Large scale cross-drive correlation of digital media
Bruaene, Joseph Van
MetadataShow full item record
Traditional digital forensic practices have focused on individual hard disk analysis. As the digital universe continues to grow, and cyber crimes become more prevalent, the ability to make large scale cross-drive correlations among a large corpus of digital media becomes increasingly important. We propose a methodology that builds on bulk-analysis techniques to avoid operating system- and file-system specific parsing. In addition, we apply document similarity methods to forensic artifact correlation. By representing each disk image as a set of hash values corresponding to the 512-byte sectors on the disk, and calculating pair-wise similarity scores between hard disk images, we analyze a collection of disk images taken from various storage devices purchased from the secondary market. We conclude sector-based matching is sufficient to identify images in our dataset that share common DLLs, indicating similarity in their operating systems.We present a visualization of our results as an undirected graph with similarity scores represented as edge weights, and observe that disk images with common operating systems tend to align with graph clusters. Though no common set of sectors is present on all drives—even among the large fully-connected component in our graph—we find that grouping our dataset into subsets with the same operating system version does reveal sizable collections of common sectors, and achieved the best correlation between sector matches and high-level similarities in our dataset. Extending this technique to a larger dataset and continuing our investigation of the cause of sector-level matches could yield an automated method of profiling new disk images during the triage process. Moreover, this technique could be used to corroborate deductions regarding characteristics of information systems associated with target media.
RightsThis publication is a work of the U.S. Government as defined in Title 17, United States Code, Section 101. Copyright protection is not available for this work in the United States.
Showing items related by title, author, creator and subject.
Empirical Study Of Drive-By-Download Spyware Barwinski, Mark; Irvine, Cynthia E.; Levin, Tim E. (International Common Criteria Conference, 2006-00-00);The ability of spyware to circumvent common security practices, surreptitiously exporting confidential information to remote parties and illicitly consuming system resources, is a rising security concern in government, ...
Improving sector hash carving with rule-based and entropy-based non-probative block filters Gutierrez-Villarreal, Francisco Javier (Monterey, California: Naval Postgraduate School, 2015-03);Digital forensic investigators have traditionally used file hashes to identify known content on searched media. Recently, sector hashing has been proposed as an alternative identification method, in which files are broken ...
INFERRING ICE BASAL ROUGHNESS FROM HIGH RESOLUTION SYNTHETIC APERTURE RADAR SATELLITE IMAGERY Green, Terrance O., Sr. (Monterey, CA; Naval Postgraduate School, 12);During the past decade, direct measurements of ocean turbulent friction velocity and current velocity profiles have been conducted in polar regions using Autonomous Ocean Flux Buoys (AOFBs). Recent use of Synthetic Aperture ...