md5bloom: Forensic filesystem hashing revisited
نویسندگان
چکیده
Hashing is a fundamental tool in digital forensic analysis used both to ensure data integrity and to efficiently identify known data objects. However, despite many years of practice, its basic use has advanced little. Our objective is to leverage advanced hashing techniques in order to improve the efficiency and scalability of digital forensic analysis. Specifically, we explore the use of Bloom filters as a means to efficiently aggregate and search hashing information. In this paper, we present md5bloom—an actual Bloom filter manipulation tool that can be incorporated into forensic practice, along with example uses and experimental results. We also provide a basic theoretical foundation, which quantifies the error rates associated with the various Bloom filter uses along with a simulation-based verification. We provide a probabilistic framework that allows the interpretation of direct, bitwise comparison of Bloom filters to infer similarity and abnormality. Using the similarity interpretation, it possible to efficiently identify versions of a known object, whereas the notion of abnormality could aid in identifying tampered hash sets.
منابع مشابه
Distributed filesystem forensics: XtreemFS as a case study
Distributed filesystems provide a cost-effective means of storing high-volume, velocity and variety information in cloud computing, big data and other contemporary systems. These technologies have the potential to be exploited for illegal purposes, which highlights the need for digital forensic investigations. However, there have been few papers published in the area of distributed filesystem f...
متن کاملFFCK: The Filesystem Forensics Classifier Kit
Filesystem forensics is a general term to describe the searching and recovery of data that is on a drive that has been damaged or reformatted. There are two common applications for filesystem forensics, data recovery and criminal investigation. Certain factors in the filesystem design can make forensics difficult. If only the raw blocks exist on the disk, then it can be very difficult to determ...
متن کاملProgress of Forensic Tracking Techniques Progress of Forensic Tracking Techniques
Project co-funded by the European Commission within the 6th Framework Programme Dissemination Level PU Public X PP Restricted to other programme participants (including the Commission services) RE Restricted to a group specified by the consortium (including the Commission services) CO Confidential, only for members of the consortium (including the Commission services) Abstract This deliverable ...
متن کاملTesting the Date Maintenance of the File Allocation Table File System
The directory entries used in the File Allocation Table filesystems maintain a significant amount of file metadata that is of interest to a forensic examiner. This information is maintained by the operating system under normal conditions and may be amended by activities undertaken by the computer user. This paper examines the maintenance of date information when files are being moved between di...
متن کاملSystem Support for Forensic Inference
Digital evidence is playing an increasingly important role in prosecuting crimes. The reasons are manifold: financially lucrative targets are now connected online, systems are so complex that vulnerabilities abound and strong digital identities are being adopted, making audit trails more useful. If the discoveries of forensic analysts are to hold up to scrutiny in court, they must meet the stan...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Digital Investigation
دوره 3 شماره
صفحات -
تاریخ انتشار 2006