25.12.2014 Views

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

Analysis and Evaluation of the Windows Event Log - Bill Buchanan

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Barrie Codona, BSc (Hons) Network Computing, 2007<br />

A centralised log server brings with it many advantages, Westphal (2001) points out<br />

some <strong>of</strong> <strong>the</strong>se advantages, centralised management <strong>of</strong> log files, maximised disk space<br />

usage, easier access for auditing purposes <strong>and</strong> a more secure method <strong>of</strong> retention. As<br />

well, adding encryption <strong>and</strong> check summing on top <strong>of</strong> a remote logging server adds<br />

yet ano<strong>the</strong>r layer <strong>of</strong> security on <strong>the</strong>se log files, which is always an advantage. The<br />

problem with this solution is that <strong>the</strong> data is venerable while it is travelling along <strong>the</strong><br />

network to <strong>the</strong> log repository. Dario Forte, <strong>of</strong> Milan University, explains:<br />

“<strong>Log</strong> file integrity can be violated in several ways. An attacker might<br />

take advantage <strong>of</strong> a non-encrypted transmission channel between <strong>the</strong><br />

acquisition <strong>and</strong> destination points to intercept <strong>and</strong> modify <strong>the</strong> transiting<br />

log. He might also spo<strong>of</strong> <strong>the</strong> IP sending <strong>the</strong> logs, making <strong>the</strong> log<br />

machine think it is receiving log entries <strong>and</strong> files that actually come<br />

from a different source.” Forte (2005).<br />

The general consensus is that a centralised log management system should be used to<br />

store, not only <strong>Windows</strong> event logs, but all <strong>the</strong> logs that are generated by all <strong>the</strong><br />

devices on <strong>the</strong> network, <strong>and</strong> that this log server should be connected to an<br />

au<strong>the</strong>ntication server.<br />

Alles (2004) have identified that a major problem is corporate fraud that is due to<br />

deliberate fraud between managers as this poses <strong>the</strong> greatest challenge to any audit<br />

system, <strong>the</strong>re really is not any point in <strong>the</strong> best encryption <strong>and</strong> <strong>the</strong> best au<strong>the</strong>ntication<br />

servers if a corrupt manager can walk into <strong>the</strong> room where <strong>the</strong> logging server is being<br />

stored <strong>and</strong> gain access to <strong>the</strong> hard drive. So <strong>the</strong>y recommend a black-box log file,<br />

something that is similar to a flight data recorder that you would find in an aeroplane<br />

<strong>and</strong> that <strong>the</strong> black box needs to be kept <strong>of</strong>fsite <strong>and</strong> away from anyone that may want<br />

to gain access to it.<br />

2.5 Conclusions<br />

This chapter has presented some <strong>of</strong> <strong>the</strong> techniques that forensic investigators are<br />

currently using to reconstruct a timeline <strong>of</strong> events using event logs. It has also<br />

highlighted some <strong>of</strong> <strong>the</strong> methods that are used to defeat such a forensic investigation.<br />

Finally it has highlighted some <strong>of</strong> <strong>the</strong> ways in which audit logs are currently being<br />

19

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!