Note-13

Note-13 - CSE 494/598 Forensic Computing: Computer and...

Info iconThis preview shows pages 1–4. Sign up to view the full content.

View Full Document Right Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: CSE 494/598 Forensic Computing: Computer and Network Forensics Prof. Gail-Joon Ahn Cyber Gazette ! AccessData Certified Examiner (ACE) ! Microsoft offers $250,000 reward for Conficker arrest ! Downadup worm (a.k.a Conficker) has now infected an estimated 10 million PCs ! http://technet.microsoft.com/en-us/security/ dd452420.aspx IMPORTANT DATES ! Exam #1: Feb 19, 2009 ! Assignment #1: Mar 3, 2009 ! Spring Break: Mar 10 & 12, 2009 ! Exam #2: Mar 31, 2009 ! Assignment #2: Apr 7, 2009 ! Class Project Due: Apr 23, 2009 ! Paper Report Due: Apr 28, 2009 ! Class Presentation: Apr 28 & 30, 2009 May 5, 2009 ! Exam #3 (Final): May 7, 2009 (12:10PM 2:00PM) 3 EXAM #2 ! Scope: ! Notes #9 through #15 ! Date: ! March 31 st , 2009 Paper Presentation ! Towards Models for Forensic Analysis ! Forensic Analysis of File System Intrusions using Improved Backtracking ( taken ) ! Secure Audit Logs to Support Computer Forensics ! ReVirt: Enabling Intrusion Analysis through VM Logging and Replay ( taken ) ! A Hardware-based Memory Acquisition Procedure Paper Presentation ! April 28 th ! Group : Ho An and Fengze Xie ! Group : Terrance Cuny and Farooq Khera ! April 30th ! Group : Fei Hong and Sanket Sheth ! Forensic Analysis of File System Intrusions using Improved Backtracking ! Group : Pradeep Sekar and Deepak Barge ! ReVirt: Enabling Intrusion Analysis through VM Logging and Replay ! May 5th ! Group : Joseph Schneider and Darin Tupper Assignment #2: Due April 7 ! Task #1: Please store .e01 (or .s01) image--that you created from the assignment #1--to your hard disk by March 19 ! Requirements: ! A file with a hash value: group1-hash.txt ! Image file: group1.e01 or (group1.s01) ! TA will post a designated hard disk for each group ! Task #2: Analyze the image in the designated hard disk using FTK Starting from March 20 ! Report Format (refer to the report template in the class website) ! Evidence Custody Form ! Analysis Report " Case Report generated by FTK should be attached " Including recovered files (10 files) 8 Outline ! File Forensics ! File System Analysis ! Network Forensics File System Analysis: Reference Model ! Four categories Layout and Size Information cse494.txt cse598.txt Times and Addresses Content Date i Content Date i Content Date k Content Date j Times and Addresses File System Category File Name Category Metadata Category Content Category OSI REFERENCE MODEL higher level protocols lower level protocols or network services higher level protocols lower level protocols or network services Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer...
View Full Document

Page1 / 9

Note-13 - CSE 494/598 Forensic Computing: Computer and...

This preview shows document pages 1 - 4. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online