Avaliação de técnicas antiforenses computacionais aplicadas a registros de sistemas Linux

This work addresses anti-forensic techniques applied in log files. Log files are the main source of information for forensic experts and network administrators to investigate anomalies in computer systems, such as results from an invasion. The aim was to investigate anti-forensic techniques used in...

ver descrição completa

Autor principal: Sá, Guilherme Zanini de
Formato: Trabalho de Conclusão de Curso (Graduação)
Idioma: Português
Publicado em: Universidade Tecnológica Federal do Paraná 2020
Assuntos:
Acesso em linha: http://repositorio.utfpr.edu.br/jspui/handle/1/6455
Tags: Adicionar Tag
Sem tags, seja o primeiro a adicionar uma tag!
Resumo: This work addresses anti-forensic techniques applied in log files. Log files are the main source of information for forensic experts and network administrators to investigate anomalies in computer systems, such as results from an invasion. The aim was to investigate anti-forensic techniques used in log files and also evaluate the efficacy and difficulty of implementing such techniques. We used GNU / Debian Linux and we carried out two case studies: standard installation and safety measures. In both case, antiforenses techniques were evaluated regarding efficacy and difficulty. We assumed that the target system was already compromised. We verified that the techniques used as a super user are efficient in an environment without proper protection hence it becomes easy an invader hide his actions.