Skip to main content

WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline Analysis

  • Conference paper
  • First Online:
Security, Privacy, and Anonymity in Computation, Communication, and Storage (SpaCCS 2017)

Abstract

Current forensic investigations have to process a large amount of collected data in a limited time. Moreover, we need to ensure collected data are not compromised before seizing suspects’ computers. For protecting evidences on important computers, this paper proposes a lightweight hypervisor that supports proactive collection and preservation of I/O logs. The proposed WaybackVisor automatically transfers all I/O logs of ATA drives to a Hadoop cluster. Our experiment showed the prototype implementation of WaybackVisor achieves write throughput of 79.7 MB/s. This paper also demonstrates timeline analysis functions for the I/O logs on the Hadoop cluster. Finally, we compared the proposed WaybackVisor with similar lightweight hypervisors that support live forensics.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Dean, J., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)

    Article  Google Scholar 

  2. Digital Corpora: Govdocs1. http://digitalcorpora.org/corpora/govdocs. Accessed 1 Mar 2017

  3. Dunkels, A.: Design and implementation of the lwIP TCP/IP stack. Swed. Inst. Comput. Sci. 2, 77 (2001)

    Google Scholar 

  4. Garfinkel, S., Farrell, P., Roussev, V., Dinolt, G.: Bringing science to digital forensics with standardized forensic corpora. Digit. Invest. 6, S2–S11 (2009)

    Article  Google Scholar 

  5. Garfinkel, S.L.: Digital forensics research: the next 10 years. Digit. Invest. 7, S64–S73 (2010)

    Article  Google Scholar 

  6. Garfinkel, T., Rosenblum, M., et al.: A virtual machine introspection based architecture for intrusion detection. In: NDSS, vol. 3, pp. 191–206 (2003)

    Google Scholar 

  7. Harris, R.: Arriving at an anti-forensics consensus: examining how to define and control the anti-forensics problem. Digit. Invest. 3, 44–49 (2006)

    Article  Google Scholar 

  8. Hirano, M., Ogawa, H.: A log-structured block preservation and restoration system for proactive forensic data collection in the cloud. In: 2016 11th International Conference on Availability, Reliability and Security (ARES), pp. 355–364. IEEE (2016)

    Google Scholar 

  9. Hirano, M., Takase, H., Yoshida, K.: Evaluation of a sector-hash based rapid file detection method for monitoring infrastructure-as-a-service cloud platforms. In: 2015 10th International Conference on Availability, Reliability and Security (ARES), pp. 584–591. IEEE (2015)

    Google Scholar 

  10. Kent, K., Chevalier, S., Grance, T., Dang, H.: Guide to integrating forensic techniques into incident response. NIST Special Publication 10, 800–86 (2006)

    Google Scholar 

  11. Maene, P., Gotzfried, J., de Clercq, R., Muller, T., Freiling, F., Verbauwhede, I.: Hardware-based trusted computing architectures for isolation and attestation. IEEE Trans. Comput. PP(99), 1 (2017). https://doi.org/10.1109/TC.2017.2647955

    Article  Google Scholar 

  12. Martignoni, L., Fattori, A., Paleari, R., Cavallaro, L.: Live and trustworthy forensic analysis of commodity production systems. In: Jha, S., Sommer, R., Kreibich, C. (eds.) RAID 2010. LNCS, vol. 6307, pp. 297–316. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-15512-3_16

    Chapter  Google Scholar 

  13. Mills, D.L.: RFC4330: simple network time protocol (SNTP) version 4 for IPV4, IPV6 and OSI (2006)

    Google Scholar 

  14. Palmer, G., et al.: A road map for digital forensic research. In: First Digital Forensic Research Workshop, Utica, New York, pp. 27–30 (2001)

    Google Scholar 

  15. Qi, Z., Xiang, C., Ma, R., Li, J., Guan, H., Wei, D.S.L.: ForenVisor: a tool for acquiring and preserving reliable data in cloud live forensics. IEEE Trans. Cloud Comput. 5(3), 443–456 (2017). https://doi.org/10.1109/TCC.2016.2535295

    Article  Google Scholar 

  16. Richard III, G.G., Roussev, V.: Next-generation digital forensics. Commun. ACM 49(2), 76–80 (2006)

    Article  Google Scholar 

  17. Roussev, V., Richard III, G.G.: Breaking the performance wall: The case for distributed digital forensics. In: Proceedings of the 2004 Digital Forensics Research Workshop, vol. 94 (2004)

    Google Scholar 

  18. Shinagawa, T., Eiraku, H., Tanimoto, K., Omote, K., Hasegawa, S., Horie, T., Hirano, M., Kourai, K., Oyama, Y., Kawai, E., et al.: BitVisor: a thin hypervisor for enforcing I/O device security. In: Proceedings of the 2009 ACM SIGPLAN/SIGOPS International Conference on Virtual Execution Environments, pp. 121–130. ACM (2009)

    Google Scholar 

  19. Shvachko, K., Kuang, H., Radia, S., Chansler, R.: The hadoop distributed file system. In: 2010 IEEE 26th Symposium on Mass Storage Systems and Technologies (MSST), pp. 1–10. IEEE (2010)

    Google Scholar 

  20. The Apache Software Foundation: WebHDFS REST API. http://hadoop.apache.org/docs/current/hadoop-project-dist/hadoop-hdfs/WebHDFS.html. Accessed 15 Aug 2017

  21. Uhlig, R., Neiger, G., Rodgers, D., Santoni, A.L., Martins, F.C., Anderson, A.V., Bennett, S.M., Kagi, A., Leung, F.H., Smith, L.: Intel virtualization technology. Computer 38(5), 48–56 (2005)

    Article  Google Scholar 

Download references

Acknowledgments

The authors thank Dr. Suguru Yamaguchi for his longstanding support for this research project. The authors thank developers and contributors of BitVisor. The authors would like to thank the anonymous reviewers for their valuable comments and suggestions. This work was supported by JSPS KAKENHI Grant Number JP26330168 and JP17K00198.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Manabu Hirano .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Hirano, M., Tsuzuki, T., Ikeda, S., Taka, N., Fujiwara, K., Kobayashi, R. (2017). WaybackVisor: Hypervisor-Based Scalable Live Forensic Architecture for Timeline Analysis. In: Wang, G., Atiquzzaman, M., Yan, Z., Choo, KK. (eds) Security, Privacy, and Anonymity in Computation, Communication, and Storage. SpaCCS 2017. Lecture Notes in Computer Science(), vol 10658. Springer, Cham. https://doi.org/10.1007/978-3-319-72395-2_21

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-72395-2_21

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-72394-5

  • Online ISBN: 978-3-319-72395-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics