首页> 外文OA文献 >Forensic computing : exploring paradoxes : an investigation into challenges of digital evidence and implications for emerging responses to criminal, illegal and inappropriate on-line behaviours
【2h】

Forensic computing : exploring paradoxes : an investigation into challenges of digital evidence and implications for emerging responses to criminal, illegal and inappropriate on-line behaviours

机译:取证计算:探索悖论:调查数字证据的挑战以及对犯罪,非法和不当在线行为的新反应的含义

摘要

This research thesis explores technical, legal and organisational challenges ofuddigital evidence and the implications of their inter-relationships for responsesudto criminal, illegal and inappropriate on-line behaviours. From a forensicudcomputing perspective the solutions to these challenges have tended to focusudon discrete sets of technical, legal or organisational issues individually. Lack ofudunderstanding of the inter-relationships between these issues is inhibiting theuddevelopment of integrated and coordinated solutions that can effectivelyudbalance requirements for the generation of legally admissible digital evidence,ude-security and privacy. More significantly, this research highlights that theudfragmented nature of these discrete approaches may be impairing the overalludeffectiveness of the responses developed.udThe methodological framework underpinning this exploratory research adoptsuda subjective ontology and employs an interpretative epistemology. Theudresearch strategy involves the examination of three cases on technical, legaludand organisational challenges of digital evidence respectively. Each case isudanalysed independently and the interpretation and discussion adopts a forensicudcomputing perspective to interpret and discuss the inter-relationships acrossudthese areas and to explore the implications for digital evidence and theudunderlying problematic on-line behaviours. Case A examines the validity ofudquantitative data collected by running a network intrusion detection systemud(NIDS) SNORT on University network. Case B examines an AustralianudFederal Court case illustrating legal arguments applied to digital evidence, itsuddiscovery and presentation. Case C examines the Cyber Tools On-line Searchudfor Evidence (CTOSE) project highlighting the difficulties of developing andudimplementing organisational level processes for digital evidence handling.udAnalysis of Case A involves descriptive statistical analysis of network data andudreveals significant problems with the validity and quality of the data. Theudresults of the case analysis show that data collected by SNORT are notudsufficient to track and trace the sources of the attacks. The analysis also udreveals that the data sets collected may be flawed, erroneous or already haveudbeen tampered with. Despite significant fine tuning, SNORT continued toudgenerate numerous false positive alerts and/or wrongly identified sources ofudattacks. This case highlights that intrusion detection systems can play anudimportant role in protecting information systems infrastructure, but to beudeffective they require the attention of highly trained security personnel/systemudadministrators. These personnel also need to engage in regular monitoring andudanalysis of alerts and other log files, and to ensure regular updating of the ruleudsets used by these systems.udAnalysis of Case B reveals the impact of legal misconceptualisations about theudnature of digital systems on court decisions and on the generation of legaludprecedents that have potentially broader social implications. The results of theudanalysis reveal serious flaws in understanding amongst all participants in theudcase over the nature of digital evidence and how it should best be collected,udanalysed and presented. More broadly, the judgement also appears to haveudworrying implications for individual privacy and data protection.udAnalysis of Case C highlights the practical challenges faced at theudorganisational level in the implementation of models and tools for digitaludevidence handling. The analysis highlights that models and tools that have beenuddeveloped for handling digital evidence are by their very nature andudcomplexity highly problematic to adopt and utilise in organisational settings.udA key element that continues to inhibit their use is the lack of early andudcomprehensive end-user education. The results from this case highlight theudcritical need for organisations to have greater 'forensic readiness' for dealingudwith criminal, illegal or inappropriate on-line behaviours.
机译:本研究论文探讨了数字证据的技术,法律和组织挑战,以及它们之间的相互关系对犯罪,非法和不当在线行为的反应。从法证计算机计算的角度来看,应对这些挑战的解决方案趋向于 n单独解决技术,法律或组织问题的离散集合。对这些问题之间相互关系的了解不足阻碍了集成/协调解决方案的开发开发,这些解决方案可以有效不平衡生成合法合法数字证据,虚拟安全和隐私的要求。更重要的是,这项研究强调,这些离散方法的“碎片化”性质可能会损害所开发的响应的整体“有效性”。该探索性研究的基础方法论框架采用了主观本体论,并采用了解释性认识论。 udresearch策略涉及分别审查关于数字证据的技术,法律,udd和组织挑战的三个案例。每个案例都经过独立的分析,解释和讨论采用法医/计算的观点来解释和讨论这些领域之间的相互关系,并探讨对数字证据和潜在的有问题的在线行为的影响。案例A检查了通过在大学网络上运行网络入侵检测系统ud(NIDS)SNORT收集的数字化数据的有效性。案例B审查了一个澳大利亚 uded联邦法院案件,该案件说明了适用于数字证据,其ud发现和陈述的法律论点。案例C考察了网络工具在线搜索 udfor证据(CTOSE)项目,突显了开发和实施数字证据处理的组织级流程的困难。 ud案例A的分析涉及对网络数据的描述性统计分析并揭示了重大问题数据的有效性和质量。案例分析的结果表明,SNORT收集的数据不足以跟踪和追踪攻击源。分析还表明,收集到的数据集可能存在缺陷,错误或已经被篡改。尽管进行了很大的微调,SNORT仍继续估计许多误报和/或错误识别的 udattacks来源。该案例表明,入侵检测系统可以在保护信息系统基础结构中发挥重要作用,但要使其发挥有效作用,则需要训练有素的安全人员/系统管理人员的注意。这些人员还需要定期监视和 /分析警报和其他日志文件,并确保对这些系统使用的规则 udset进行定期更新。 ud对案例B的分析揭示了法律误解对以下内容的影响:有关法院判决以及产生潜在法律/先例的数字系统,可能会对社会产生更广泛的影响。 udana分析的结果表明,在案例中所有参与者对数字证据的本质以及如何最好地收集,分析和提出数字证据的理解存在严重缺陷。更广泛地说,该判决似乎也对个人隐私和数据保护产生了令人担忧的影响。案例C的分析突显了在组织层面上实现数字证据处理模型和工具时面临的实际挑战。分析强调,已经 ud开发用于处理数字证据的模型和工具,就​​其性质和 udcomplexity而言,在组织环境中采用和利用存在很大问题。 ud继续抑制其使用的关键因素是缺乏早期和长期的应用。 全面的最终用户教育。该案例的结果突出表明,组织迫切需要更大的“法证准备”来处理犯罪,非法或不适当的在线行为。

著录项

  • 作者

    Broucek Vlastimil;

  • 作者单位
  • 年度 2009
  • 总页数
  • 原文格式 PDF
  • 正文语种 en
  • 中图分类

相似文献

  • 外文文献
  • 中文文献
  • 专利

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号