.4.2. Principles-Driven Auditing

4.4.3. Summary of Principles-Driven Solutions

4.5. From Principles to Models

4.6. Qualities for a Forensic Model

5. Laocoön: The Forensic Model

5.1. Introduction to Our Approach

5.2. Choosing Intruder Goals to Model

5.3. Modeling Intruder Goals

5.4. Extracting and Interpreting Logged Data

5.5. Unique Path Identifier

5.6. Proving the Model

6. Examples of Using Laocoön

6.1. Obtaining a Root Shell

6.2. Modify /etc/passwd (e. via lpr bug)

6.3. via search path modification)

6.4. Bypassing Standard Interfaces (e. via utmp bug)

6.5. Inconsistent Parameter Validation (e. with chsh or chfn)

6.6. Shared Memory Code Injection

6.7. The 1988 Internet Worm

6.8. Christma Exec Worm

6.9. Summary of Examples

7. Implementation, Experiments, and Results

7.1. Obtaining a Local Root Shell

7.2. Spyware via a Trojaned sshd

7.3. Modify /etc/passwd via lpr bug

7.4. Avoid Authentication in su

7.5. Trojan Horse to gain root

7.6. Bypassing Standard Interfaces

7.7. Summary of Experiments

8. Taking Laocoön from a Model to a System

8.1. Our Model in Practice

8.2. Issues with Instrumentation

8.3. Issues with Logging

8.4. Issues with Forensic Analysis

8.5. Issues with Construction

8.6. Policy Discovery and Compilation

8.7. Overview of the Approach

8.8. Applying Policies to Systems and Sites

8.9. Reverse-Engineering Policies

8.10. Software/Hardware Issues

8.11. Sufficiency and Necessity in the Forensic Model

8.12. Applying Forensic Techniques to Intrusion Detection

Xem trước tài liệu
Tải đầy đủ để xem toàn bộ nội dung
Luận án tiến sĩ: A model of forensic analysis using goal-oriented logging

Tải xuống file đầy đủ để xem toàn bộ nội dung

Tải đầy đủ (183 trang)

Từ khóa và chủ đề nghiên cứu


Câu hỏi thường gặp

Luận án liên quan

Chia sẻ tài liệu: Facebook Twitter