110 likes | 209 Vues
The demand for effective computer forensics training is continuously increasing, necessitating innovative educational approaches. This workshop presentation focuses on the development of FALCON (Framework for Laboratory exercises Conducted Over Networks), which aims to streamline and automate the creation and evaluation of realistic lab scenarios for students. By providing detailed target machines and interactive environments, FALCON enhances student engagement and skills in forensic investigation. The paper discusses architecture, tools, preliminary results, and future improvements for effective teaching in digital forensics.
E N D
Frank Adelstein ATC-NY 33 Thornwood Drive, Suite 500 Ithaca, NY 14850 Contact: frank@atc-nycorp.com Yun Gao Golden G. Richard III Department of Computer Science University of New Orleans New Orleans, LA 70148 Contact: golden@cs.uno.edu Automatically Creating Realistic Targets for Digital Forensics Investigation August 17, 2005 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
Abstract • The need for computer forensics education continues to grow. • An essential component of training is hands-on, realistic assignments. • Creating detailed, realistic lab is a difficult task. • FALCON (Framework for Laboratory exercises Conducted Over Networks) 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
1. Introduction • Keywords: computer forensics, computer security, education • Computer forensic training schools. • The weakness of the computer forensics education • FALCON cycle. 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
Figure 1: FALCON and the lab development process 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
2. FALCON Architecture • 2.1 Lab Creation Tool(LCT) • To automatically configure a set of target machines • Allow an instructor to carefully specify the types of activity. 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
2.2 Lab Execution Environment • To provide an interactive environment. • Set up scenarios on virtual target machines for the students to investigate. • Support the forensic investigation itself. • Logging the activities of the students. • OnLine DFS 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
2.3 Lab Evaluation Tool • Use to evaluate a laboratory exercise. • Help evaluate performance. • Provide details on what actions students took. • Use to gather information to gauge the level of difficulty of the lab. (e.g. time spent) 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
3. Preliminary Results • All students complete the assignments. 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
Figure 2: Network configuration in proof-of-concept experiment. 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
4. Conclusions and Future Work • To provide adequate training to students of digital forensics. • An architecture for the creation, deployment, and evaluation of laboratory exercises to support education. • Future -To improve the education in digital forensics. -To get feedback from the students. 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA
5. References • [1] Sleuthkit and Autopsy, http://www.sleuthkit.org. • [2] Encase forensics software, http://www.encase.com. • [3] Forensics Toolkit (FTK), http://www.accessdata.com. • [4] iLook Investigator forensic software, http://www.ilook-forensics.org/. • [5] SMART forensics software, http://www.asrdata.com/SMART/. • [6] F. Adelstein, “MFP: The Mobile Forensics Platform,” Proceedings of the 2002 Digital Forensics Research Workshop, http://www.dfrws.org. • [7] F. Adelstein, “MFP: The Mobile Forensic Platform,” International Journal of Digital Evidence, 2(1), 2003. • [8] E. Casey, Digital Evidence and Computer Crime, Academic Press, 2nd Edition, March 2004. • [9] E. Casey, Handbook of Computer Crime Investigation: Forensic Tools & Technology, Academic Press, October 2001, pp. 2-3. • [10] E. Casey, “Network traffic as a source of evidence: tool strengths, weak- nesses, and future needs,” Digital Investiga- tion, 1(1), Elsevier, 2004, pp. 28-43. • [11] P. Sealey, “Remote forensics,” Digi- tal Investigation, 1(4), Elsevier, 2004, pp. 261-265. 2005 Digital Forensic Research Workshop (DFRWS) New Orleans, LA