EP3266185A1 - System und verfahren zum analysieren von forensischen daten in einem cloudsystem - Google Patents
System und verfahren zum analysieren von forensischen daten in einem cloudsystemInfo
- Publication number
- EP3266185A1 EP3266185A1 EP16718626.1A EP16718626A EP3266185A1 EP 3266185 A1 EP3266185 A1 EP 3266185A1 EP 16718626 A EP16718626 A EP 16718626A EP 3266185 A1 EP3266185 A1 EP 3266185A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- analysis unit
- unit
- forensic data
- analysis
- cloud system
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
- 238000000034 method Methods 0.000 title claims abstract description 14
- 230000015654 memory Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 5
- 239000012491 analyte Substances 0.000 claims 1
- 150000001768 cations Chemical class 0.000 claims 1
- 230000005540 biological transmission Effects 0.000 abstract description 4
- 238000000605 extraction Methods 0.000 abstract 1
- 238000012546 transfer Methods 0.000 description 4
- 230000002085 persistent effect Effects 0.000 description 3
- 238000012217 deletion Methods 0.000 description 2
- 230000037430 deletion Effects 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000007792 addition Methods 0.000 description 1
- 239000000969 carrier Substances 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000001010 compromised effect Effects 0.000 description 1
- 230000001419 dependent effect Effects 0.000 description 1
- 125000002897 diene group Chemical group 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 230000006855 networking Effects 0.000 description 1
- 238000011160 research Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/30—Network architectures or network communication protocols for network security for supporting lawful interception, monitoring or retaining of communications or communication related information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/14—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/30—Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2101—Auditing as a secondary aspect
Definitions
- the present invention relates to a system for analyzing forensic data in a cloud system. Furthermore, the present invention relates to a method and analyzed ⁇ ren of forensic data in a cloud system.
- This data includes, among other memory contents (RAM) contents of persistent storage media (hard disks) and recordings of network traffic potentially the security incident be ⁇ tetzten IT systems.
- RAM memory contents
- hard disks persistent storage media
- the over- causes transmission of data from the network of the provider out to ⁇ additional transfer costs.
- further mass memories are connected to the system to be analyzed, for example via local networks, they may not be detected during the acquisition of the forensic data of the system to be analyzed and consequently not evaluated.
- the data volume of such mass storage is too large to create a copy thereof for analysis in the context of security incidents or to transmit over networks.
- An analysis of the affected system remotely on the affected system can falsify the data to be analyzed, result in a high resource utilization of the system and provide evidence of an ongoing analysis to an active attacker.
- the si ⁇ chere deletion of personal and otherwise worthy of protection data after completion of the analysis due to the po ⁇ tentiell compromised environment is no longer guaranteed.
- forensic data is copied to portable data carriers, which were then sent by post for analysis.
- selected data for an online check is requested automatically (software agent) or manually (on-site personnel) for analysis, whereby relevant data for the analysis can be overlooked.
- Access data is provided to the analysts for the analysis of connected mass storage systems.
- An analysis of network traffic can be done through an existing infrastructure for recording the data.
- an infrastructure e.g. a packet sniffer, installed or configured. The mentioned problems regarding completeness and transmission of data volumes apply accordingly to the network traffic.
- an object of the present invention is to analyze forensic data in a simple and secure manner.
- a system for analyzing forensic data wherein the forensic data is in a cloud system.
- the system has an analysis unit to analyze forensic data, said analysis unit is arranged in the cloud system, and an operating unit for operating the analysis unit, wherein the control unit is arranged ent ⁇ removed from the analysis unit outside the cloud system.
- the analysis unit is moved directly into the vicinity, ie geographically or also with regard to the network topology and the operator, of the IT infrastructure to be examined.
- the forensic data can thus be examined in its original environment and need not be extracted from it and transmitted. In this way it can be prevented that there is a not distorted ⁇ research of forensic data because it can be analyzed in their original form.
- a forensic data can in this connection memory contents (RAM) contents of persistent Spei ⁇ chermedien (hard disks) and recordings of network traffic potentially involved in the security breach IT systems are understood.
- RAM connection memory contents
- Spei ⁇ chermedien hard disks
- a cloud system or a cloud environment can be understood to mean a system that has cloud storage and can also be used for hosting virtual systems and virtual networks.
- the analysis unit can analyze this forensic data, ie investigate whether this data has been manipulated, for example.
- the respective unit for example, analysis unit or Be ⁇ diene unit, can in terms of hardware and / or be implemented by software.
- the respective unit may be designed as a device or as part of a device, for example as a computer or as a microprocessor or as a control computer of a vehicle.
- the respective unit can be used as Computerprogrammpro ⁇ domestic product, as a function, as a routine, be formed as part of a program code or an executable object.
- the analysis unit is directly in the cloud system Loka ⁇ lmitter, whereas the operating unit has been removed, play, arranged to at ⁇ analysts of a workplace. This relieves the load on the network connections or WAN connections, since only small amounts of data in the range of 10 to 30 GB have to be transferred for the analysis of systems of any size (from the analysis unit to the operating unit and vice versa). Because of the proximity of the analysis station to mass storage systems, they can be used by analysts as local environments. Therefore, the restric ⁇ effect on pre-defined search patterns and time expenses for copying and transferring data omitted.
- the operating unit is to be directed ⁇ serve the analyzing unit via a remote access to be ⁇ .
- the operating unit can, for example, provide remote access to the analysis unit via a browser.
- the operating unit can visualize the analysis unit as a window on a display device, for example a screen, of a computer.
- the analysis unit is a virtualized analysis unit.
- a virtualized analysis unit is understood to mean an analysis unit that is arranged, ie stored, in the cloud system by a physically existing analysis unit as a virtualized variant.
- the analysis unit is based on a template.
- the analysis unit is set up to store storage units of the cloud system containing the forensic data to be analyzed as a local copy.
- the data stores to be examined can be connected to the analysis unit as a local copy by a corresponding configuration of the analysis unit.
- the analysis unit is set up to directly integrate storage units of the cloud system containing the forensic data to be analyzed.
- the analysis unit can directly access the Spei ⁇ cherajien, without having to additionally save locally.
- the analysis unit can integrate (mount) and access the memory units as separate memory units.
- the analysis unit is set up to locally store the forensic data to be analyzed in an encrypted memory area. Since the relevant data is stored in an encrypted storage area, a possibly active at ⁇ gripper not access them.
- the key can be randomly generated per analysis.
- the analysis unit and the control unit are adapted to communicate by means of a asym ⁇ metric authentication.
- All analyst identifiers transmitted between the operator panel and analyzer can use a public-private-key authentication method. Since there are no password-protected accesses, the security against ⁇ over an attacker is increased because this can not tap passwords.
- the analysis unit is configured to communicate with predefined units.
- the accessibility of the analysis ⁇ unit can be restricted to a defined list of devices.
- any devices eg an attacker, can not access the analysis unit and jeopardize or manipulate the analysis of the data.
- the analysis unit has limited visibility in the cloud system.
- the analysis unit is configured to monitor network traffic in the cloud system.
- local network traffic may be recorded in the cloud system.
- an analysis of the network traffic can be realized in real time.
- a method for analyzing forensic data is proposed, wherein the forensic data is present in a cloud system.
- the method comprises the following steps: analyzing the forensic data in an analysis unit, wherein the analysis unit is arranged in the cloud system, and operating the analysis unit by means of a control unit, wherein the control unit is located away from the analysis unit outside the cloud system.
- a computer program product which causes the execution of the method as explained above on a program-controlled device.
- a computer program product such as a computer program means may, for example, be used as a storage medium, e.g.
- FIG. 1 is a schematic block diagram of an embodiment of a system for analyzing forensic data
- FIG. 2 shows a schematic flow diagram of a method for analyzing forensic data.
- Fig. 1 shows a system 10 for analyzing forensic data.
- the forensic data are present in a cloud system 3, for example in various storage units or arithmetic units 4.
- the system 10 includes an analysis unit 1 for analyzing the forensic data.
- the analysis unit 1 is arranged directly in the cloud system 3.
- the analysis unit 1 can thus access the data in the cloud system 3 directly.
- the analysis unit for example, integrate the memory units 4.
- the analysis unit 1 can be operated by an analyst. This can be done, for example, via remote access.
- the analysis unit 1 can therefore examine the forensic data directly at its origin in the cloud system 3.
- Fig. 2 shows a method for analyzing forensic data. The method comprises the following steps.
- step 201 the forensic data are analyzed in the analysis unit 1, wherein the analysis unit 1 in the
- Cloud system 3 is arranged.
- step 202 the analysis unit 1 is operated by the control unit ⁇ 2, wherein the operating unit 2 is disposed away from the analysis unit 1 out of the cloud system.
- Steps 201 and 202 may be performed simultaneously or in a different order.
- the present invention has been described with reference to Principalsbei ⁇ games, it is versatile modifiable.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Computer And Data Communications (AREA)
- Automatic Analysis And Handling Materials Therefor (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
DE102015210203.3A DE102015210203A1 (de) | 2015-06-02 | 2015-06-02 | System und Verfahren zum Analysieren von forensischen Daten in einem Cloudsystem |
PCT/EP2016/058212 WO2016192880A1 (de) | 2015-06-02 | 2016-04-14 | System und verfahren zum analysieren von forensischen daten in einem cloudsystem |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3266185A1 true EP3266185A1 (de) | 2018-01-10 |
Family
ID=55809086
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP16718626.1A Withdrawn EP3266185A1 (de) | 2015-06-02 | 2016-04-14 | System und verfahren zum analysieren von forensischen daten in einem cloudsystem |
Country Status (5)
Country | Link |
---|---|
US (1) | US20180159886A1 (de) |
EP (1) | EP3266185A1 (de) |
CN (1) | CN107667371A (de) |
DE (1) | DE102015210203A1 (de) |
WO (1) | WO2016192880A1 (de) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10740151B1 (en) * | 2018-08-27 | 2020-08-11 | Amazon Technologies, Inc. | Parallelized forensic analysis using cloud-based servers |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140317681A1 (en) * | 2013-03-15 | 2014-10-23 | Jon Rav Gagan Shende | Cloud forensics |
Family Cites Families (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8583915B1 (en) * | 2007-05-31 | 2013-11-12 | Bby Solutions, Inc. | Security and authentication systems and methods for personalized portable devices and associated systems |
US8990583B1 (en) * | 2007-09-20 | 2015-03-24 | United Services Automobile Association (Usaa) | Forensic investigation tool |
US20140096208A1 (en) * | 2012-07-26 | 2014-04-03 | Mrk Networks, Inc. | Automated system and method for provisioning and managing cloud desktop services |
US9424432B2 (en) * | 2012-09-20 | 2016-08-23 | Nasdaq, Inc. | Systems and methods for secure and persistent retention of sensitive information |
US20140181975A1 (en) * | 2012-11-06 | 2014-06-26 | William Spernow | Method to scan a forensic image of a computer system with multiple malicious code detection engines simultaneously from a master control point |
CN103051707A (zh) * | 2012-12-20 | 2013-04-17 | 浪潮集团有限公司 | 一种基于动态用户行为的云取证方法及系统 |
CN103067502A (zh) * | 2012-12-31 | 2013-04-24 | 博彦科技(上海)有限公司 | 一种开发测试云的硬件系统 |
US9292698B1 (en) * | 2013-01-18 | 2016-03-22 | Andrew T. Cobb | Method and system for remote forensic data collection |
CN103152352B (zh) * | 2013-03-15 | 2016-02-10 | 北京邮电大学 | 一种基于云计算环境的全信息安全取证监听方法和系统 |
US10091276B2 (en) * | 2013-09-27 | 2018-10-02 | Transvoyant, Inc. | Computer-implemented systems and methods of analyzing data in an ad-hoc network for predictive decision-making |
EP3120286B1 (de) * | 2014-03-17 | 2019-07-17 | Proofpoint, Inc. | Verhaltensprofilerstellung für die erkennung von schadprogrammen |
US9356969B2 (en) * | 2014-09-23 | 2016-05-31 | Intel Corporation | Technologies for multi-factor security analysis and runtime control |
US10439650B2 (en) * | 2015-05-27 | 2019-10-08 | Quantum Corporation | Cloud-based solid state device (SSD) with dynamically variable error correcting code (ECC) system |
-
2015
- 2015-06-02 DE DE102015210203.3A patent/DE102015210203A1/de not_active Withdrawn
-
2016
- 2016-04-14 WO PCT/EP2016/058212 patent/WO2016192880A1/de active Application Filing
- 2016-04-14 EP EP16718626.1A patent/EP3266185A1/de not_active Withdrawn
- 2016-04-14 CN CN201680031980.9A patent/CN107667371A/zh active Pending
- 2016-04-14 US US15/574,590 patent/US20180159886A1/en not_active Abandoned
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140317681A1 (en) * | 2013-03-15 | 2014-10-23 | Jon Rav Gagan Shende | Cloud forensics |
Also Published As
Publication number | Publication date |
---|---|
CN107667371A (zh) | 2018-02-06 |
DE102015210203A1 (de) | 2016-12-08 |
US20180159886A1 (en) | 2018-06-07 |
WO2016192880A1 (de) | 2016-12-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3097506B1 (de) | Verfahren und system zur gewinnung und analyse von forensischen daten in einer verteilten rechnerinfrastruktur | |
DE112013000387B4 (de) | Dynamisches Abtasten einer Webanwendung durch Verwendung von Webdatenverkehrs- Informationen | |
DE60123672T2 (de) | Computersystemschutz | |
DE202019103185U1 (de) | Verteilte Deduplizierung von Paketen | |
DE102015002541A1 (de) | Verfahren und system zum bereitstellen eines effizienten verwundbarkeitsverwaltungs- und verifikationsdienstes | |
DE112014000584T5 (de) | Erreichen von Speichereffizienz bei durchgängiger Verschlüsselung unter Verwendung von nachgelagerten (Downstream-)Decryptern | |
EP2367128A1 (de) | Verfahren und Vorrichtung zur elektronischen Signatur | |
DE102012109212B4 (de) | Methoden, Vorrichtung und Herstellungsprodukte zur Bereitstellung von Firewalls für Prozesssteuerungssysteme | |
DE112013007160T5 (de) | Entwicklungsumgebungssystem, Entwicklungsumgebungsvorrichtung, Entwicklungsumgebungsbereitstellungsverfahren und Programm | |
DE112012000279T5 (de) | Ermitteln der Anfälligkeit von Computer-Software-Anwendungen gegenüber Rechteausweitungsangriffen | |
DE112013000485T5 (de) | Automatische Synthese von Einheitentests für Sicherheitstests | |
DE102006043363A1 (de) | System und Verfahren zum Erheben von Verkehrsdaten unter Verwendung von Sondierungsfahrzeugen | |
EP3925192B1 (de) | Verfahren und wiedergabeeinheit zur wiedergabe von gesicherten nachrichten | |
DE112011103415T5 (de) | Gefahrenerkennung für die Verwaltung von Anlagen | |
DE102017113147A1 (de) | Sicheres Zahlungsschutzverfahren und entsprechendes elektronisches Gerät | |
EP2551828B1 (de) | Verfahren und System zur Kontrolldatenübertragung zwischen einem Fahrzeugdatenaufzeichnungsgerät und einem Prüfgerät | |
DE102015206643A1 (de) | Vorrichtung und Verfahren zum Erzeugen eines Schlüssels in einem programmierbaren Hardwaremodul | |
DE112022000137T5 (de) | Aufzugszubehör-Authentifizierungsverfahren, System, Server und Speichermedium | |
EP3266185A1 (de) | System und verfahren zum analysieren von forensischen daten in einem cloudsystem | |
DE102014225418A1 (de) | Verfahren und Vorrichtung zur Überwachung einer Zertifizierungsstelle | |
WO2001098899A2 (de) | Serverüberwachung | |
DE102021123255A1 (de) | Datenverarbeitungssystem mit mindestens einem Server (S) als Zielsystem | |
DE102014213454A1 (de) | Verfahren und System zur Erkennung einer Manipulation von Datensätzen | |
DE19734585C2 (de) | Verfahren und Vorrichtung zur Überwachung von Informationsflüssen in Computersystemen | |
DE102021125851A1 (de) | Problemmanagement in einem benutzersystem |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20171006 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20190925 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE APPLICATION IS DEEMED TO BE WITHDRAWN |
|
18D | Application deemed to be withdrawn |
Effective date: 20220726 |