Vous êtes sur la page 1sur 13

See discussions, stats, and author profiles for this publication at: https://www.researchgate.

net/publication/312877113

Digital Forensic Analysis of Ubuntu File System

Article · January 2016


DOI: 10.17781/P002213

CITATIONS READS

2 1,273

1 author:

Dinesh Patil
Veermata Jijabai Technological Institute, India, Mumbai
8 PUBLICATIONS   3 CITATIONS   

SEE PROFILE

Some of the authors of this publication are also working on these related projects:

Digital Forensic View project

All content following this page was uploaded by Dinesh Patil on 28 July 2017.

The user has requested enhancement of the downloaded file.


International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

Digital Forensic Analysis of Ubuntu File System

Dinesh N. Patil, Bandu B. Meshram


Veermata Jijabai Technological Institute
Matunga, Mumbai, India
dinesh9371@gmail.com, bbmeshram@vjti.org.in

ABSTRACT SophosLabs, an average of 16,000-24,000 websites


were compromised in a day in 2013 [2]. Linux
A file system of Ubuntu operating system can systems are indeed attacked by malware.
conserve and manage a lot of configuration The Microsoft's operating system design includes
information and the information with forensic some features that make documents able to install
importance. Mining and analyzing the useful data of executable payloads. The use of a database of
the Ubuntu operating system have become essential software hooks and code stubs (the registry) also
with the rise of the attack on the computer system. simplified things [3]. Linux malware is quite distinct
Investigating the File System can help to collect from what it does and how it does it, compared to
information relevant to the case. After considering Windows viruses, but it exists. The crucial operating
existing research and tools, this paper suggests a new system directories might be used by the malware to
evidence collection and analysis methodology and the affect the computer system as a whole. In addition,
UbuntuForensic tool to aid in the process of digital there is always the risk of the malicious insider.
forensic investigation of Ubuntu File System. Attacks directed at Linux systems tend to aim at
exploiting bugs in system services such as web
KEYWORDS browsers or Java containers. These don't frequently
run with elevated privileges either, so an exploit is
File System, Digital Forensic, Integrated Analysis, typically contained to altering the behavior of the
Timeline Analysis, Digital Evidence targeted service and, possibly, disabling it. The
malware uses the various directories in the Linux file
1 INTRODUCTION system to plant it to run as a service and harm the
Computer. Also, the activity of the malicious insider
The Ubuntu operating system is one of the also gets stored in the file system. This raises the need
distributions of the Linux operating system. Most of to do the forensic investigation of directories under
the Ubuntu kernels are the default Linux kernel. the Linux file system to find the traces of malicious
Ubuntu uses the Linux file system which is usually activities on the system.
considered as a tree structure. Ubuntu is having Ext4 The paper is organized as follows: Section 2 discusses
as its default file system. Ext4 is an evolution of Ext3, the related work and the existing tools on the Linux
which was the default file system earlier. The file system forensics. The potential locations of the
evolution of the Ext file system is summarized in digital evidences in the directory structure of the
table 1. Linux computers are very much prone to Ubuntu File System are discussed in section 3.
attack from the hackers. Linux boxes are often used as Section 4 covers the forensic investigation of the
servers, essentially for a central control point. In fact, various user activities on the Linux file system. The
roughly 70% of malware downloaded by hackers to proposed UbuntuForensic tool is discussed in section
the honeypots is infected with Linux/Rst-B [1]. Linux- 5. Comparative study between the existing Linux
based web servers are constantly under attack. At tools and the proposed tool is performed in

175
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

Table 1. EXT Family features and limitation


Linux File Year of Features Limitation
System Introduction
EXT 1992 Virtual File system concept used No support for separate timestamp
for file access
EXT2 1993 File Compression added No journaling feature
EXT3 1999 Journaling added, online file system Lack feature such as extents,
growth dynamic allocation of inodes and
block suballocation
EXT4 2006 Extent-based storage, backward Do not overwrite the file after
compatibility with EXT2 and EXT3,Online deletion causing security problem
defragmentation

section 6. The findings are concluded in section constantly increasing with a geometric
7. progression. Conversely, the protection and
prevention techniques against intrusion accidents
2 RELATED RESEARCH are certainly insufficient. A new framework to
deal with a compromised Linux system in a
This section details out the existing research on digital forensic investigation is developed and
the Linux file system forensic and the tool implemented in [7]. Issues pertaining to the
developed to carry out the forensic investigation Linux Forensics and the various forensic tools for
of it. the forensic investigation of the Linux system
have been discussed in [8].
2.1 Existing Research
2.2 Existing Tools
The logging system is the most important
mechanism for Computer forensics on an The Sleuth kit(TSK).
kit(TSK) It is a collection of Unix-
Operating System. The various logging based command line analysis tools. TSK can
mechanism in Linux system that can be of analyze FAT, NTFS, Ext2/3, and UFS file
forensic importance is discussed in [4]. A systems and can list files and directories, recover
comparative study of the various file systems in deleted files, make timelines of file activity,
Ubuntu Linux and Free BSD is performed in [5]. perform keyword searches, and use hash
In order to meet the Linux file system analysis databases.
applications demand for computer forensics, an Autopsy. This tool is a graphical interface to the
object-oriented method of analyzing Linux file TSK. It also analyzes FAT, NTFS, Ext2/3, and
system is proposed in [6]. The paper also UFS file systems and can list files and directories,
analyzed different data sources deeply with the recover deleted files, make timelines of file
inheritance relationship between classes and the activity, perform keyword searches, and use hash
encapsulation of class and showed information of databases.
Linux file to the users in a friendly interface. The
Linux operating system has been used as a server Scalpel. Scalpel is an open source file carver
system in plenty of business services worldwide. which is also available for Linux. File carvers are
Unauthorized intrusions on a server are used to recover data from disks and to retrieve

176
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

files from raw disk images. In some case, file in each directory of the Ubuntu File System are
carvers are even able to retrieve data if the discussed as below:
metadata of the file system were destroyed. /etc/rc.d.
/etc/rc.d. In the case of Ubuntu, the information
Scalpel is designed to use minimal resources and about the programs which are to be executed
to perform file carving. when the system booted is available in the file
Digital Evidence and
and Forensic Toolkit (DEFT) stored /etc/rc.d directory. The malicious user
Linux. DEFT is a free computer forensics Linux might gain an access to the Ubuntu system &
distribution. DEFT is combined with the Digital will add files in rc.d directory to execute its
Advanced Response Toolkit (DART) which malicious script. So whenever the Ubuntu
contains a collection of forensics software for System will boot up the malicious script will
Windows. automatically run. The forensic examiner will
Computer Aided Investigative have to look into those files to identify if any file
Investigative Environment
(CAINE). CAINE is a Linux live distribution contains malicious code which may be causing
which aims to provide a collection of forensics unauthorized activity on the system.
tools with a GUI. It includes open source tools /etc/init.d.
/etc/init.d. To remain running after reboots,
that support the investigator in four phases of the malware is usually re-launched using some
forensic process viz., Information gathering, persistence mechanism available in the various
collection, examination, analysis. It also supports startup methods on a Linux system, including
the investigator by providing capabilities to services, drivers, scheduled tasks, and other
automate the creation of the final report and is startup locations. There are several configurations
completely controlled by a GUI that is organized files that Ubuntu uses to automatically launch an
according to the forensics phases. executable when a user logs into the system that
i-Nex. It is an application that gathers may contain traces of malware programs.
information for hardware components available Malware often embeds itself as a new,
on the system and displays using user interface unauthorized service. Ubuntu has a number of
[9]. scripts that are used to start the service as the
computer boots. The startup scripts are stored in
History. The history command lists commands /etc/init.d. Malware program may embed itself in
that were recently executed. This can help to /etc/init.d directory to run as a service. Therefore
track the activity of an intruder. the forensic examiner will have to look into those
files to check for malware incident.
3 UBUNTU FILE SYSTEM ANALYSIS
/etc/NetworkManager/system-
/etc/NetworkManager/system-connections.
connections
In Ubuntu Operating System, the information Ubuntu maintains the list of networks connected
about the actions performed on the system is to the system in /etc/NetworkManager/system-
maintained in the file system. The careful connections. In addition to this, it is possible to
analysis of the file system leads in finding helpful know the active network connections which are
evidence of the user’s activity on the system. being used in the system using the command
“sudo netstat –tupn “.
The following are some of the files and
directories in the file system which can be helpful /etc/passwd.
/etc/passwd. The passwd file maintains the
to the forensic investigator to find the potential details about the users accessing the system. The
digital evidence of the various activity being details include the user name, path to the user’s
performed on the system. The evidence identified home directory, programs that are generally

177
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

started when the users log on. The forensic /usr/lib.


/usr/lib. This directory contains program libraries.
investigator can come to know about the users Libraries are collections of frequently used
working directory, and the program that are program routines. The investigator has to search
executed when the user performs the login. in the lib directory to search for any malicious
/etc/shadow. file.
/etc/shadow. The shadow maintains the
authentication details of the user. The details /usr/local/share/recently-
/usr/local/share/recently-used.xbel.
used.xbel. In Ubuntu,
included in shadow file are user login name, the files which have been recently accessed are
salted password. noted in the file ‘recently-used.xbel’. This file is
/etc/profile. available in the local/share/ directory. The ‘cat’
/etc/profile. Files and commands to be executed
at login or startup time by the Bourne or C shells. command can be used to read the contents of the
These allow the system administrator to set recently-used.xbel. Recently-used.xbel file
global defaults for all users. provides the detailed information about the files
which have been accessed by the user, the
/etc/networks.
/etc/networks. The list of the networks that the application used to access those documents and
system is currently located on is available in this the timing of accessing & modifying these
directory. documents.
/etc/hosts.
/etc/hosts. The IP address of the machine is /var/log/syslog.
/var/log/syslog. In Ubuntu, the login time and the
available in the hosts file if the machine is logout time can be accessed by using the last
connected to the network. The forensic command at the terminal. Syslog file in the
investigator can come to the conclusion whether /var/log maintains the login and shutdown time.
the system was connected to the network or not. The analyst can predict the criminal, if the crime
/etc/cron.d, /etc/cron.daily, /etc/cron.weekly,
/etc/cron.weekly, had happened during the duration of the use of
/etc/cron.monthly.
/etc/cron.monthly. These directories contain the system by the user. Syslog file in /var/log
scripts to be executed on a regular basis by the provides the date and time at which a particular
cron daemon. The investigator has to look into network connection was established. Network
those directories to search for the presence of any information enables the forensic examiner to
malicious code in it. know about the type of network used in order to
do malicious activity.
/usr/bin.
/usr/bin In Ubuntu, the configuration information
about the application is stored in the /usr/bin /var/log/lastlog.
/var/log/lastlog. The lastlog file contains the
directory and the library required for these recent login information for all the users. The
applications is available in the /usr/lib directory. lastlog command provides the content of this file.
The list of the application installed can be The Forensic Investigator can come to know
obtained by the command ls –l /usr/bin/ .The about the user who was logged in at the time of
directory /usr/share/ application also provides the crime.
graphical view of the application installed Using /var/log/faillog.
/var/log/faillog. It contains user failed login
the information available in the bin directory, attempts. The user who was under attack can be
analyst can provide the historic view of the identified.
application configuration that the user has
/var/tmp.
var/tmp. The tmp directory consists of
installed onto the system, date on which a
temporary files. These files can provide the
particular application was modified, permissions
details about the files that were accessed by the
granted to the user, size of the application.
user.

178
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

/dev. Hardware devices attached to the system. /proc/PID/exe.


/proc/PID/exe. Exe directory contains the Link to
Also the /dev directory in the file system the executable of this process with the process
provides the information about the hardware identification i.e., PID. If there are any malicious
attached to the system. The syslog also maintains codes running for this process, then it can be
the details of the devices which have been detected.
detected. The date and timing at which the device
was connected along with device details are 4 EVIDENCE COLLECTION USING
recorded in the syslog. The device information PROPOSED TOOL
provides the knowledge about the kind of devices
and the time at which they were used in doing The forensic investigator should be able to
malicious activity. analyze the activities of the user when
/proc/net/netstat.
proc/net/netstat. The netstat file maintains the performing the investigation and in doing so the
network statistics about the network connections timing of the activities is needed to be considered
of the system. The suspicious connections if there to establish the correlation between the time and
are any will be identified by the investigator the activity. As the details of the user’s activities
are recorded in the various files managed by the
/proc/net/dev_mcast.
/proc/net/dev_mcast. The statistic about the file system of the Linux based Computer System.
network device connected to access the network The investigator should be able to investigate the
is available in the dev_mcast file. files stored in the seized hard disk of the
/proc/cpuinfo. The information about the cpu computer system which was used to commit the
connected to the system is available in the crime.
cpuinfo file.

Figure 1. A snapshot of UbuntuForensic tool showing Integrated Analysis


However, the previous forensic tools provided analysis of Linux file system. For this reason, a
limited facilities for performing the forensic new evidence collection and analysis

179
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

methodology is required. This methodology • Autorun programs running on the system


performs integrated file system analysis, timeline • Recently accessed documents/programs,
analysis and extracts the information that is • Applications installed on the system
useful for the digital forensic analysis of the file • Network connected
system. • Devices connected to the system
• Last login activity of the user
4.1 Integrated Analysis • Malware activity
The detail of these activities is as follows:
The cyber crime cell generally used to seize the
hard disk of the computer which is used for crime The Autorun programs running on the system
purpose. The forensic investigator has the Many programs are configured in such a way that
responsibility to find out the possible traces of when the Computer boot and start the operating
evidence against the criminal. The Linux-based system, they automatically start running such
computer system maintains the files in the programs are called as Auto Run program. In the
directory structure which begin with root case of Ubuntu, the information about the
directory ‘/’. programs which are to be executed when the
system booted is available in the file stored
The proposed UbuntuForensic tool provides the /etc/rc.d directory. The malicious user might gain
facility for extracting the forensic evidence from an access to the Ubuntu system & will add files
the files stored in the external hard disk. This in rc.d. So whenever the Ubuntu System will
hard disk is needed to be connected to the boot up the malicious script will automatically
computer system having a UbuntuForensic tool run. The forensic examiner will have to look into
which mounts the external directory structure in those files to identify if any file contains
the media directory of the running system to malicious code which may be causing
extract the evidence. The proposed tool also unauthorized activity on the system.
performs Local file system forensic which
involves extracting the information from the files Recently Accessed documents and programs
about the various activity performed by the user From the documents that the user has recently
on the system, on which the tool is running. accessed, the forensic examiner can know about
the documents in which the user has interest. In
4.2 Analysis of User Activity Ubuntu, the files which have been recently
accessed are noted in the file ‘recently-
The existing tools provide a limited functionality used.xbel’. This file is available in the
in extracting the forensic information from the local/share/ directory. The ‘cat’ command can be
file system. This has stimulated the need of used to read the contents of the recently-
having a file system forensic tool which can used.xbel file. Recently-used.xbel file provides
extract the forensic data from the directory the detailed information about the files which
structure based on the various activities being have been accessed by the user, the application
performed by the user and generate a report of used to access those documents and the timing of
the evidence for further use. accessing & modifying these documents.
The proposed UbuntuForensic tool covers the The recently accessed document information
various activities as discussed in [10], which are helps in understanding the files which may have
performed on the Computer system. These been read, modified by the user.
activities include:

180
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

Figure 2. A snapshot of UbuntuForensic tool showing category of User Activities


Applications installed on the system network used in order to do the malicious
In Ubuntu, the configuration information about activity.
the application is stored in the /usr/bin directory Devices connected
connected to the System
and the library required for these applications is
In Ubuntu “lshw” command provides the list of
available in the /usr/lib directory. The list of the
hardware devices attached to the system. Also,
application installed can be obtained by the
the /dev directory in the file system provides the
command ls –l /usr/bin/. Using the information
information about the hardware attached to the
available in the bin directory, an analyst can
system. The syslog file also maintains the details
provide the historic view of the application
of the devices which have been detected.
configuration that the user has installed onto the
system, date on which a particular application The date and timing at which the device was
was modified, permissions granted to the user, connected along with device details are also
the size of the application etc. recorded in the syslog.
Network connected or accessed
accessed Last Login Activity of the user
Ubuntu maintains the list of networks connected In Ubuntu, the login time and the logout time can
to the system in /etc/NetworkManager/system- be accessed by using the ‘last’ command at the
connections. In addition to this, it is possible to terminal. Syslog file in the /var/log maintains the
know the active network connections which are login and shutdown time.
being used in the system using the command Malware Activity
“sudo netstat –tupn“.
To remain running after reboots, malware is
Syslog file in /var/log provides the date and time usually re-launched using some persistence
at which a particular network connection was mechanism available in the various startup
established. Network information enables the methods on an Ubuntu system, including
forensic examiner to know about the type of services, drivers, scheduled tasks, and other
startup locations. There are several configurations

181
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

files that Ubuntu uses to automatically launch an unauthorized service. A certain amount of
executable when a user logs into the system that malware use /etc/init.d directory to hide and start
may contain traces of malware programs. their execution on startup of the system.
Malware often embeds itself as a new,

Figure 3. Forensic report using UbuntuForensic tool


4.3 Timeline Analysis 4.4 Data Security
Security

The digital forensic investigator should detect the The UbuntuForensic tool provides the facility for
activity being performed by the suspect along the backup of the files from the hard disk of the
with a timeline. By performing the timeline running system. The backup of these files is
analysis, the investigator can trace the sequence maintained on the external storage media. The
of events that were performed by the suspect. For content of these files is then hashed one by one
instance, if the suspect had accessed a word and the resulting hashes are then indexed and
document by logging using a login id ,the date stored along with file name and the path of the
and time of these activities can be correlated to file in a table on the external storage. The md5
convict the suspect. The forensic report obtained algorithm is used to obtain the hashes from the
as in Figure 3 shows root user had logged in at backup data.
11:39AM on 18/05/2016 and accessed the .doc In order to detect if any changes have been
file 'An Evidence Collection and Analysis of occured to the data on the hard disk of the
Ubuntu File System using UbForensicTool' at running system by the suspicious criminal, the
11:49AM using document viewer application. hashes are obtained from the individual files on
This forensic information can be evidence against the hard disk one by one and these hashes are
the root user for accessing the .doc file as the then compared with the hashes stored on the
.doc file was accessed after the login time by root external storage media. If two hashes which are
user and before the shutdown of the system. The being compared are found dissimilar then it
forensic report thus obtained using the means that the criminal has caused some
UbuntuForensic tool underlines the importanceof modification to the relevant file on the hard disk.
performing the timeline analysis of the activities. A report is prepared about all the files whose

182
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

hashes are found dissimilar from that of the structure can be performed using the
hashes in the external storage. In such situation, UbuntuForensic tool. The evidence and time of
the affected file can be restored back from the the activity are extracted and the report is
external hard disk. Figure 4 depicts the process generated for correlating the sequence of events
for detecting the modification of the data on the and their timings.
hard disk by the criminal.
The software architecture consists of following
modules: Local File System Forensic, External
File System Forensic, Timestamp Generation,
Backup File System, Hash Generation and
Comparison, and Report Generation. The Local
and External File System Forensic deals with
extracting forensic evidence for various user
activities from the directory structure of the
system on which the tool is running and the
directory structure available on the external hard
disk. The time stamp generation module
generates the last modified timestamp for the
directory and files associated with the user’s
activity concerned. The forensic Report based on
the forensic evidence obtained and the generated
timestamp is obtained using Timestamp
Generation module.
The algorithm for the proposed tool is as follows:
Requires:
Requires Activity (i, D(DIR)) returns the
extracted forensic information forensic_info for
each ith activity from the DIR directory of the
directory structure D. Select(forensic_info(i))
selects the evidence from the forensic_info.
Timestamp (i, D( DIR)) returns the timestamp
for the directory DIR for the ith activity.
Generate_Report generates the report from the
selected evidence and the timestamp. MAX
indicates the maximum number of user’s activity.
Input: The directory structure D
Output: Report in text format
Figure 4. Flowchart depicting operation for identification of
modified files using UbuntuForensic tool 1: For i є (1, MAX) do;
2: forensic_info(i) Activity(i,D(DIR))
5 SOFTWARE ARCHITECTURE AND
IMPLEMENTATION 3: forensic_evidence(i) Select(forensic_info(i))
The software architecture of the UbuntuForensic 4: timestampi Timestamp(i,D(DIR))
tool is illustrated in Figure 5. The analysis of
5: Report Generate_Report(forensic_evidence,
local and the external hard disk directory

183
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

timestamp) timestamp for the ith activity of the user based on


The Activity(i,D(DIR)) function extracts the the last access and modification timestamp of the
forensic information from the directory structure directory. As the contents of the directory are
for the ith activity of the user. Once the forensic accessed or changed, the timestamp of the
information is extracted, the forensic investigator directory also gets changed. This procedure is
repeated for all the users’ activity in
can select the digital evidence from it. The
consideration. Once all the activities are finished,
Timestamp(i, D(DIR)) function generates the
the forensic investigator generates the Forensic
report.

Figure 5. Software Architecture of UbuntuForensic tool


The backup of the files managed by the file • Number: This field is an index for the
system is performed using Backup File System entry in the relation.
module. The data backed up is then hashed by • File_Name: The name of the backed up
the hash generation module to generate the md5 file from the hard disk.
hash. The hash so obtained is stored on the • Path_Name: The path of the file
external storage in a relational table. Whenever concerned.
the threat is detected, the hashes are obtained for • Hash: The md5 hashes obtained on the
the hard disk data and these hashes are then content of the file.
compared with the hashes in the external storage. The UbuntuForensic tool is built using QT4, a
If the mismatch is found then the affected data cross-platform application frame-work that is
are restored back from the external storage. The widely used for developing application software
structure definition of the table storing the hashes that can run on various software and hardware
on the external storage is as follows: platforms with little or no change in the
typedef struct { underlying code base while having the power and
Number int; speed of native applications. Qt uses standard
File_Name string[20]; C++ with extensions including signals and slots
Path_Name string[20]; that simplify handling of events, and this helps in
Hash long int; the development of both GUI and server
} table; applications which receive their own set of event
information and should process them
The field description is as follows:

184
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

accordingly. The UbuntuForensic tool uses Based on the advanced requirements mentioned
QSetting class and its methods to extract the in the paper, UbuntuForensic tool improves over
information’s from the directory structure of the the shortcoming of the existing tools.
Ubuntu file system.
7 CONCLUSION
6 EVALUATION
The File System maintains historical information
The comparison between the existing widely about user activity in its directory structure. All
used Linux forensic tools and the of this information can be extremely valuable to a
UbuntuForensic tool is performed as in table 2. forensic analyst, particularly when attempting to
The tool like TSK, autopsy can list file and establish the timeline of activity on a system. It is
directories and perform timeline analysis of file essential to perform the analysis of file system
activity. DEFT and CAINE provides GUI based and use timeline analysis to detect the suspicious
forensic tools. i-Nex and History tools provide activities of the suspect. A wide range of cases
information about the hardware connected to the would benefit greatly from the information
system and the recent command executed on the derived or extracted from the file system.
system recently, respectively. However, it has
A survey on the existing Linux forensic tools
been observed that none of the Linux tools
revealed that they extract very little forensic
provides the facility for extracting the evidence
information from the file system. Comparatively,
for the specific activity of the user.
the UbuntuForensic tool provides more evidence
Comparatively, the UbuntuForensic tool
from the file system as that of the existing tools;
performs the extraction of forensic related
saving the time and effort in searching the
information about the various users’ activity
evidence. The UbuntuForensic tool also covers
being performed on the system. The
forensic analysis of the file system on the
UbuntuForensic tool also performs timeline
external hard disk, thus enabling the forensic
analysis using which the conviction of the
investigator to conduct the forensic investigation
criminal can be performed based on the last
without changing the setup. The identification of
access, modification dates of the directories and
the files which are modified by the criminal can
the login time of the suspicious user. The
be achieved by computing the hashes on the files
UbuntuForensic tool supports local and external
from the hard disk.
file system forensics. In External file system
forensics, the external hard disk with Ubuntu
operating system is mounted on the system with
the UbuntuForensic tool to extract the forensic
evidence. The proposed UbuntuForensic tool also
performs the backup of the files and directories.
An approach to check the data integrity of all the
files managed by the file system is proposed.

185
International Journal of Cyber-Security and Digital Forensics (IJCSDF) 5(4): 175-186
The Society of Digital Information and Wireless Communications, 2016 (ISSN: 2305-0012)

Table 2. Functional comparison with existing tools


Tool Function
Integrated Timeline Activity GUI support Any other feature
Analysis Analysis
Analysis

UbuntuForensicTool Running process,


Hash Generation
(Proposed)
The Sleuth kit(TSK) X X X Recovers deleted
files
Autopsy X X Recovers deleted
files
Scalpel X X X Recover data from
disks
DEFT X Data Recovery and
hashing, Process
information
CAINE X Data Recovery
i-Nex X Display device
information,
generate report
History X X X Lists only
command history

8 REFERENCES

1. SophosLab: Botnets, a free tool and 6 years of 7. Wei C., Chun-mei L.: The Analysis and Design of
Linux/Rst-B, Linux File System Based on Computer Forensic,
https://nakedsecurity.sophos.com/2008/02/13/botn International Conference on Computer Design and
ets-a-free-tool-and-6-years-of-linuxrst-b (2008) Applications (2010)
2. Sophos: Don’t believe these four myths about 8. Joonah C., Antonio C.,Paolo G., Seokhee L,
Linux Security, Sangjin L..: Live Forensic Analysis of a
http://blogs.sophos.com/2015/03/26/dont-believe- Compromised Linux System using LECT(Linux
these-four-myths-about-linux-security (2015) Evidence Collection Tool), International
3. McInnes J..: Linux Operating System don’t get Conference on Information Security and
attacked by viruses,why?, Assurance (2008)
https://www.quora.com/Linux-Operating-System- 9. Grundy B.: Advanced artifact analysis, European
dont-get-attacked-by-Viruses-why (2015) Union Agency for Network and Information
4. Tang L.: The study of Computer forensics on Security (2014)
Linux, International conference on computational 10. ArchLinux:
and Information Sciences (2013) https://wiki.archlinux.org/index.php/List_of_appli
5. Kuo-pao Y., Wallace K.: File Systems in Linux cation/Utilities (2016)
and Free BSD:A Comparative study, Journal of 11. Patil D., Meshram B.: Forensic investigation of
6. Emerging Trends in Computing and Information user activities on Windows7 and Ubuntu12
Sciences,2(9) (2011) operating system, IJIET, 5(3) (2015)

186

View publication stats

Vous aimerez peut-être aussi