Title :
Trail of Bytes: New Techniques for Supporting Data Provenance and Limiting Privacy Breaches
Author :
Krishnan, Srinivas ; Snow, Kevin Z. ; Monrose, Fabian
Author_Institution :
Dept. of Comput. Sci., Univ. of North Carolina at Chapel Hill, Chapel Hill, NC, USA
Abstract :
Forensic analysis of computer systems requires that one first identify suspicious objects or events, and then examine them in enough detail to form a hypothesis as to their cause and effect. Sadly, while our ability to gather vast amounts of data has improved significantly over the past two decades, it is all too often the case that we lack detailed information just when we need it the most. In this paper, we attempt to improve on the state of the art by providing a forensic platform that transparently monitors and records data access events within a virtualized environment using only the abstractions exposed by the hypervisor. Our approach monitors accesses to objects on disk and follows the causal chain of these accesses across processes, even after the objects are copied into memory. Our forensic layer records these transactions in a tamper evident version-based audit log that allows for faithful, and efficient, reconstruction of the recorded events and the changes they induced. To demonstrate the utility of our approach, we provide an extensive empirical evaluation, including a real-world case study demonstrating how our platform can be used to reconstruct valuable information about the what, when, and how, after a compromise has been detected. We also extend our earlier work by providing a tracking mechanism that can monitor data exfiltration attempts across multiple disks and also block attempts to copy data over the network.
Keywords :
computer forensics; data privacy; computer systems; data access; data exfiltration attempts; data provenance; forensic analysis; forensic layer records; forensic platform; hypervisor; multiple disks; privacy breaches; tracking mechanism; version-based audit log; virtualized environment; Couplings; Forensics; Monitoring; Semantics; Virtual machine monitors; Virtual machining; Computer security; checkpointing; information security; intrusion detection; operating systems; system recovery; virtual machine monitors;
Journal_Title :
Information Forensics and Security, IEEE Transactions on
DOI :
10.1109/TIFS.2012.2210217