the best methods available for data extraction deter-
mined for each device. This is because embedded de-
vices differ in their capabilities, their architecture, the
supported operating systems, available interfaces and
organization of the file system, which requires differ-
ent extraction methods for each particular type of de-
vice.
Furthermore, we have presented a framework that
allows for an initial analysis of the non-volatile stor-
age of IACS systems and devices as well as of
general-purpose computers. This analysis is foreseen
to be done in response to an incident, as an in-house
preliminary forensic analysis or as part of a periodic
routine analysis. The framework supports a variety of
operating systems and has been shown to be suitable
for examining entire file systems, specific directories
or single files. Altogether, the framework covers well
the use-cases outlined in the introduction of this pa-
per.
In addition, we have also performed an evalua-
tion, demonstrating the performance of the frame-
work in different scenarios. The recognition rate
of matched files, as expected, is directly correlated
with the comprehensiveness and completeness of the
hash database. A more complete database that in-
cludes hashes of as many software products possi-
ble will result in more accurate results. However, for
readily available databases such as the NIST NSRL
database, there are potentially still a large amount of
“unknown” files that need to be further investigated
after running our analysis tool. The evaluation also
showed that a fuzzy hash comparison can improve the
recognition rate, although not substantially for every
scenario. The performance of the hash comparison
also directly depends on the performance of the server
where the database is stored and the resources allo-
cated to the database, and we have shown that reason-
able performance can be achieved using moderately
powerful hardware.
REFERENCES
Ahmed, I., Obermeier, S., Naedele, M., and Richard, G. G.
(2012). Scada systems: Challenges for forensic inves-
tigators. Computer, 45(12):44–51.
Brandle, M. and Naedele, M. (2008). Security for process
control systems: An overview. IEEE Security & Pri-
vacy, 6(6):24–29.
Breeuwsma, I. M. (2006). Forensic imaging of embedded
systems using jtag (boundary-scan). Digital Investi-
gation, 3(1):32 – 42.
Chawathe, S. (2009). Effective whitelisting for filesys-
tem forensics. In Intelligence and Security Informat-
ics, 2009. ISI ’09. IEEE International Conference on,
pages 131–136.
Cohen, M., Bilby, D., and Caronni, G. (2011). Distributed
forensics and incident response in the enterprise. Dig-
ital Investigation, 8, Supplement(0):101 – 110. The
Proceedings of the 11th Annual Digital Forensic Re-
search Workshop (DRFWS ’11).
Dzung, D., Naedele, M., von Hoff, T., and Crevatin, M.
(2005). Security for industrial communication sys-
tems. Proceedings of the IEEE, 93(6):1152–1177.
Hadeli, H., Schierholz, R., Braendle, M., and Tuduce, C.
(2009). Leveraging determinism in industrial con-
trol systems for advanced anomaly detection and re-
liable security configuration. In Proceedings of the
14th IEEE International Conference on Emerging
Technologies & Factory Automation, ETFA’09, pages
1189–1196, Piscataway, NJ, USA. IEEE Press.
Kilpatrick, T., Gonzalez, J., Chandia, R., Papa, M., and
Shenoi, S. (2008). Forensic analysis of scada systems
and networks. Int. J. Secur. Netw., 3(2):95–102.
Kornblum, J. (2006). Identifying almost identical files using
context triggered piecewise hashing. Digital Investi-
gation, 3, Supplement(0):91 – 97. The Proceedings of
the 6th Annual Digital Forensic Research Workshop
(DFRWS ’06).
Langner, R. (2011). Stuxnet: Dissecting a cyberwarfare
weapon. IEEE Security & Privacy, 9(3):49–51.
Marlin, J. (2013). Alternate Data Streams in NTFS. Online:
http://blogs.technet.com/b/askcore/archive/2013/03/2
4/alternate-data-streams-in-ntfs.aspx.
Moser, A. and Cohen, M. I. (2013). Hunting in the enter-
prise: Forensic triage and incident response. Digital
Investigation, 10(2):89 – 98. Triage in Digital Foren-
sics.
Naedele, M. (2007). Addressing IT security for critical con-
trol systems. In HICSS, page 115.
National Institute of Standards and Technology (NIST)
(2009). National Software Reference Library.
Rao Kalapatapu (2004). SCADA Protocols and Communi-
cation Trends. ISA EXPO.
Roussev, V. (2009). Hashing and data fingerprinting in dig-
ital forensics. Security Privacy, IEEE, 7(2):49–55.
Shaw, R. and Atkins, A. (2010). Unified forensic method-
ology for the analysis of embedded systems. Pro-
ceedings of 4th International Conference on Advanced
Computing & Communication Technologies.
US DoJ (2007). Digital Forensic Analysis Methodol-
ogy. Online:http://www.justice.gov/criminal/ cyber-
crime/docs/forensics chart.pdf. Cybercrime Lab in
the Computer Crime and Intellectual Section.
Valli, C. (2009). SCADA Forensics with Snort IDS. In
Proceedings of WORLDCOMP, Security and Manage-
ment, pages 618–621, Las Vegas.
AFrameworkforIncidentResponseinIndustrialControlSystems
185