Structured investigation of digital incidents in complex computing environments
نویسنده
چکیده
Critics, unimpressed by the rigor of the forensic digital examination process, have taken the position that forensic digital analysis is, more rightly, simply little more than ad hoc data collection and analysis. The reality is that forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology. Struggling to keep pace with the giant steps taken in recent years by the computing industry, forensic digital analysis is, as are many defensive computing technologies, at the mercy of ever more new and complex computing approaches. Chief among these new paradigms is the need to analyze forensic materials over complex chains of evidence that may range around the globe over a wide variety of heterogeneous computing platforms, environments and transports. This paper discusses a formalized approach to the forensic collection, management and analysis of digital evidence involved in complex cases occurring over complex networks. Its objective is to begin the processes of instilling the same rigor in the practice of forensic digital analysis that exists in many other branches of forensic science. 1.0 Background and Problem Statement In August of 2001 over 50 university researchers, computer forensic examiners and analysts attended the first Digital Forensic Research Workshop (DFRWS) in Utica, New York. Although the objective of the workshop was the forming of the beginnings of a community to engage in research involving digital forensics, much more actually came out of the effort. Perhaps the most important contribution to the near term goals of incorporating appropriate rigor into the science of forensic digital analysis was the definition of what the state of the practice must be to approach the status of an accepted science. [DFRWS01] The workshop defined a “generic investigative process that can be applied to all (or the majority of) investigations involving digital systems and networks.” The generic process, as defined at the time is: • Identification • Preservation • Collection • Examination • Analysis • Presentation • Decision For our purposes we will accept this top level process and develop our approach around it.
منابع مشابه
A comprehensive approach to digital incident investigation
The investigation of digital incidents and computer-related crimes has, over the past 18 months, become increasingly complex. Although the majority of digital incidents investigated by law enforcement still comprise child pornography, on-line frauds and other common crimes, two disturbing trends have emerged. First, digital incidents are becoming more complex and, second, they are becoming more...
متن کاملA semantic-aware role-based access control model for pervasive computing environments
Access control in open and dynamic Pervasive Computing Environments (PCEs) is a very complex mechanism and encompasses various new requirements. In fact, in such environments, context information should be used in access control decision process; however, it is not applicable to gather all context information completely and accurately all the time. Thus, a suitable access control model for PCEs...
متن کاملDetermining Training Needs for Cloud Infrastructure Investigations Using I-STRIDE
As more businesses and users adopt cloud computing services, security vulnerabilities will be increasingly found and exploited. There are many technological and political challenges where investigation of potentially criminal incidents in the cloud are concerned. Security experts, however, must still be able to acquire and analyze data in a methodical, rigorous and forensically sound manner. Th...
متن کاملA context-sensitive dynamic role-based access control model for pervasive computing environments
Resources and services are accessible in pervasive computing environments from anywhere and at any time. Also, due to ever-changing nature of such environments, the identity of users is unknown. However, users must be able to access the required resources based on their contexts. These and other similar complexities necessitate dynamic and context-aware access control models for such environmen...
متن کاملA Digital Investigation Tool based on Data Fusion in Management of Cyber Security Systems
With overwhelming use of Internet, security in Cyberspace has become a prime concern. The forensic digital analysis as a whole, in its relative infancy, is the unwilling victim of the rapid advancement of computer technology, so it is at the mercy of ever more new and complex computing approaches. Forensic digital analysis is unique among the forensic sciences in that it is inherently mathemati...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Information Systems Security
دوره 12 شماره
صفحات -
تاریخ انتشار 2003