Chapter 2/ Overview of Anti-Forensics

Wondershare

Everyone Has a Budget: Buy Time

Although there is powerful voodoo at our disposal, the ultimate goal isn't

always achieving complete victory. Sometimes the goal is to make forensic

analysis prohibitively expensive; which is to say that raising the bar high

enough can do the trick. After all, the analysts of the real world are often

constrained by budgets and billable hours. In some police departments, the

backlog is so large that it's not uncornmon for a machine to wait up to a year

before being analyzed.* It's a battle of attrition, and we need to find ways to

buy time.

2.1 Incident Response_

Think of incident response (IR) as emergency response for suspicious com¬

puter events. It's a planned series of actions performed in the wake of an is¬

sue that hints at more serious things. For example, the following events could

be considered incidents:

The local intrusion detection system generates an alert.

The administrator notices odd behavior.

Something breaks.

Intrusion Detection System (and Intrusion Prevention

System)

An intrusion detection system (IDS) is like an unarmed, off-duty cop who's

pulling a late-night shift as a security guard. An IDS install doesn't do any¬

thing more than sound an alarm when it detects something suspicious. It can't

change policy or interdict the attacker. It can only hide around the corner with

a walkie-talkie and call HQ with the bad news.

IDS systems can be host-based (HIDS) and network-based (NIDS). An HIDS

is typically a software package that's installed on a single machine, where

it scans for malware locally. An NIDS, in contrast, tends to be an appliance

or dedicated server that sits on the network watching packets as they fly by.

An NIDS can be hooked up to a SPAN port of a switch, a test access port

2. Nick Heath, "Police in Talks over PC Crime 'Breathalysers' Rollout," .silicort.com, June 3,

2009.

36 I Part I