<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Results of Live Response Inquiry vs. Memory Image Analysis</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Maksim Ogur</string-name>
          <email>ogur26@mail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Alexey Dmitrienko</string-name>
          <email>admitrienko770@gmail.com</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Mikhail Kotlov</string-name>
          <email>mikhailits161@yandex.ru</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>North-Caucasus Federal University</institution>
          ,
          <addr-line>Prospect Kulakova, 2, 355000, Stavropol</addr-line>
          ,
          <country country="RU">Russia</country>
        </aff>
      </contrib-group>
      <fpage>118</fpage>
      <lpage>126</lpage>
      <abstract>
        <p>People responsible for computer security incident response and digital forensic examination need to continually update their skills, tools, and knowledge to keep pace with changing technology. No longer able to simply unplug a computer and evaluate it later, examiners must know how to capture an image of the running memory and perform volatile memory analysis using various tools, such as PsList, ListDLLs, Handle, Netstat, FPort, Userdump, Strings, and PSLoggedOn. This paper presents a live response scenario and compares various approaches and tools used tocapture and analyze evidence from computer memory.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Forensic</kwd>
        <kwd>Live Response</kwd>
        <kwd>Memory image analysis</kwd>
        <kwd>security operations</kwd>
        <kwd>files</kwd>
        <kwd>sessions</kwd>
        <kwd>dashboard</kwd>
        <kwd>volatile memory</kwd>
        <kwd>drawbacks</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>Live response gives security operations teams instantaneous access to a device (also referred to as
a machine) using a remote shell connection. This gives you the power to do in-depth investigative
work and take immediate response actions to promptly contain identified threats in real time.</p>
      <p>Live response is designed to enhance investigations by enabling your security operations team to
collect forensic data, run scripts, send suspicious entities for analysis, remediate threats, and
proactively hunt for emerging threats.</p>
      <p>
        As in [
        <xref ref-type="bibr" rid="ref19">19</xref>
        ] authors says, that a special place among IT is occupied by information technology
security, which represent the methods and resources necessary to prevent unauthorized access, usage,
disclosure, distortion, modification or destruction of information. These information technologies
have found application in electronic payment systems (EPS), which process electronic network-based
money. Thanks to the use of authentication protocols with zero knowledge disclosure, EPS provide a
high protection degree of information transmitted via open Internet channels, anonymity of money
owners and security of transactions.
      </p>
      <p>
        In [
        <xref ref-type="bibr" rid="ref27">27</xref>
        ] The proposed logical-probabilistic model is associated with the use of the specifics of the
regulatory and legal framework in the field of SCII safety; structured detailing of the CII subject,
taking into account the specifics of the subject; stages of the life cycle of the SCII information
protection system; highlighted destructive malicious influences of an infrastructural nature;
interrelationships of the selected destructs with a number of vulnerabilities on CII objects.
      </p>
      <p>
        Authors of [
        <xref ref-type="bibr" rid="ref22">22</xref>
        ] says about attacks on CPS`s, based on the analysis of changes in network node
parameters. One of the main purposes of their work is development a methodology for evaluating the
ability of the catch to demonstrate trusted behavior in the normal operation of the network and during
attacks.
      </p>
      <p>All of this suggests that the problem of choice and optimizing between live response and static
analysis is quite extensive in the tasks of computer forensics.</p>
      <sec id="sec-1-1">
        <title>Take or undo remediation actions.</title>
      </sec>
    </sec>
    <sec id="sec-2">
      <title>2.1. Live response dashboard overview</title>
    </sec>
    <sec id="sec-3">
      <title>2. Basic tasks</title>
      <sec id="sec-3-1">
        <title>With live response, analysts can do all of the following tasks:</title>
      </sec>
      <sec id="sec-3-2">
        <title>Run basic and advanced commands to do investigative work on a device. Download files such as malware samples and outcomes of PowerShell scripts. Download files in the background (new!). Upload a PowerShell script or executable to the library and run it on a device from a tenant</title>
        <p>During initiation of a live response session on a device, a dashboard opens. The dashboard provides
information about the session such as the following:
● Who created the session
● When the session started
● The duration of the session
The dashboard also gives you access to:
● Disconnect session
● Upload files to the library
● Command console
● Command log
2.2.</p>
        <p>Initiation of a live response session on a device (Windows platform)
● Sign in to Microsoft 365 Defender portal.
● Navigate to Endpoints &gt; Device inventory and select a device to investigate. The devices page
opens.
● Launch the live response session by selecting Initiate live response session. A command
console is displayed. Wait while the session connects to the device.
● Use the built-in commands to do investigative work. For more information, see Live response
commands.</p>
        <p>● After completing your investigation, select Disconnect session, then select Confirm.
2.3.</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Live response dashboard overview</title>
      <p>The traceability matrix of Table 1 is a mapping of the capabilities of live response and memory
analysis tools during an investigation of a memory image (or running memory). The Live Response
part of Figure 1 lists the tools used in live response, and the Memory Analysis part shows tools that
analyze physical memory dumps. This section contains hints for creating and maintaining Word files
and suggestions for avoiding common mistakes.</p>
      <p>In our virtual environment scenario, we start with a Windows XP Service Pack 2 virtual machine
with an IP address of 192.168.203.132. Netcat was used to establish a telnet connection on port 4444
(PID: 3572) with a second machine at 192.168.203.133. MACSpoof was also installed and running
(PID: 3008). This machine was then compromised by installing the FUTo rootkit and a ProRat server
listening on port 5110. The netcat and MACSpoof processes were then hidden using the FUTo rootkit.
In the following sections, we present two possible techniques to approach the compromised system
and we discuss what details are visible and invisible concerning the various compromises using each
approach. The first approach we present is a live response process using sys-internal style tools. The
second is a static memory dump analysis using open source memory analysis tools. Finally, we discuss
the benefits and drawbacks of both approaches.
2.4.</p>
    </sec>
    <sec id="sec-5">
      <title>Live Response</title>
      <p>The first approach is live response. Here an investigator would first establish a trusted command
shell. In addition, they would establish a method for transmitting and storing the information on a data
collection system of some sort. One option is to redirect the output of the commands on the
compromised system to the data collection system. One popular tool is netcat, a network utility that
transmits data across network connections. Another approach would be to insert a USB drive and write
all query results to that external drive. Finally, investigators would attempt to bolster the credibility of
the tool output in court. During a live interrogation of a system, it is important to realize that the state
of the running machine is not static. This could lead to the same query producing different results
based on when it is run. Therefore, hashing the memory is not effective. Rather, an investigator could
compute a cryptographic checksum of the tool outputs and make a note of this hash value in the log.
This would help dispel any notion that the results had been altered after the fact. In this exercise,
HELIX (a live response and Linux bootable CD), was used to establish a trusted command shell.</p>
      <p>Once the above data collection setup is complete, an investigator can begin to collect evidence
from the compromised system. The sys-internal style tools used in this exercise are not meant to be
an exhaustive list. Rather, they are representative of the types of tools available. The common thread
for the tools used is that each relies on native API calls to some degree, and thus the results are filtered
through the operating system. The tools used in this case were PsList, ListDLLs, Handle, Netstat,
FPort, Userdump, Strings, and PSLoggedOn.</p>
      <p>PsList allows investigators to view process and thread statistics on a system. Applying PsList
reveals all running processes on the system but does not reveal the presence of the rootkit or the other
processes that the rootkit has hidden (netcat and MACSpoof).</p>
      <p>ListDLLs allows investigators to view the currently loaded DLLs for a process. Applying ListDLLs
reveals the DLLs loaded by all running processes. However, since there are processes that are hidden,
ListDLLs cannot show the DLLs loaded for them. Thus, critical evidence that could reveal the
presence of the rootkit is missed. The problem is that an attacker may have compromised the Windows
API upon which an investigator’s toolkit depends. To a degree, this is the case with our scenario. As
a result, rootkit manipulation cannot be easily detected with these tools. A more sophisticated and
nonintrusive approach is necessary to find what could be critical evidence.</p>
      <p>The Handle utility allows investigators to view open handles for any process. It reveals the open
files for all the running processes, which includes the path to the file. In this case, one of the сommand
shells is running from a directory labeled …\FUTo\EXE. This is a strong hint of the presence of the
FUTo rootkit. Similarly, there is another instance of cmd.exe running from C:\tools\nc11nt. The
nc11nt folder is a default for the windows distribution of netcat. While it is useful to show the
implications of the tool results, it is important to remember that simply renaming these directories or
running the cmd.exe from a different directory would have prevented these disclosures.</p>
      <p>The Netstat utility allows investigators to view the network connections of a running machine.
Nestat (with the –an option) reveals nothing immediately suspicious in this case.</p>
    </sec>
    <sec id="sec-6">
      <title>3. Analysis</title>
      <p>Thus far, was described incident response approaches to the scenario discussed. The approach is
the well-known live response where an investigator surveys the crime scene, collects the evidence,
and at the same time probes for suspicious activity. The approach is the relatively new field of volatile
memory analysis where an investigator collects the memory dump and performs analysis in an isolated
environment. In different approaches, was described what types of information gave an investigator
insight into the scenario. Now, it will be discussed some of the issues with live response that hinder
effective analysis of a digital crime scene. It also will be discussed why volatile memory analysis
should be the ideal approach to investigating cyber crime. While the purpose of live response is to
collect all relevant evidence from the system that will likely be used to confirm whether an incident
occurred, the implementation of the process has significant setbacks, including the following:
● First Responder toolkit may rely on Windows API: The problem is that if an attacker
compromises the system and changes system files without an investigator suspecting, then an
investigator could collect a large amount of evidence that is based on compromised sources. As a
result, this would damage the credibility of the analysis in a court of law.
● Live response is not repeatable: The information in memory is volatile and with every passing
second, bytes are being overwritten. As we saw in our scenario, the tools may produce the correct
output and in themselves can be verified by a third-party expert. However, the input data supplied
to them can never be reproduced. As a result, this puts the evidence collected at risk in a court of
law. Therefore, it becomes difficult for investigators to prove the correctness of their analysis of
the evidence. [Walters 2007].
● Investigators cannot ask new questions later: The live response process does not support
examination of the evidence in a new way. This is mainly because the same inputs to the tools from
the collection phase cannot be reproduced. As a result, investigators cannot ask new questions later
on in the analysis phase of the investigation [Walters 2007]. By the analysis phase, it becomes
impossible to learn anything new about the compromise. In addition, as we saw in our scenario,
once critical evidence is missed during collection, it can never be recovered again. It damages the
case against the attacker.</p>
      <p>On the other hand, a volatile memory analysis shows promise in that the only source of evidence
is the physical memory dump. Moreover, collection of physical memory has become more commonly
practiced. An investigator can then build the case by analyzing the memory dump in an isolated
environment that is non-obtrusive to the evidence. Thus, volatile memory analysis addresses the
drawbacks facing live response as follows:
● It limits impact to the compromised system: Unlike live response, memory analysis uses a
simplified approach to investigating a crime scene. It involves merely extracting the memory dump
and minimizes the fingerprint left on the compromised system. In addition, the nature of live
response puts the analysis of the evidence at risk in a court of law. As a result, an investigator gets
the added benefit of analyzing the memory dump fully confident that the impact to the data is
minimal.
● Analysis is repeatable: Since the memory dumps are analyzed directly and in isolated
environments, this allows for multiple sources to validate and repeat the analysis. We saw this in
our scenario, where the hidden malware processes were identified by the two tools. In addition, it
allows for conclusions made by investigators to be verified by third-party experts. Essentially, it
improves the credibility of the analysis in a court of law.
● Nature of analysis supports asking new questions later: Contrary to live response, memory
analysis allows investigators with more expertise, technique, or understanding to ask new questions
later on in the investigation [Walters 2007]. We saw this in our scenario. Our initial analysis of the
memory dump with Volatility gave us some suspicion of a rootkit being present on the system. We
later confirmed this with evidence of the terminated rootkit process using the Lsproc script. This
important evidence may have been missed in a live response.</p>
      <p>One of the greatest drawbacks with volatile memory analysis is that the tools’ support has not
matured enough. This is because with every release of a new operating system, the physical memory
structure changes. Development of memory analysis tools has been gaining velocity recently, but the
kinks still remain. This is an emerging field and new ground is being broken across the area of study.</p>
    </sec>
    <sec id="sec-7">
      <title>4. Acknowledgements</title>
      <p>The work was carried out using the equipment of the Center for Collective Use of North-Caucasus
Federal University with financial support from the Ministry of Science and Higher Education of
Russian Federation, unique project identifier RF —— 2296.61321X0029 (agreement no.
075-152021-687).</p>
    </sec>
    <sec id="sec-8">
      <title>5. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <surname>Carrier</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          2019 Open Source Digital Forensics Tools
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <surname>Olajide</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Savage</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Ndzi</surname>
            ,
            <given-names>D.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Al-Sinani</surname>
            ,
            <given-names>H. 2018</given-names>
          </string-name>
          <article-title>Forensic Live Response and Event Reconstruction Methods in Linux Systems</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <surname>Thomas</surname>
            ,
            <given-names>D.S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Forcht</surname>
            ,
            <given-names>K.A.</given-names>
          </string-name>
          <year>2004</year>
          <article-title>Legal methods of using computer forensics techniques for computer crime analysis and investigation (Issues Inf</article-title>
          .
          <source>Syst</source>
          .
          <year>2004</year>
          , 5) pp
          <fpage>692</fpage>
          -
          <lpage>698</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <surname>Harrell</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          <year>2011</year>
          <article-title>What's a Timeline</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <surname>Esposito</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ; Peterso,
          <string-name>
            <surname>G.</surname>
          </string-name>
          2013
          <source>Creating Super Timelines in Windows Investigations (Proceedings of the 9th International Conference on Digital Forensics</source>
          , Orlando, FL, USA,
          <fpage>28</fpage>
          -
          <lpage>30</lpage>
          January
          <year>2013</year>
          ) pp.
          <fpage>135</fpage>
          -
          <lpage>144</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <surname>James</surname>
            ,
            <given-names>J.I.</given-names>
          </string-name>
          ; Gladyshev, P.
          <source>Automated inference of past action instances in digital investigations) Int. J. Inf. Secur</source>
          .
          <year>2015</year>
          , 14) pp
          <fpage>249</fpage>
          -
          <lpage>261</lpage>
          , https://doi.org/10.1007/s10207-014-0249-6.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <surname>Inglot</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Liu</surname>
            ,
            <given-names>L.</given-names>
          </string-name>
          <year>2014</year>
          <article-title>Enhanced Timeline Analysis for Digital Forensic Investigations. (</article-title>
          <string-name>
            <given-names>Inf. Secur. J.</given-names>
            <surname>Glob</surname>
          </string-name>
          . Perspect.
          <year>2014</year>
          , 23) pp
          <fpage>32</fpage>
          -
          <lpage>44</lpage>
          , https://doi.org/10.1080/19393555.
          <year>2014</year>
          .
          <volume>897401</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <surname>Guðjónsson</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          <year>2010</year>
          <article-title>Mastering the Super Timeline Who Am I?</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <surname>Sitompul</surname>
            ,
            <given-names>O.S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Handoko</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Rahmat</surname>
            ,
            <given-names>R.F.</given-names>
          </string-name>
          <year>2018</year>
          <article-title>File Reconstruction in Digital Forensic (TELKOMNIKA Indones</article-title>
          .
          <source>J. Electr. Eng</source>
          .
          <year>2018</year>
          , 16) pp
          <fpage>776</fpage>
          -
          <lpage>794</lpage>
          , https://doi.org/10.12928/TELKOMNIKA.
          <year>v16i2</year>
          .
          <fpage>8230</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <surname>Cho</surname>
            ,
            <given-names>G.S. 2013</given-names>
          </string-name>
          <article-title>A computer forensic method for detecting timestamp forgery in NTFS (Comput</article-title>
          . Secur.
          <year>2013</year>
          , 34) pp
          <fpage>36</fpage>
          -
          <lpage>46</lpage>
          , https://doi.org/10.1016/j.cose.
          <year>2012</year>
          .
          <volume>11</volume>
          .003.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Kalber</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Dewald</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Freiling</surname>
            ,
            <given-names>F.C.</given-names>
          </string-name>
          <year>2013</year>
          <article-title>Forensic application-fingerprinting based on file system metadata (Proceedings of the Seventh International Conference on IT Security Incident Management and</article-title>
          IT Forensics, Nuremberg, Germany,
          <fpage>12</fpage>
          -
          <lpage>14</lpage>
          March
          <year>2013</year>
          ) pp
          <fpage>98</fpage>
          -
          <lpage>112</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12]
          <string-name>
            <surname>Bang</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Yoo</surname>
            ,
            <given-names>B.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kim</surname>
            ,
            <given-names>J.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>S. 2009</given-names>
          </string-name>
          <article-title>Analysis of time information for digital investigation (Proceedings of the Fifth International Joint Conference on INC, IMS</article-title>
          and
          <string-name>
            <surname>IDC</surname>
          </string-name>
          , Seoul, Korea,
          <fpage>25</fpage>
          -
          <lpage>27</lpage>
          August
          <year>2009</year>
          ) pp
          <fpage>1858</fpage>
          -
          <lpage>1864</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13]
          <string-name>
            <surname>Chabot</surname>
            ,
            <given-names>Y.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Bertaux</surname>
            ,
            <given-names>A.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Nicolle</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Kechadi</surname>
            ,
            <given-names>M.T. 2014</given-names>
          </string-name>
          <article-title>A complete formalized knowledge representation model for advanced digital forensics timeline analysis (Digit</article-title>
          . Investig.
          <year>2014</year>
          , 11) pp
          <fpage>95</fpage>
          -
          <lpage>105</lpage>
          , https://doi.org/10.1016/j.diin.
          <year>2014</year>
          .
          <volume>05</volume>
          .009.
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14]
          <string-name>
            <surname>Hargreaves</surname>
            ,
            <given-names>C.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Patterson</surname>
            ,
            <given-names>J. 2012</given-names>
          </string-name>
          <article-title>An automated timeline reconstruction approach for digital forensic investigations (Digit</article-title>
          . Investig.
          <year>2012</year>
          , 9) pp
          <fpage>69</fpage>
          -
          <lpage>79</lpage>
          , https://doi.org/10.1016/j.diin.
          <year>2012</year>
          .
          <volume>05</volume>
          .006.
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [15]
          <string-name>
            <surname>Brady</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Overill</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          <year>2015</year>
          DESO:
          <article-title>Addressing volume and variety in large scale criminal cases (Digit</article-title>
          . Investig.
          <year>2015</year>
          , 88) pp
          <fpage>72</fpage>
          -
          <lpage>825</lpage>
          , https://doi.org/10.1016/j.diin.
          <year>2015</year>
          .
          <volume>10</volume>
          .002.
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16]
          <string-name>
            <surname>Brady</surname>
            ,
            <given-names>O.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Overill</surname>
            ,
            <given-names>R.</given-names>
          </string-name>
          ; Keppens,
          <string-name>
            <surname>J.</surname>
          </string-name>
          <year>2014</year>
          <article-title>Addressing the increasing volume and variety of digital evidence using an ontology (Proceedings of the 2014 IEEE Joint Intelligence</article-title>
          and Security Informatics Conference, Hague, The Netherlands,
          <fpage>24</fpage>
          -
          <issue>26</issue>
          <year>September 2014</year>
          ) pp
          <fpage>176</fpage>
          -
          <lpage>183</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [17]
          <string-name>
            <surname>Debinski</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Breitinger</surname>
            ,
            <given-names>F.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Mohan</surname>
            ,
            <given-names>P.</given-names>
          </string-name>
          <year>2019</year>
          Timeline2GUI:
          <article-title>A Log2timeline CSV parser and training scenarios (Digit</article-title>
          . Investig.
          <year>2019</year>
          , 28) pp
          <fpage>34</fpage>
          -
          <lpage>43</lpage>
          , https://doi.org/10.1016/j.diin.
          <year>2018</year>
          .
          <volume>12</volume>
          .004.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18]
          <string-name>
            <surname>Soltani</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          ;
          <string-name>
            <surname>Seno</surname>
            ,
            <given-names>S.A.H.</given-names>
          </string-name>
          ; Yazdi,
          <string-name>
            <surname>H.S.</surname>
          </string-name>
          <year>2019</year>
          <article-title>Event reconstruction using temporal pattern of file system modification (IET Inf</article-title>
          . Secur.
          <year>2019</year>
          , 13) pp
          <fpage>201</fpage>
          -
          <lpage>212</lpage>
          , DOI:10.1049/iet-ifs.
          <year>2018</year>
          .
          <volume>5209</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19]
          <string-name>
            <surname>Chistousov</surname>
            ,
            <given-names>N.K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalmykov</surname>
            ,
            <given-names>I.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Kalmykov</surname>
            ,
            <given-names>M.I.</given-names>
          </string-name>
          <article-title>Application of Information Security Technologies for Improving the Imitation Resistance of Low-Orbital Satellite Communication Systems</article-title>
          .
          <source>Lecture Notes in Networks and System</source>
          ,
          <year>2021</year>
          ,
          <volume>228</volume>
          , pp.
          <fpage>54</fpage>
          -
          <lpage>63</lpage>
          , https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -77448-
          <issue>6</issue>
          _
          <fpage>6</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>
          [20]
          <string-name>
            <surname>Grigoryan</surname>
            ,
            <given-names>K.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Olefirenko</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mecella</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>Analysis of Security Problems in Groups of Intelligent Sensors</article-title>
          .
          <source>Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          ,
          <year>2021</year>
          ,
          <volume>12689</volume>
          LNCS, pp.
          <fpage>26</fpage>
          -
          <lpage>37</lpage>
          , https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -78743-
          <issue>1</issue>
          _
          <fpage>3</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mudruk</surname>
            ,
            <given-names>N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Abramov</surname>
            ,
            <given-names>E.</given-names>
          </string-name>
          <article-title>Intelligent Intrusion Detection System for a Group of UAVs</article-title>
          , Lecture Notes in Computer Science,
          <year>2021</year>
          ,
          <volume>12690</volume>
          LNCS, pp.
          <fpage>230</fpage>
          -
          <lpage>240</lpage>
          , https://doi.org/10.1007/978-3-
          <fpage>030</fpage>
          -78811-7_
          <fpage>22</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22]
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>A.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapin</surname>
            ,
            <given-names>V.G.</given-names>
          </string-name>
          <article-title>Behavior-Based Assessment of Trust in a Cyber-Physical System</article-title>
          .
          <source>Communications in Computer and Information Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)</source>
          ,
          <year>2021</year>
          ,
          <volume>1395</volume>
          CCIS, pp.
          <fpage>190</fpage>
          -
          <lpage>201</lpage>
          , https://doi.org/10.1007/
          <fpage>978</fpage>
          -981-16-1480-4_
          <fpage>17</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23]
          <string-name>
            <surname>Privalov</surname>
            ,
            <given-names>A.N.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bogatyreva</surname>
            ,
            <given-names>Y.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapin</surname>
            ,
            <given-names>V.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mysina</surname>
            ,
            <given-names>Y.A.</given-names>
          </string-name>
          <article-title>Decision support information system for patient treatment</article-title>
          procedures in hospital // CEUR Workshop Proceedings,
          <year>2021</year>
          ,
          <volume>2914</volume>
          , pp.
          <fpage>441</fpage>
          -
          <lpage>448</lpage>
          , http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2914</volume>
          /paper44.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24]
          <string-name>
            <surname>Maria</surname>
            <given-names>Lapina</given-names>
          </string-name>
          , Ksenia Lokhacheva,
          <string-name>
            <given-names>Denis</given-names>
            <surname>Parfenov</surname>
          </string-name>
          .
          <article-title>Designing of Information System for Semantic Analysis and Classification of Issues in Service Desk System /</article-title>
          / YRID-2020
          <source>Proceedings of the International Workshop on Data Mining and Knowledge Engineering Stavropol, Russia, October 15-16</source>
          ,
          <year>2020</year>
          . CEUR Workshop Proceedings,
          <year>2021</year>
          ,
          <volume>2842</volume>
          , Pр.
          <fpage>70</fpage>
          -
          <lpage>76</lpage>
          , http://ceur-ws.
          <source>org/</source>
          Vol-
          <volume>2842</volume>
          /paper_8.pdf.
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25]
          <string-name>
            <surname>Parfenov</surname>
            ,
            <given-names>D.I.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Bolodurina</surname>
            ,
            <given-names>I.P.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.</given-names>
          </string-name>
          <article-title>A. Development of a model for detecting security incidents in event flows from various components in a network of telecommunication service providers /</article-title>
          <source>/ IOP Conference Series: Materials Science and Engineering</source>
          <year>2020</year>
          ,
          <volume>873</volume>
          (
          <issue>1</issue>
          ), 012020, https://doi.org/10.1088/
          <fpage>1757</fpage>
          -899X/873/1/012020.
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26]
          <string-name>
            <surname>Proshkin</surname>
            ,
            <given-names>N.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Basan</surname>
            ,
            <given-names>E.S.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapina</surname>
            ,
            <given-names>M.A.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Klepikova</surname>
            ,
            <given-names>A.G.</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Lapin</surname>
            ,
            <given-names>V.G.</given-names>
          </string-name>
          <article-title>Developing models of IoT infrastructures to identify vulnerabilities and</article-title>
          analyse threats // IOP Conference Series: Materials Science and Engineering,
          <year>2020</year>
          ,
          <volume>873</volume>
          (
          <issue>1</issue>
          ),012018, https://doi.org/10.1088/
          <fpage>1757</fpage>
          - 899X/873/1/012018.
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27]
          <string-name>
            <given-names>E. A.</given-names>
            <surname>Maksimova</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M. A.</given-names>
            <surname>Lapina</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V. V.</given-names>
            <surname>Baranov</surname>
          </string-name>
          and
          <string-name>
            <surname>O. S. Lauta</surname>
          </string-name>
          <article-title>The logical-probabilistic model for assessing the information security assessing of the critical information infrastructure subject under destructive influences</article-title>
          .
          <source>2nd Scientific Conference on Fundamental Information Security Problems in terms of the Digital Transformation (FISP</source>
          <year>2020</year>
          )
          <article-title>30 November 2020</article-title>
          , Stavropol,
          <string-name>
            <given-names>Russian</given-names>
            <surname>Federation</surname>
          </string-name>
          .
          <source>- IOP Conference Series: Materials Science and Engineering</source>
          , Vol.
          <volume>873</volume>
          ,
          <year>2021</year>
          ,
          <volume>012035</volume>
          . https://doi.org/10.1088/
          <fpage>1757</fpage>
          -899X/1069/1/012035.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>