• No results found

IT-Incident Management & IT-Forensics

N/A
N/A
Protected

Academic year: 2021

Share "IT-Incident Management & IT-Forensics"

Copied!
7
0
0

Loading.... (view fulltext now)

Full text

(1)

Oliver Göbel, Dirk Schadt, Sandra Frings, Hardo Hase, Detlef

Günther, Jens Nedon (Eds.)

IT-Incident Management & IT-Forensics

Conference Proceedings

October, 18th – 19th, 2006

Stuttgart, Germany

Special Interest Group

Security – Intrusion Detection and Response (SIDAR)

(2)

Lecture Notes in Informatics (LNI) - Proceedings Series of the Gesellschaft für Informatik (GI) Volume P-97

ISBN 978-3-88579-191-1 ISSN 1617-5468

Volume Editors Oliver Göbel

Stabsstelle DV-Sicherheit der Universität Stuttgart (RUS-CERT) Breitscheidstraße 2, 70197 Stuttgart, Germany

Email: goebel@cert.uni-stuttgart.de Dirk Schadt

Computer Associates GmbH, Darmstadt, Germany Sandra Frings

Fraunhofer Institut für Arbeitswirtschaft und Organisation IAO, Stuttgart, Germany Hardo Hase

IT-Consulting Hardo G. Hase, Bexbach, Germany Detlef Günther

Volkswagen AG, CERT-VW, Wolfsburg, Germany Jens Nedon

ConSecur GmbH, Meppen, Germany Series Editorial Board

Heinrich C. Mayr, Universität Klagenfurt, Austria (Chairman, mayr@ifit.uni-klu.ac.at) Jörg Becker, Universität Münster, Germany

Ulrich Furbach, Universität Koblenz, Germany

Axel Lehmann, Universität der Bundeswehr München, Germany Peter Liggesmeyer, TU Kaiserslautern und Fraunhofer IESE, Germany Ernst W. Mayr, Technische Universität München, Germany

Heinrich Müller, Universität Dortmund, Germany

Heinrich Reinermann, Hochschule für Verwaltungswissenschaften Speyer, Germany Karl-Heinz Rödiger, Universität Bremen, Germany

Sigrid Schubert, Universität Siegen, Germany Dissertations

Dorothea Wagner, Universität Karlsruhe, Germany Seminars

(3)

1

Preface

Information   technology   has   become   crucial   to   almost   every   part   of   society.   IT  infrastructures are critical to the world­wide economy, the financial sector, the health  sector, the government's administration, the military, and the educational sector. Due to  its importance the disruption or loss of IT capabilities results in a massive reduction of  operability. 

Hence,   IT   security   is   continously   gaining   importance   and   has   become   technically  essential to IT infrastructures.

Although   security   usually   gets   integrated   into   the   design   process   of   IT   systems  nowadays, the process of maintaining security in IT infrastructure operation still lacks  the appropriate attendance in most cases. 

Especially   the   capability   to   manage   and   respond   to   IT   security   incidents   and   their  forensic analysis is established in the rarest cases. The quickly rising number of security  incidents  worldwide makes  the implementation of incident management  capabilities,  targeting the mitigation of  immediate consequences to the own infrastructure, essential.  Also, the need of subsequent forensic analysis of selected cases to gather evidence on the  incident's details and work up the information for law suits or to avert unwarranted  liability claims of aggrieved third parties is constantly growing.

In order to advance the fields of IT­Incident Management and IT­Forensics the special  interest group  Security ­ Intrusion Detection and Response  (SIDAR) of the German  Informatics Society (GI) organises the annual  International Conference on IT­Incident  Management and IT­Forensics  (IMF), bringing together experts from throughout the  world, to discuss state of the art in these areas. IMF promotes collaboration and exchange  of ideas between industry, academia, law­enforcement and other government bodies.  IMF 2006 is supported with keynotes by the German Federal Ministry of the Interior  (BMI) and the US National Institute of Standards and Technology (NIST). The organising committee would like to thank all persons who helped in realising the  conference, especially the authors whose papers and presentations make the essence of  the conference, the members of the program committee who reviewed and evaluated the  papers submitted and whose professional competence ensures the scientific quality of the  program, as well as the sponsors who supported the conference. Oliver Göbel, Sandra Frings, Detlef Günther, Hardo Hase Jens Nedon and Dirk Schadt  

(4)

Program Committee

Henrik Becker Kanzlei Becker, Germany Vlasti Broucek University of Tasmania, Australia Ian Bryant NISCC, UK

Brian Carrier CERIAS, USA Andrew Cormack UKERNA, UK Herve Debar France Telecom, France Ralf Dörrie Telekom CERT, Germany

Maximilian Dornseif University of Mannheim, Germany Ulrich Emmert esb Rechtsanwälte Stuttgart, Germany Günther Ennen BSI/CERT-Bund, Germany

Christoph Fischer BFK-Consulting, Germany Sandra Frings Fraunhofer IAO, Germany

Oliver Göbel RUS-CERT, Universität Stuttgart, Germany Dieter Gollmann TU Hamburg-Harburg, Germany Detlef Günther Cert-VW, Volkswagen AG, Germany Bernhard Hämmerli ACRIS GmbH, Switzerland Hardo G. Hase, IT-Consulting Hardo G. Hase, Germany Mark Hoekstra IT Forensic BV, Netherlands

Klaus Peter Kossakowski, DFN-CERT, Germany

Thorsten Lieb Avocado Rechtsanwälte Frankfurt, Germany Jim Lyle NIST CFTT, USA

Neil Mitchison Joint Reseach Centre, EU Jens Nedon Consecur GmbH, Germany Jason Rafail CERT/CC, USA

Damir Rajnovic CISCO-PSIRT, USA Gavin Reid CISCO-INFOSEC, USA Dirk Schadt CA, Germany

Christian Schaller SIEMENS-CERT, Germany Rolf Schulz gnsec, Germany Marco Thorbruegge ENISA, EU

(5)

Organising Committee

General chair: Dirk Schadt, CA, Germany

Hardo G. Hase, IT-Consulting Hardo G. Hase, Germany Sandra Frings, Fraunhofer IAO, Germany

Oliver Göbel, RUS-CERT, Universität Stuttgart, Germany Detlef Günther, Volkswagen AG, Germany

Jens Nedon, Consecur GmbH, Germany

Program Chair: Oliver Göbel, RUS-CERT, Universität Stuttgart, Germany,goebel @ cert.uni-stuttgart.de

Sponsor Chair: Dirkdirk.schadt @ gmail.comSchadt, CA, Germany,

(6)

Keynotes

Dr. Stefan Grosse

Bundesministerium des Inneren (BMI) der Bundesrepublik Deutschland

James R. Lyle

National Institute of Standards and Technology (NIST)

The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary

Invited Speaker

Andrea Rigioni Symantec Corp.

(7)

Table of Contents

The Contribution of Tool Testing to the Challenge of Responding to an IT Adversary (Keynote)

(JimLyle)...6 Incident Response and the Role of External Services (Invited Speech)

(Andrea Rigioni)...14 Technical Development of Cyber Crime

(Rolf Schulz)...23 Establishing a Centre for Information Security: Experiences from the Trial Period and Recommendations to Similar Initiatives

(Maria B. Line, Lillian Røstad)...43 CarmentiS: A Co-Operative Approach Towards Situation Awareness and Early Warning for the Internet

(Bernd Grobauer, Jens Ingo Mehlau, Jürgen Sander)...55 Effectiveness of Proactive CSIRT Services

(Johannes Wiik, Jose J. Gonzalez, Klaus-Peter Kossakowski)...67 A Distributed Security Announcement Authoring System with CAIF Support

(Anselm R. Garbe, Oliver Goebel)...82 Automated Resolving of Security Incidents as a Key Mechanism to Fight Massive Infections of Malicious Software

(Jochen Kaiser, Alexander Vitzthum, Peter Holleczek, Falco Dressler)...92 Pool Allocations as an Information Source in Windows Memory Forensics

(Andreas Schuster)...104 A Comparative Study of Teaching Forensics at a University Degree Level

(Philip Anderson, Maximilian Dornseif, Felix C. Freiling, Thorsten Holz, AlastrairIrons, Christopher Laing, Martin Mink)...116 Monitoring of Incident Response Management Performance

(Maria B. Line, Eirik Albrechtsen, Stig Ole Johnsen, Odd Helge Longva, Stefanie Hillen)...128 Detecting New Patterns of Attacks – Results and Applications of Large Scale Sensoring Networks

(Thorsten Voss, Klaus-Peter Kossakowski)...144

References

Related documents

The main …nding of this paper is that the frameworks of Obstfeld and Rogo¤ (1995), Corsetti and Pesenti (2001), and Tille (2001) in the end gen- erate a common result: A monetary

In terms of species richness, the Deomali hills was found to be the most diverse in terms of bryophytes followed by Similipal biosphere reserve, Mahendragiri hills, Niyamgiri hills,

520408 General Office Occupations and Clerical Services 520302 Accounting Technology/Technician & Bookkeeping Finance. 120401 Cosmetology/Cosmetologist, General

Cable companies increase sponsorship activity to promote new products, support local positioning and gain content for video-on-demand service.. New product offerings and

My name is John Githinji Maina, a Master of Business Administration (MBA) student at the University of Nairobi conducting research on the competitive strategies adopted by

Table 5-7: Demographic Characteristics of Those Who Usually Pay Off Their Credit Card Balances Each Month by Type of Card: American Express, Visa, MasterCard (US Adult Population)

From the figures, we can see the improved algorithm QPSO in this section, to a certain extent, overcomes the defect of the particle swarm optimization algorithm in the premature

The corrosion rate is often considered to be directly linked to the degree of corrosiveness of the current fuel mix being burnt. However, the corrosion attack is also affected by the