15.4 Filtering and Data Reduction


15.4 Filtering and Data Reduction

Investigations involving computers often result in a large amount of data, much of it unrelated to the crime under investigation. Also, when dealing with files containing captured network traffic, there may be privileged or confidential information that forensic examiners are required to ignore or remove. Therefore, data filtering and reduction are an essential part of any investigation involving networks, enabling a more efficient and thorough forensic analysis of the digital evidence.

Filtering out irrelevant data from log files may be as simple as extracting entries that match certain criteria such as a certain time period, an IP address, or failed logon events. For instance, the following output shows only failed logon events relating to the user "eco" extracted from a Windows NT Event Log using ntlast utility.[5]

    C:\>ntlast -f -u eco -file e:\case1\dc2\sec.evt    eco        WORKSTN13              MY-DOMAIN           Sun Jan 19 11:00:11 am 2003    eco        WORKSTN10              MY-DOMAIN           Wed Jan 15 05:39:39 pm 2003 

When examining established connections through a Cisco PIX firewall, it may be desirable to focus on one host rather than review every connection;

    pix01# show conn foreign 192.168.0.232 255.255.255.255    7354 in use, 24529 most used    TCP out 192.168.0.232:3129 in 172.16.1.23:80 idle 0:12:04 Bytes 45235 flags UIO    TCP out 192.168.0.232:3130 in 172.16.1.23:22 idle 0:00:01 Bytes 4395 flags UIO    TCP out 192.168.0.232:3131 in 172.16.1.23:443 idle 0:00:54 Bytes 9935 flags UIO 

However, this approach to collecting evidence from a firewall violates the recommendation provided in the previous sections - collect first and filter and analyze later. Therefore, it is advisable to display all connections, logging the results into a file, and then searching these results for the entries of interest. As another example of data reduction, the following output shows windump being used to extract data relating to one IP address from a file containing network traffic relating to many computers.

    E:\case1\networktraffic>windump -r monitor1-01192003.dmp host 64.4.45.7    00:08:07.534671 64.4.45.7.80 > 192.168.1.102.1037: S 1378721726:1378721726(0)    ack 250897286 win 17316 <mss 1322,nop,nop,sackOK>    00:08:07.688663 64.4.45.7.80 > 192.168.1.102.1037: P 1:155(154) ack 338 win 16979    00:08:07.689768 64.4.45.7.80 > 192.168.1.102.1037: F 155:155(0) ack 338 win 16979    00:08:07.839232 64.4.45.7.80 > 192.168.1.102.1037: . ack 339 win 16979    00:08:07.942829 204.60.0.2.53 > 192.168.1.102.1038: 6 1/4/4 A 64.4.45.7 (208) (DF)    00:08:08.067639 64.4.45.7.80 > 192.168.1.102.1039: S 2707800119:2707800119(0)    ack 251070441 win 17316 <mss 1322,nop,nop,sackOK>    00:08:08.240567 64.4.45.7.80 > 192.168.1.102.1039: P 1:435(434) ack 410 win 16907    00:08:08.244832 64,4.45.7.80 >192.168.1.102.1039: .435:971(536) ack 410 win 16907    00:08:08.245727 64.4.45.7.80 >192.168.1.102.1039:.971:1073(102) ack 410 win 16907    00:08:08.371354 64.4.45.7.80 > 192.168.1.102.1039: . 1073:1609(536) ack 410 win    <cut for brevity> 

Most commercial sniffers have the ability to create filters, only displaying packets that match certain criteria. Alternatively, ranking hosts based on the amount of data that they are sending and receiving can reveal one host that is involved in a suspiciously large amount of data transfer as shown in Table 15.2.

Table 15.2: Connections between hosts, ordered by total number of application bytes transferred. Data extracted from tcpdump file (available on book Web site) using Argus "ramon -c -A -M Matrix". The same summary can be obtained using the NetIntercept "Traffic Load" report (available on the Web site).

SOURCE IP

DESTINATION IP

SOURCE BYTES

DESTINATION BYTES

192.168.0.5

207.68.162.250

49900

230869

192.168.0.5

207.68.162.24

47819

146996

192.168.0.5

65.54.228.250

12212

158032

192.168.0.5

207.68.172.245

12963

48012

192.168.0.5

65.54.208.222

11217

40002

192.168.0.5

208.185.54.22

2304

42975

Similarly, viewing the number of connections between hosts may be useful for traffic analysis as shown in Table 15.3.

Table 15.3: Communication between hosts, ordered by number of connections. Data extracted from tcpdump file using the NetIntercept "Top N" report (available on book Web site).

CONNECTIONS

SOURCE IP ADDRESS

DESTINATION IP ADDRESS

81

192.168.0.5

207.68.162.24

31

192.168.0.5

207.68.162.250

9

192.168.0.5

65.54.228.250

8

192.168.0.5

207.68.177.125

7

192.168.0.5

65.54.208.222

[5]http://www.foundstone.com




Digital Evidence and Computer Crime
Digital Evidence and Computer Crime, Second Edition
ISBN: 0121631044
EAN: 2147483647
Year: 2003
Pages: 279

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net