Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI
Infrastructure as a Service and memory forensics are two subjects which have recently gained increasing amounts of attention. Combining these topics poses new challenges when performing forensic investigations. Forensics targeting virtual machines in a cloud environment is problematic since the devi...
Main Authors: | , |
---|---|
Format: | Others |
Language: | English |
Published: |
Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik
2018
|
Subjects: | |
Online Access: | http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16735 |
id |
ndltd-UPSALLA1-oai-DiVA.org-bth-16735 |
---|---|
record_format |
oai_dc |
spelling |
ndltd-UPSALLA1-oai-DiVA.org-bth-167352018-07-09T20:11:04ZDigital forensics - Performing virtual primary memory extraction in cloud environments using VMIengHjerpe, DavidBengtsson, HenrikBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknikBlekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik2018Memory forensicsVirtual Machine IntrospectionCloud computingKVMQEMUComputer SciencesDatavetenskap (datalogi)Infrastructure as a Service and memory forensics are two subjects which have recently gained increasing amounts of attention. Combining these topics poses new challenges when performing forensic investigations. Forensics targeting virtual machines in a cloud environment is problematic since the devices are virtual, and memory forensics are a newer branch of forensics which is hard to perform and is not well documented. It is, however an area of utmost importance since virtual machines may be targets of, or participate in suspicious activity to the same extent as physical machines. Should such activity require an investigation to be conducted, some data which could be used as evidence may only be found in the primary memory. This thesis aims to further examine memory forensics in cloud environments and expand the academic field of these subjects and help cloud hosting organisations. The objective of this thesis was to study if Virtual Machine Introspection is a valid technique to acquire forensic evidence from the virtual primary memory of a virtual machine. Virtual Machine Introspection is a method of monitoring and analysing a guest via the hypervisor. In order to verify whether Virtual Machine Introspection is a valid forensic technique, the first task was to attempt extracting data from the primary memory which had been acquired using Virtual Machine Introspection. Once extracted, the integrity of the data had to be authenticated. This was done by comparing a hash sum of a file located on a guest with a hash sum of the extracted data. The experiment showed that the two hashes were an exact match. Next, the solidity of the extracted data was tested by changing the memory of a guest while acquiring the memory via Virtual Machine Introspection. This showed that the solidity is heavily compromised because memory acquisition process used was too slow. The final task was to compare Virtual Machine Introspection to acquiring the physical memory of the host. By setting up two virtual machines and examining the primary memory, data from both machines was found where as Virtual Machine Introspection only targets one machine, providing an advantage regarding privacy. Student thesisinfo:eu-repo/semantics/bachelorThesistexthttp://urn.kb.se/resolve?urn=urn:nbn:se:bth-16735application/pdfinfo:eu-repo/semantics/openAccess |
collection |
NDLTD |
language |
English |
format |
Others
|
sources |
NDLTD |
topic |
Memory forensics Virtual Machine Introspection Cloud computing KVM QEMU Computer Sciences Datavetenskap (datalogi) |
spellingShingle |
Memory forensics Virtual Machine Introspection Cloud computing KVM QEMU Computer Sciences Datavetenskap (datalogi) Hjerpe, David Bengtsson, Henrik Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI |
description |
Infrastructure as a Service and memory forensics are two subjects which have recently gained increasing amounts of attention. Combining these topics poses new challenges when performing forensic investigations. Forensics targeting virtual machines in a cloud environment is problematic since the devices are virtual, and memory forensics are a newer branch of forensics which is hard to perform and is not well documented. It is, however an area of utmost importance since virtual machines may be targets of, or participate in suspicious activity to the same extent as physical machines. Should such activity require an investigation to be conducted, some data which could be used as evidence may only be found in the primary memory. This thesis aims to further examine memory forensics in cloud environments and expand the academic field of these subjects and help cloud hosting organisations. The objective of this thesis was to study if Virtual Machine Introspection is a valid technique to acquire forensic evidence from the virtual primary memory of a virtual machine. Virtual Machine Introspection is a method of monitoring and analysing a guest via the hypervisor. In order to verify whether Virtual Machine Introspection is a valid forensic technique, the first task was to attempt extracting data from the primary memory which had been acquired using Virtual Machine Introspection. Once extracted, the integrity of the data had to be authenticated. This was done by comparing a hash sum of a file located on a guest with a hash sum of the extracted data. The experiment showed that the two hashes were an exact match. Next, the solidity of the extracted data was tested by changing the memory of a guest while acquiring the memory via Virtual Machine Introspection. This showed that the solidity is heavily compromised because memory acquisition process used was too slow. The final task was to compare Virtual Machine Introspection to acquiring the physical memory of the host. By setting up two virtual machines and examining the primary memory, data from both machines was found where as Virtual Machine Introspection only targets one machine, providing an advantage regarding privacy. |
author |
Hjerpe, David Bengtsson, Henrik |
author_facet |
Hjerpe, David Bengtsson, Henrik |
author_sort |
Hjerpe, David |
title |
Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI |
title_short |
Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI |
title_full |
Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI |
title_fullStr |
Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI |
title_full_unstemmed |
Digital forensics - Performing virtual primary memory extraction in cloud environments using VMI |
title_sort |
digital forensics - performing virtual primary memory extraction in cloud environments using vmi |
publisher |
Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik |
publishDate |
2018 |
url |
http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16735 |
work_keys_str_mv |
AT hjerpedavid digitalforensicsperformingvirtualprimarymemoryextractionincloudenvironmentsusingvmi AT bengtssonhenrik digitalforensicsperformingvirtualprimarymemoryextractionincloudenvironmentsusingvmi |
_version_ |
1718710875758526464 |