首页> 外文期刊>Journal of digital forensic practice >Automated Windows Memoryfile Extraction For Cyber forensics Investigation
【24h】

Automated Windows Memoryfile Extraction For Cyber forensics Investigation

机译:自动Windows内存文件提取以进行网络取证调查

获取原文
获取原文并翻译 | 示例
           

摘要

In digital forensics, the first step to conducting an investigation is to acquire evidence that is most related to the case. Containing most recently accessed data and information about the status of a system, physical memory is a valuable source of digital evidence. When a process runs or accesses a file, all or some parts of the process's executable or accessed data file are mapped into the physical memory. In this article, we propose various methods to find files and extract them from memory in order to rebuild executable and data files that existed in physical memory at the time of incident. We developed a memory analysis plug-in that uses this automated memory file extraction. Using this tool, we have been able to extract a wide range of data file types, including text, PDF, Java Archives (JAR), various logs, EVT (system event-log files, used by the system event viewer), HTML and many more. Investigators can use the result of this research in order to (1) compare the files found on disk with those extracted from memory to find possible tampering or (2) reconstruct those files that no longer exist on the disk. In addition, they can find the last file modifications that have not been mapped out to the corresponding files on the disk. Memory extracted files can be used for the purpose of correlation analysis along with other sources of evidence such as application or network log files, E-mail files, and data files found on disks.
机译:在数字取证中,进行调查的第一步是获取与案件最相关的证据。物理内存包含最新访问的有关系统状态的数据和信息,是数字证据的宝贵来源。当进程运行或访问文件时,该进程的可执行文件或访问的数据文件的全部或部分会映射到物理内存中。在本文中,我们提出了各种方法来查找文件并将其从内存中提取出来,以便重建事件发生时物理内存中存在的可执行文件和数据文件。我们开发了使用此自动内存文件提取功能的内存分析插件。使用此工具,我们已经能够提取各种数据文件类型,包括文本,PDF,Java存档(JAR),各种日志,EVT(系统事件日志文件,由系统事件查看器使用),HTML和还有很多。研究人员可以使用这项研究的结果,以便(1)将磁盘上找到的文件与从内存中提取的文件进行比较,以发现可能的篡改,或者(2)重建磁盘上不再存在的那些文件。此外,他们可以找到尚未映射到磁盘上相应文件的最后文件修改。提取的内存文件可与其他证据源(例如应用程序或网络日志文件,电子邮件文件和磁盘上的数据文件)一起用于关联分析。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号