Agile Approach for IT Forensics Management

07/08/2020
by   Matthias Schopp, et al.
0

The forensic investigation of cyber attacks and IT incidents is becoming increasingly difficult due to increasing complexity and intensify networking. Especially with Advanced Attacks (AT) like the increasing Advanced Persistent Threats an agile approach is indispensable. Several systems are involved in an attack (multi-host attacks). Current forensic models and procedures show considerable deficits in the process of analyzing such attacks. For this purpose, this paper presents the novel flower model, which uses agile methods and forms a new forensic management approach. In this way, the growing challenges of ATs are met. In the forensic investigation of such attacks, big data problems have to be solved due to the amount of data that needs to be analyzed. The proposed model meets this requirement by precisely defining the questions that need to be answered in an early state and collecting only the evidence usable in court proceedings that is needed to answer these questions. Additionally, the novel flower model for AT is presented that meets the different phases of an investigation process.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
03/07/2020

ATHAFI: Agile Threat Hunting And Forensic Investigation

Attackers rapidly change their attacks to evade detection. Even the most...
research
04/05/2019

Using the agile adoption framework to assess agility and guide improvements

Agility implies a set of principles that need to be followed in order to...
research
04/30/2019

An Argumentation-Based Approach to Assist in the Investigation and Attribution of Cyber-Attacks

We expect an increase in frequency and severity of cyber-attacks that co...
research
03/31/2021

Digital Forensics vs. Anti-Digital Forensics: Techniques, Limitations and Recommendations

The number of cyber attacks has increased tremendously in the last few y...
research
11/14/2018

A Game Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats

Advanced Persistent Threats (APTs) infiltrate cyber systems and compromi...
research
04/21/2022

Agile data management in NAV: A Case Study

To satisfy the need for analytical data in the development of digital se...
research
10/04/2018

PIMS: A Partitioning-Based Intrusion Management System for Relational Databases

Data-intensive applications exhibit increasing reliance on Database Mana...

Please sign up or login with your details

Forgot password? Click here to reset