11.01.2017 Views

A Technical History of the SEI

ihQTwP

ihQTwP

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Digital Intelligence and Investigation Methods and Tools<br />

The Challenge: Effective and Efficient Cyber Forensics<br />

Traditional approaches are insufficient for investigating crimes committed through computers.<br />

Early digital forensic tools and techniques were helpful when <strong>the</strong> amount <strong>of</strong> data stored on computers<br />

could be examined fully; however, <strong>the</strong>y became insufficient when <strong>the</strong> scope, frequency,<br />

and complexity <strong>of</strong> cybercrimes significantly increased. As a result, federal law enforcement agencies<br />

soon faced a backlog <strong>of</strong> digital evidence to analyze and a volume <strong>of</strong> data that could not be examined<br />

effectively with <strong>the</strong> commercial tools available. The attacks <strong>the</strong>y now investigate have become<br />

more complex and are perpetrated by sophisticated attackers, who <strong>of</strong>ten use encryption and<br />

o<strong>the</strong>r means to obscure <strong>the</strong>ir activities. Additionally, system administrators need to understand attacks<br />

on <strong>the</strong>ir systems and preserve evidence in a way that holds up in court.<br />

A Solution: Tools and Methods that Improve <strong>the</strong> State <strong>of</strong> <strong>the</strong> Practice<br />

The <strong>SEI</strong> forensics experts develop highly specialized computer forensics and incident response<br />

“gap area” tools and practices not addressed by commercial tools or standard techniques (see <strong>the</strong><br />

report by Waits [Waits 2008], for example) and provide <strong>the</strong>m to <strong>the</strong> DoD and U.S. federal civilian<br />

law enforcement agencies. Thus, <strong>the</strong> <strong>SEI</strong> equips federal law enforcement investigators to efficiently<br />

and effectively handle cyber attacks, from collecting evidence to apprehending and convicting<br />

<strong>the</strong> perpetrators. Because <strong>SEI</strong> forensics experts work on incidents involving national security<br />

and assist with large-scale criminal cases, <strong>the</strong>y gain <strong>the</strong> essential field experience that helps<br />

<strong>the</strong>m identify <strong>the</strong> areas that need to be addressed, and <strong>the</strong>ir close working relationship with law<br />

enforcement gives <strong>the</strong>m <strong>the</strong> insight <strong>the</strong>y need to focus <strong>the</strong>ir efforts.<br />

Because <strong>the</strong> scale <strong>of</strong> incidents and <strong>the</strong> amount <strong>of</strong> data prevents investigators from examining all<br />

data, <strong>the</strong> <strong>SEI</strong> has identified triage strategies and automated tools for computer and data acquisition<br />

that result in actionable information and evidence that has proven to hold up in court. Because a<br />

criminal can commit a crime and disappear before traditional response approaches can be implemented,<br />

<strong>the</strong> <strong>SEI</strong> identifies techniques for rapid response without jeopardizing sensitive data. The<br />

<strong>SEI</strong> developed its first forensics support tool, Aperio, in 2004-2005. By 2012, six tools were<br />

freely available to system administrators, with an additional four provided to law enforcement<br />

only. 67 In addition, <strong>the</strong> <strong>SEI</strong> established and maintains a repository <strong>of</strong> Linux forensics tools 68 that<br />

are packaged for easy download and installation by any practitioner who must acquire and analyze<br />

data. O<strong>the</strong>r <strong>SEI</strong> advances include rapid triage and correlation <strong>of</strong> malicious code and network<br />

logs/traffic; new technologies to improve DoD investigators’ collection <strong>of</strong> intelligence from recovered<br />

media; new methods and techniques for forensic imaging <strong>of</strong> solid state drives; and tools<br />

for image and video analysis.<br />

The <strong>SEI</strong> developed <strong>the</strong> CERT Clustered-Computing Analysis Platform (C-CAP), a technological<br />

advance to address <strong>the</strong> need for forensics law enforcement analysts to work toge<strong>the</strong>r on cases,<br />

even if <strong>the</strong>y are geographically dispersed. <strong>SEI</strong> developers integrated access to a comprehensive<br />

array <strong>of</strong> analytical tools and resources. C-CAP is centrally managed, so platform resources can be<br />

67 Tool descriptions can be found at http://www.sei.cmu.edu/digitalintelligence/tools<br />

68 See http://www.cert.org/digital-intelligence/tools/linux-forensics-tools-repository.cfm<br />

CMU/<strong>SEI</strong>-2016-SR-027 | SOFTWARE ENGINEERING INSTITUTE | CARNEGIE MELLON UNIVERSITY 279<br />

Distribution Statement A: Approved for Public Release; Distribution is Unlimited.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!