skip to main content
OSTI.GOV title logo U.S. Department of Energy
Office of Scientific and Technical Information

Title: Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots

Abstract

Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.

Authors:
; ; ; ; ;
Publication Date:
Research Org.:
Pacific Northwest National Lab. (PNNL), Richland, WA (United States)
Sponsoring Org.:
USDOE
OSTI Identifier:
983444
Report Number(s):
PNNL-SA-73586
TRN: US201014%%207
DOE Contract Number:  
AC05-76RL01830
Resource Type:
Conference
Resource Relation:
Conference: Proceedigns of the 4th Annual IFIP WG 11.9 International Conference on Digital Forensics, 151-161
Country of Publication:
United States
Language:
English
Subject:
97 MATHEMATICAL METHODS AND COMPUTING; COMPUTER NETWORKS; SECURITY; DETECTION; SABOTAGE; Security; Digital Forensics; Client Honeypots; Network Forensics

Citation Formats

Seifert, Christian, Endicott-Popovsky, Barbara E, Frincke, Deborah A, Komisarczuk, Peter, Muschevici, Radu, and Welch, Ian D. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots. United States: N. p., 2008. Web.
Seifert, Christian, Endicott-Popovsky, Barbara E, Frincke, Deborah A, Komisarczuk, Peter, Muschevici, Radu, & Welch, Ian D. Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots. United States.
Seifert, Christian, Endicott-Popovsky, Barbara E, Frincke, Deborah A, Komisarczuk, Peter, Muschevici, Radu, and Welch, Ian D. 2008. "Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots". United States.
@article{osti_983444,
title = {Justifying the need for forensically ready protocols: A case study of identifying malicious web servers using client honeypots},
author = {Seifert, Christian and Endicott-Popovsky, Barbara E and Frincke, Deborah A and Komisarczuk, Peter and Muschevici, Radu and Welch, Ian D},
abstractNote = {Abstract: Client honeypot technology can find malicious web servers that attack web browsers and push malware, so called drive-by-downloads, to the client machine. Merely recording the network traffic is insufficient to perform an efficient forensic analysis of the attack. Custom tools need to be developed to access and examine the embedded data of the network protocols. Once the information is extracted from the network data, it cannot be used to perform a behavioral analysis on the attack, therefore limiting the ability to answer what exactly happened on the attacked system. Implementation of a record/ replay mechanism is proposed that allows the forensic examiner to easily extract application data from recorded network streams and allows applications to interact with such data for behavioral analysis purposes. A concrete implementation of such a setup for HTTP and DNS protocols using the HTTP proxy Squid and DNS proxy pdnsd is presented and its effect on digital forensic analysis demonstrated.},
doi = {},
url = {https://www.osti.gov/biblio/983444}, journal = {},
number = ,
volume = ,
place = {United States},
year = {Thu Jan 03 00:00:00 EST 2008},
month = {Thu Jan 03 00:00:00 EST 2008}
}

Conference:
Other availability
Please see Document Availability for additional information on obtaining the full-text document. Library patrons may search WorldCat to identify libraries that hold this conference proceeding.

Save / Share: