...
首页> 外文期刊>International Journal of Computer Trends and Technology >Extraction of Persistence and Volatile Forensics Evidences from Computer System
【24h】

Extraction of Persistence and Volatile Forensics Evidences from Computer System

机译:从计算机系统中提取持久性和易失性取证证据

获取原文
   

获取外文期刊封面封底 >>

       

摘要

Forensic Investigations are carried out in order to find who committed a crime, from where and how using a computer system. Considera scenario that in an organization an employee might have disclosed company's private data through the organization's computer. This would result in financial as well as reputation loss. Forensic Investigators need to get an access of all the computers, say, 100 computers throughout the organization. The normal procedure carried out by forensic investigatorsin order to collect the Evidencesis Hard Disk Imagingand further analyzingit in a laboratory.This involves extraction of Persistent and Volatile Data from the Windows Registry as well as the slack space and allocated space.This involves doing the Live Analysis, Dead Analysisor Postmortem for finding the hidden and deleted files from the clusters. This investigation becomes a tedious task when Investigators have to take images of hundreds of hard disks and each of 1 TB. There are many disadvantages of performing this task in terms of time, money and resources. Even there are issues as towhere to securely store 100 TB data. All these questions would make an investigator's task very complex and time consuming. If this time is reduced to half then it would be beneficial to investigators as well as the organizations. Current techniques perform the analysis of a computer systems and help to find evidences but leads to time constraints for any entity. Henceforth, there should be a technique which saves time, money and resources for the organizations and make the job of the investigators easy and less laborious
机译:进行法证调查是为了找出谁犯罪,使用计算机系统的地点和方式。考虑一种情况,在组织中,员工可能已通过组织的计算机泄露了公司的私人数据。这将导致财务和声誉损失。法医调查人员需要访问所有计算机,例如,整个组织中有100台计算机。法医调查人员为了收集证据硬盘成像并在实验室中进行进一步分析而执行的正常程序涉及从Windows注册表中提取持久性数据和易失性数据以及空闲空间和分配的空间这涉及进行实时分析,Dead Analysisor Postmortem,用于从集群中查找隐藏和删除的文件。当调查人员必须拍摄数百个硬盘(每个1 TB)的图像时,此调查变得繁琐。就时间,金钱和资源而言,执行此任务有许多缺点。即使在安全地存储100 TB数据的位置上也存在问题。所有这些问题将使研究人员的任务非常复杂且耗时。如果将时间减少一半,那么对研究人员和组织都是有益的。当前的技术执行计算机系统的分析并帮助找到证据,但是导致任何实体的时间限制。今后,应该有一种技术可以为组织节省时间,金钱和资源,并使研究人员的工作变得轻松而省力

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号