skip to main content
10.1145/1940941.1940975acmotherconferencesArticle/Chapter ViewAbstractPublication PagesinfoseccdConference Proceedingsconference-collections
research-article

A forensic approach to incident response

Published:01 October 2010Publication History

ABSTRACT

An incident response plan is critical for the detection and removal of information security threats. Incident response involves many aspects other than technical issues. There are management, legal, and social issues that an incident response team needs to consider. An incident response identifies, contains, and eliminates the incident. Then, the compromised system is fully recovered and restored. To hold the intruder accountable, a forensic investigation is needed. Documentation of all activities and evidence gathering is crucial when during the entire response and investigation. The paper proposes and discusses interconnected methodological frameworks for both incident response and network forensics.

References

  1. Adelstein, F. 2006. Live forensics: diagnosing your system without killing it first. Communications of the ACM. 49, 2, (Feb. 2006), 63--66. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Brown, D. 2008. Incident response: communication is key. Security Magazine. Retrieved from http://www.securitymagazine.com/Articles/Feature_Article/BNP_GUID_9-5-2006_A_10000000000000227258Google ScholarGoogle Scholar
  3. Jajodia, S., McCollum, C., and Ammann, P. 1999. Trusted recovery: prevention and detection receive most of the attention, but recovery is an equally important phase of information warfare defense. Communications of the ACM. 42, 7, (July. 1999), 71--75. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Lathoud, B. 2004. Formalization of the processing of electronic traces. International Review of Law Computers & Technology. 18, 5. (July. 2004) DOI= 10.1080/1360086042000223490.Google ScholarGoogle Scholar
  5. Mitchell, R., Marcella, R., and Baxter, G. 1999. Corporate information security management. New Library World. 100, 5, (1999), 213--227. DOI= 10.1108/0307480991028588.Google ScholarGoogle ScholarCross RefCross Ref
  6. Mitropoulos, S., Patsos, D., and Douligeris, C. On incident handing and response: a state-of-the-art approach. Computers & Security. 25. (2006), 351--370. DOI= 10.1016/j.case.2005.09.006.Google ScholarGoogle Scholar
  7. Paul, G. 2009. Improving logical security for critical infrastructure. Frost & Sullivan. Retrieved from http://www.frost.com/prod/servlet/market-insight-top.pag?docid=164966592.Google ScholarGoogle Scholar
  8. Pilli, E., Joshi, R. C., and Niyogi, R. 2010. A generic framework for network forensics. International Journal of Computer Applications. 1, 11. (2010). Retrieved from http://www.ijcaonline.org/journal/number11/pxc387408.pdf.Google ScholarGoogle ScholarCross RefCross Ref
  9. Rollason-Reese, R. 2003. Incident handling: an orderly response to unexpected events. ACM. New York, NY, 97--102. DOI= http://doi.acm.org/10.1145/947469.947496. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Sanderson, E. and Forcht, K. 1996. Information security in business environments. Information Management and Computer Security. 4, 1. (1996), 32--37. DOI= 10.1108/09685229610114187Google ScholarGoogle ScholarCross RefCross Ref
  11. Tan, T., Ruighaver, T., and Ahmad, A. 2003. Incident handling: where the need for planning is often not recognized. In 1st Australia Computer, Network & Information Forensics Conference 2003. (Perth, Western Australia, 2003). Retrieved from http://frogchunk.com/documentation/security-management/terenceatiftobias.pdf.Google ScholarGoogle Scholar
  12. Werlinger, R., Muldner, K., Hawkey, K., and Beznosov, K. 2010. Preparation, detection, and analysis: the diagnostic work of IT security incident response. Information Management & Computer Security. 18, 1 (2010). DOI= 10.1108/09685221011035241.Google ScholarGoogle Scholar
  13. Whitman, M. and Mattord, H. 2010. Management of Information Security, 3rd Edition. Cengage, Learning/Course Technology, Boston, MA 02210.Google ScholarGoogle Scholar
  14. Wilcox, S., and Brown, D. 2005. Responding to security incidents - sooner of later you systems will be compromised. Journal of Health Care Compliance. 7, 2 (April. 2005), 41--48.Google ScholarGoogle Scholar

Index Terms

  1. A forensic approach to incident response

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          InfoSecCD '10: 2010 Information Security Curriculum Development Conference
          October 2010
          187 pages
          ISBN:9781450302029
          DOI:10.1145/1940941

          Copyright © 2010 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 1 October 2010

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          Overall Acceptance Rate18of23submissions,78%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader