Procedures for a Harmonised Digital Forensic Process in Live Forensics

نویسندگان

  • George Sibiya
  • H. S. Venter
  • Thomas Fogwill
چکیده

Cloud computing is a novel computing paradigm that presents new research opportunities in the field of digital forensics. Cloud computing is based on the following principles: on-demand self-service, broad network access, resource pooling, rapid elasticity and measured service. These principles require that cloud computing be distributed internationally. Even if the cloud is hosted locally, it is based on multi tenancy, which is a challenge when using an advanced "dead" forensic approach. For these reasons, digital forensic investigations in cloud computing need to be performed on live systems. There are challenges in cloud forensics itself, as there are no standardised digital forensic procedures and processes. This paper is part of an effort by the authors to standardise the digital forensic process, and we therefore focus specifically on live forensics. Since cloud computing services are provisioned over the Internet, live forensics and network forensics form an integral part of cloud forensics. In a bid to standardise a digital forensic process in cloud computing, there is a need to first focus on live forensics and network forensics. In this paper we present digital forensic procedures on live forensics that follow the draft international standard for Investigation Principles and Processes. A standardised live digital forensic process will form part of a standardised cloud forensic process.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Case-Based Reasoning in Live Forensics

The traditional forensic search and seizure process employed by law enforcement is not always appropriate given large data volumes and the potential of hard drive encryption. This paper proposes a framework built on case-based reasoning to support a live forensic response during the search and seizure process. The framework assists a first responder by identifying the risks and the procedures t...

متن کامل

Analyzing registry, log files, and prefetch files in finding digital evidence in graphic design applications

The products of graphic design applications leave behind traces of digital information which can be used during a digital forensic investigation in cases where counterfeit documents have been created. This paper analyzes the digital forensics involved in the creation of counterfeit documents. This is achieved by first recognizing the digital forensic artifacts left behind from the use of graphi...

متن کامل

A Platform for the Evaluation of Live Digital Forensics

Live digital forensics presents unique challenges with respect to maintaining forensic soundness, but also offers the ability to examine information that is unavailable to quiescent analysis. Any perturbation of a live operating system by a forensic examiner will have far-reaching effects on the state of the system being analysed. Numerous approaches to live digital forensic evidence acquisitio...

متن کامل

Tool review - remote forensic preservation and examination tools

Forensic tools are emerging to help digital investigators preserve evidence on live, remote systems. These tools are applying the precepts of digital forensics to incident response, enterprise policy enforcement, and electronic data discovery. This paper discusses the strengths and shortcomings of ProDiscover IR and EnCase Enterprise Edition in the context of the overall digital investigation p...

متن کامل

Pypette: A Platform for the Evaluation of Live Digital Forensics

Live digital forensics presents unique challenges with respect to maintaining forensic soundness, but also offers the ability to examine information that is unavailable to quiescent analysis. Any perturbation of a live operating system by a forensic examiner will have far-reaching effects on the state of the system being analysed. Numerous approaches to live digital forensic evidence acquisitio...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012