Secure, Audited Processing of Digital Evidence: Filesystem Support for Digital Evidence Bags
نویسندگان
چکیده
Traditional digital forensics methods capture, preserve, and analyze digital evidence in standard electronic containers: images of seized hard drives (e.g., created using the Unix dd command) are stored in regular files and documents are typically processed “as is”. Auditing of a digital investigation, from identification and seizure of evidence through duplication and investigation is essentially ad hoc, recorded in separate log files or in an investigator’s case notebook. Auditing performed in this fashion is bound to be incomplete, because different tools provide widely disparate amounts of auditing information. Over the course of an investigation, a piece of digital evidence may be touched by many different tools, some of which generate no audit trail of their actions (e.g., dd or the command line tools of the Sleuth Kit) and some that generate their own audit logs (e.g., FTK). At the end, an investigator is left to piece together these bits of audit trail to create a comprehensive view of what occurred during the investigation. Digital Evidence Bags (DEBs) are a recently proposed mechanism for bundling digital evidence, associated metadata, and audit logs into a single structure. DEBs categorize the digital evidence they contain and provide a mechanism for associating an audit log that details the investigative processes that have been applied throughout an investigation. DEB-compliant applications can update a DEB’s audit log as evidence is introduced into the bag and as data in the bag is processed. This paper investigates native filesystem support for DEBs, which has a number of benefits over ad hoc modification of digital evidence bags. The first is that some of the advantages of DEBs can be realized even for current generation tools which are DEB-unaware, since a DEB-enabled filesystem can transparently offer the contents of a digital bag to such tools, while automatically updating the DEB’s metadata and audit log. Another advantage, even for DEB-enabled tools, is that the code for updating a DEB, both for introducing and removing items and for updating the audit log, needs to be certified only once. Finally, a stan-
منابع مشابه
Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications
The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...
متن کاملDigital Evidence Cabinets: A Proposed Framework for Handling Digital Chain of Custody
Chain of custody is the procedure to do a chronological documentation of evidence, and it is an important procedure in the investigation process. Both physical and digital evidence is an important part in the process of investigation and courtroom. However, handling the chain of custody for digital evidence is more difficult than the handling of physical evidence. Nevertheless, the handling of ...
متن کاملAn open architecture for digital evidence integration
Recently the need for “digital evidence bags” – a common storage format for digital evidence – has been identified as a key requirement for enabling inter-organisational sharing of digital evidence, and interoperability between forensic analysis tools. Recent work has described an ontology based approach to correlation of event log based evidence, using semantic web technologies for describing ...
متن کاملSystem Support for Forensic Inference
Digital evidence is playing an increasingly important role in prosecuting crimes. The reasons are manifold: financially lucrative targets are now connected online, systems are so complex that vulnerabilities abound and strong digital identities are being adopted, making audit trails more useful. If the discoveries of forensic analysts are to hold up to scrutiny in court, they must meet the stan...
متن کاملChapter 23 SYSTEM SUPPORT FOR FORENSIC INFERENCE
Digital evidence is playing an increasingly important role in prosecuting crimes. The reasons are manifold: financially lucrative targets are now connected online, systems are so complex that vulnerabilities abound and strong digital identities are being adopted, making audit trails more useful. If the discoveries of forensic analysts are to hold up to scrutiny in court, they must meet the stan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2006