Loading…
WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach
Anti-forensics attempts to prevent the forensic investigator from analyzing the evidence by tampering with it. Artifact wiping is one of the prominently used anti-forensic approaches. In artifact wiping, the adversaries use wiping tools to wipe the traces of their activity left behind as a part of t...
Saved in:
Main Authors: | , , |
---|---|
Format: | Conference Proceeding |
Language: | English |
Subjects: | |
Online Access: | Request full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | |
---|---|
cites | |
container_end_page | 1703 |
container_issue | |
container_start_page | 1695 |
container_title | |
container_volume | |
creator | Sanda, Pranitha Pawar, Digambar Vedala, Radha |
description | Anti-forensics attempts to prevent the forensic investigator from analyzing the evidence by tampering with it. Artifact wiping is one of the prominently used anti-forensic approaches. In artifact wiping, the adversaries use wiping tools to wipe the traces of their activity left behind as a part of their execution. Thereby leading to the investigation of incomplete and unreliable evidential artifacts. On the other hand, a wiper attack is one of the most destructive cyberattacks as it causes permanent damage to the data by overwriting the original content. It has serious consequences on national and international security. These attacks have targeted government organizations, financial institutions, and energy sectors in recent years, causing loss of sensitive data, significant downtime, financial losses, and reputation damage. In both scenarios, detecting wiping to mitigate its effect becomes crucial. In this paper, we detect wiper attacks using the Sequence of System-calls (SoS) and information theory metrics and analyze the behavior of the benign and wiping process. Finally, we demonstrate the application of the proposed model by simulating the wiping process on a system and detect wiping. The results show that the proposed model detects wiping accurately. |
doi_str_mv | 10.1109/TrustCom60117.2023.00231 |
format | conference_proceeding |
fullrecord | <record><control><sourceid>ieee_CHZPO</sourceid><recordid>TN_cdi_ieee_primary_10538596</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>10538596</ieee_id><sourcerecordid>10538596</sourcerecordid><originalsourceid>FETCH-LOGICAL-i134t-daf1c16c1bbcb61ab00402921eee719956b528996c16acbd4c2ac1b2b06ab7e3</originalsourceid><addsrcrecordid>eNotTlFLwzAYjILgmP0HPuQPpH5f0qSNb6VzKgwUV9jjSLJMI11bmuxh_96KwnHHwd1xhFCEHBH0QzudY2qGkwLEMufARQ4z4RXJdKkrIUFUqLW4JgsueME0oLglWYzfACA4FFjJBXnfhZXfPtJdGEP_SVc-eZfC0NNz_PXbS0z-xJzpukgZrfsZKbD1MPk-Bkc_fAwxmT7RehynwbivO3JzNF302b8uSbt-apsXtnl7fm3qDQsoisQO5ogOlUNrnVVoLEABXHP03pfzbams5JXWc0IZZw-F42YOcwvK2NKLJbn_mw1zYT9O4WSmyx5BikpqJX4AbpZSGA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach</title><source>IEEE Xplore All Conference Series</source><creator>Sanda, Pranitha ; Pawar, Digambar ; Vedala, Radha</creator><creatorcontrib>Sanda, Pranitha ; Pawar, Digambar ; Vedala, Radha</creatorcontrib><description>Anti-forensics attempts to prevent the forensic investigator from analyzing the evidence by tampering with it. Artifact wiping is one of the prominently used anti-forensic approaches. In artifact wiping, the adversaries use wiping tools to wipe the traces of their activity left behind as a part of their execution. Thereby leading to the investigation of incomplete and unreliable evidential artifacts. On the other hand, a wiper attack is one of the most destructive cyberattacks as it causes permanent damage to the data by overwriting the original content. It has serious consequences on national and international security. These attacks have targeted government organizations, financial institutions, and energy sectors in recent years, causing loss of sensitive data, significant downtime, financial losses, and reputation damage. In both scenarios, detecting wiping to mitigate its effect becomes crucial. In this paper, we detect wiper attacks using the Sequence of System-calls (SoS) and information theory metrics and analyze the behavior of the benign and wiping process. Finally, we demonstrate the application of the proposed model by simulating the wiping process on a system and detect wiping. The results show that the proposed model detects wiping accurately.</description><identifier>EISSN: 2324-9013</identifier><identifier>EISBN: 9798350381993</identifier><identifier>DOI: 10.1109/TrustCom60117.2023.00231</identifier><identifier>CODEN: IEEPAD</identifier><language>eng</language><publisher>IEEE</publisher><subject>anti-forensics ; digital forensics ; Entropy ; Forensics ; Government ; Measurement ; Privacy ; Reliability theory ; Resistance ; system calls ; wiper attacks ; wiping</subject><ispartof>2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023, p.1695-1703</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/10538596$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,776,780,785,786,27904,54534,54911</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/10538596$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Sanda, Pranitha</creatorcontrib><creatorcontrib>Pawar, Digambar</creatorcontrib><creatorcontrib>Vedala, Radha</creatorcontrib><title>WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach</title><title>2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)</title><addtitle>TRUSTCOM</addtitle><description>Anti-forensics attempts to prevent the forensic investigator from analyzing the evidence by tampering with it. Artifact wiping is one of the prominently used anti-forensic approaches. In artifact wiping, the adversaries use wiping tools to wipe the traces of their activity left behind as a part of their execution. Thereby leading to the investigation of incomplete and unreliable evidential artifacts. On the other hand, a wiper attack is one of the most destructive cyberattacks as it causes permanent damage to the data by overwriting the original content. It has serious consequences on national and international security. These attacks have targeted government organizations, financial institutions, and energy sectors in recent years, causing loss of sensitive data, significant downtime, financial losses, and reputation damage. In both scenarios, detecting wiping to mitigate its effect becomes crucial. In this paper, we detect wiper attacks using the Sequence of System-calls (SoS) and information theory metrics and analyze the behavior of the benign and wiping process. Finally, we demonstrate the application of the proposed model by simulating the wiping process on a system and detect wiping. The results show that the proposed model detects wiping accurately.</description><subject>anti-forensics</subject><subject>digital forensics</subject><subject>Entropy</subject><subject>Forensics</subject><subject>Government</subject><subject>Measurement</subject><subject>Privacy</subject><subject>Reliability theory</subject><subject>Resistance</subject><subject>system calls</subject><subject>wiper attacks</subject><subject>wiping</subject><issn>2324-9013</issn><isbn>9798350381993</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2023</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><recordid>eNotTlFLwzAYjILgmP0HPuQPpH5f0qSNb6VzKgwUV9jjSLJMI11bmuxh_96KwnHHwd1xhFCEHBH0QzudY2qGkwLEMufARQ4z4RXJdKkrIUFUqLW4JgsueME0oLglWYzfACA4FFjJBXnfhZXfPtJdGEP_SVc-eZfC0NNz_PXbS0z-xJzpukgZrfsZKbD1MPk-Bkc_fAwxmT7RehynwbivO3JzNF302b8uSbt-apsXtnl7fm3qDQsoisQO5ogOlUNrnVVoLEABXHP03pfzbams5JXWc0IZZw-F42YOcwvK2NKLJbn_mw1zYT9O4WSmyx5BikpqJX4AbpZSGA</recordid><startdate>20231101</startdate><enddate>20231101</enddate><creator>Sanda, Pranitha</creator><creator>Pawar, Digambar</creator><creator>Vedala, Radha</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>20231101</creationdate><title>WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach</title><author>Sanda, Pranitha ; Pawar, Digambar ; Vedala, Radha</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i134t-daf1c16c1bbcb61ab00402921eee719956b528996c16acbd4c2ac1b2b06ab7e3</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2023</creationdate><topic>anti-forensics</topic><topic>digital forensics</topic><topic>Entropy</topic><topic>Forensics</topic><topic>Government</topic><topic>Measurement</topic><topic>Privacy</topic><topic>Reliability theory</topic><topic>Resistance</topic><topic>system calls</topic><topic>wiper attacks</topic><topic>wiping</topic><toplevel>online_resources</toplevel><creatorcontrib>Sanda, Pranitha</creatorcontrib><creatorcontrib>Pawar, Digambar</creatorcontrib><creatorcontrib>Vedala, Radha</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Xplore</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Sanda, Pranitha</au><au>Pawar, Digambar</au><au>Vedala, Radha</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach</atitle><btitle>2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom)</btitle><stitle>TRUSTCOM</stitle><date>2023-11-01</date><risdate>2023</risdate><spage>1695</spage><epage>1703</epage><pages>1695-1703</pages><eissn>2324-9013</eissn><eisbn>9798350381993</eisbn><coden>IEEPAD</coden><abstract>Anti-forensics attempts to prevent the forensic investigator from analyzing the evidence by tampering with it. Artifact wiping is one of the prominently used anti-forensic approaches. In artifact wiping, the adversaries use wiping tools to wipe the traces of their activity left behind as a part of their execution. Thereby leading to the investigation of incomplete and unreliable evidential artifacts. On the other hand, a wiper attack is one of the most destructive cyberattacks as it causes permanent damage to the data by overwriting the original content. It has serious consequences on national and international security. These attacks have targeted government organizations, financial institutions, and energy sectors in recent years, causing loss of sensitive data, significant downtime, financial losses, and reputation damage. In both scenarios, detecting wiping to mitigate its effect becomes crucial. In this paper, we detect wiper attacks using the Sequence of System-calls (SoS) and information theory metrics and analyze the behavior of the benign and wiping process. Finally, we demonstrate the application of the proposed model by simulating the wiping process on a system and detect wiping. The results show that the proposed model detects wiping accurately.</abstract><pub>IEEE</pub><doi>10.1109/TrustCom60117.2023.00231</doi><tpages>9</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | EISSN: 2324-9013 |
ispartof | 2023 IEEE 22nd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2023, p.1695-1703 |
issn | 2324-9013 |
language | eng |
recordid | cdi_ieee_primary_10538596 |
source | IEEE Xplore All Conference Series |
subjects | anti-forensics digital forensics Entropy Forensics Government Measurement Privacy Reliability theory Resistance system calls wiper attacks wiping |
title | WiDeS: Wiping Detection using System-calls - An Anti-Forensic Resistant Approach |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-21T14%3A33%3A17IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_CHZPO&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=WiDeS:%20Wiping%20Detection%20using%20System-calls%20-%20An%20Anti-Forensic%20Resistant%20Approach&rft.btitle=2023%20IEEE%2022nd%20International%20Conference%20on%20Trust,%20Security%20and%20Privacy%20in%20Computing%20and%20Communications%20(TrustCom)&rft.au=Sanda,%20Pranitha&rft.date=2023-11-01&rft.spage=1695&rft.epage=1703&rft.pages=1695-1703&rft.eissn=2324-9013&rft.coden=IEEPAD&rft_id=info:doi/10.1109/TrustCom60117.2023.00231&rft.eisbn=9798350381993&rft_dat=%3Cieee_CHZPO%3E10538596%3C/ieee_CHZPO%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-i134t-daf1c16c1bbcb61ab00402921eee719956b528996c16acbd4c2ac1b2b06ab7e3%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=10538596&rfr_iscdi=true |