Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.3.585

The Method for Data Acquisition on a Live NAS System  

Seo, Hyeong-Min (Center for Information Security Technologies(CIST), Korea University)
Kim, Dohyun (Center for Information Security Technologies(CIST), Korea University)
Lee, Sang-Jin (Center for Information Security Technologies(CIST), Korea University)
Abstract
As the storage market has been expanded due to growing data size, the research on various kinds of storages such as cloud, USB, and external HDD(Hard Disk Drive) has been conducted in digital forensic aspects. NAS(Network-Attached Storage) can store the data over one TB(Tera Byte) and it is well used for private storage as well as for enterprise, but there is almost no research on NAS. This paper selects three NAS products that has the highest market share in domestic and foreign market, and suggests the process and method for data acquisition in live NAS System.
Keywords
NAS(Network-Attached Storage); Storage; Digital Forensics;
Citations & Related Records
연도 인용수 순위
  • Reference
1 EMC Inc, "The Digital Universe of Opport unities," http://korea.emc.com/collateral/analyst-reports/idc-digital-universe-2014.pdf, Apr. 2014.
2 Howard Miller, "Network-Attached Storage Market Study," Academia.edu, pp. 3-8, Nov. 2012.
3 NAS Ranker, http://www.smallnetbuilder.com/tools/rankers/nas/ranking/RAID5/rev4/39
4 NAS Wikipedia, http://en.wikipedia.org/wiki/Network-attached_storage
5 David A Patterson, Garth Gibson, and Randy H Katz, "A Case for Redundant Arrays of Inexpensive Disks," SIGMOD Conference, vol. 1, pp. 109-116, Jun. 1988.
6 RFC3227, "Guidelines for Evidence Collec tion and Archiving," http://www.faqs.org/rfcs/rfc3227.html, Feb. 2002.
7 Matthew J. Decker, "Dispelling Common Myths of Live Digital Forensics," Digital Forensics Certification Board, White Papers, Sep. 2011.
8 Hwang Hyun-Uk, Kim Min-Soo, Noh Bong-Nam, and Lim Jae-Myung, "Computer forensics: The trend and technology of system forensics," Journal of The Korea Institute of information Security & Cryptology, vol. 13, no. 4, pp. 1-14, Aug. 2003.
9 KISA, "Guide to computer emergency analysis procedure," KISA guide 2010-8, pp. 24-25, Jan. 2010.
10 NETGEAR Inc, "ReadyNAS NVX Busines s Edition User Manual," http://www.readynas.com/download/documentation/UM/ReadyNASnvx_UMv1.1_12Feb09.pdf, pp. 28-29, Feb. 2009.
11 Synology Inc, "Synology NAS User's Guid e Based on DSM 4.2," https://ukdl.synology.com/download/Document/UserGuide/DSM/4.2/Syno_UsersGuide_NAServer_enu.pdf, p. 100, May. 2013.