• Title/Summary/Keyword: 디지털 흔적

Search Result 55, Processing Time 0.028 seconds

The Trace Analysis of SaaS from a Client's Perspective (클라이언트관점의 SaaS 사용 흔적 분석)

  • Kang, Sung-Lim;Park, Jung-Heum;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.1-8
    • /
    • 2012
  • Recently, due to the development of broadband, there is a significant increase in utilizing on-demand Saas (Software as a Service) which takes advantage of the technology. Nevertheless, the academic and practical levels of digital forensics have not yet been established in cloud computing environment. In addition, the data of user behavior is not likely to be stored on the local system. The relevant data may be stored across the various remote servers. Therefore, the investigators may encounter some problems in performing digital forensics in cloud computing environment. it is important to analysis History files, Cookie files, Temporary Internet Files, physical memory, etc. in a viewpoint of client, since the SaaS basically uses the web to connects the internet service. In this paper, we propose the method that analysis the usuage trace of the Saas which is the one of the most popular cloud computing services.

A Study of Acquisition and Analysis on the Bios Firmware Image File in the Digital Forensics (디지털 포렌식 관점에서 BIOS 펌웨어 이미지 파일 수집 및 분석에 관한 연구)

  • Jeong, Seung Hoon;Lee, Yun Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.491-498
    • /
    • 2016
  • Recently leakages of confidential information and internal date have been steadily increasing by using booting technique on portable OS such as Windows PE stored in portable storage devices (USB or CD/DVD etc). This method allows to bypass security software such as USB security or media control solution installed in the target PC, to extract data or insert malicious code by mounting the PC's storage devices after booting up the portable OS. Also this booting method doesn't record a log file such as traces of removable storage devices. Thus it is difficult to identify whether the data are leaked and use trace-back technique. In this paper is to propose method to help facilitate the process of digital forensic investigation or audit of a company by collecting and analyzing BIOS firmware images that record data relating to BIOS settings in flash memory and finding traces of portable storage devices that can be regarded as abnormal events.

Analysis on System Log of Huawei Smartphone (화웨이 스마트폰 시스템 로그에 대한 분석)

  • Park, Eunhu;Kim, Soram;Kim, Jongsung
    • Journal of Digital Forensics
    • /
    • v.12 no.3
    • /
    • pp.9-17
    • /
    • 2018
  • Smartphone have become commonplace because they have the advantage of facilitating communication with others and making life easier. The smartphone's system log stores various data related to the user actions. Since 2015, Huawei has been growing rapidly, with its sales volume increasing and it was ranked second in the world in three years. The use of Huawei smartphones by many users means that Huawei smartphones are likely to be used to detect traces of criminal investigations, so we need to study system logs of Huawei smartphones. Therefore, in this paper, we analyze system log which is forensically meaningful for Huawei smartphone. We also propose how to use logs in forensic investigation.

A Live Acquisition of File Information from Memory for Digital Forensic (디지털 포렌식을 위한 동작 중인 메모리에서의 파일 정보 수집)

  • Park, Jinkyu;Lee, Jaehun;Kim, Sangwook
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.1442-1445
    • /
    • 2009
  • 기존의 디지털 포렌식 기술은 하드 디스크 등에서 증거 자료를 수집하는 기술을 연구해 왔다. 하지만 최근 루트킷 등 악성 프로그램의 은닉 기술 발달로 디스크 악성 프로그램의 흔적이 남지 않게 되었고, 디스크 용량의 기하급수적인 증가로 필요한 증거 자료를 찾기 위해 디스크를 탐색하는 시간이 증가하였다. 메모리 포렌식 기술은 기존의 디지털 포렌식의 단점을 보완하는 새로운 연구분야로, 동작 중인 시스템에서 메모리 내부의 정보를 수집하고 분석하는 데 초점을 맞추고 있다. 본 논문에서는 메모리 포렌식 기법으로 수집할 수 있는 자료인 파일 정보를 동작 중인 메모리에서 수집하고 분석하는 방법에 대해 알아본다.

My data business model combined with travel data (여행데이터와 결합된 마이데이터 비즈니스 모델)

  • So, Won;Pi, Yu-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.961-963
    • /
    • 2022
  • 데이터 기반 경제가 활성화되면서 데이터의 분석과 활용에 중점을 둔 서비스가 증가하는 추세이다. 금융 분야에서만 활용되던 마이데이터를 관광정보인 외부데이터와 결합해 사용자의 디지털 흔적을 수집, 분석하는 여행 마이데이터 플랫폼을 제시한다. 이를 통해 사용자에게 신뢰도가 높은 여행정보를 제공하고 여행 후 정산 문제를 해결하고자 한다.

Analysis of digital artifacts based on natural language processing and machine learning (자연어처리와 머신러닝을 이용한 디지털 아티팩트 분석방안에 대한 연구)

  • Park, Dohyeon;Jang, Seongmin;Jang, Raeseung;Kim, Mintae;Jang, Wonyoung;Lee, Sun-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.10a
    • /
    • pp.388-390
    • /
    • 2019
  • 운영체제는 해당 시스템이 운영되면서 생기는 흔적을 남길 수 있게 설계되었다. 디지털 포렌식에서 아티팩트는 보관증거 또는 데이터의 정보를 확증하는데 사용된다. 디지털 정보는 사용자의 생활방식에 따라 사용자의 습관, 사상, 감정에 영향을 받아 저장될 수 있다. 디지털 증거의 경우, 한 저장매체에 많은 데이터가 함께 저장되어 있을 뿐만 아니라 대형 서버 시스템의 경우에는 수많은 사람들의 정보도 저장되어 특정의 데이터만을 찾아내기가 쉽지 않다. 이러한 문제를 해결하기 위해 자연어 처리와 머신러닝 기술이 활용될 수 있다. 자연어 처리기술은 인간과 컴퓨터 간 인터페이스를 쉽고 편하게 하고, 자연어로 기록되어 있는 아티팩트를 머신러닝을 이용하여 빠른 분석을 가능하게 한다. 본 논문은 자연어처리와 머신러닝을 이용한 디지털 아티팩트 분석 방안을 제안한다. 자연어 처리와 머신러닝을 이용하여 아티팩트에서 사용자의 의도를 파악할 수 있음을 실험을 통하여 확인하였다.

A Study on the Stevie Ray Vaughan Performance - focusing on Pride and Joy - (스티비 레이 본의 연주 특징에 관한 연구 -Pride and joy를 중심으로-)

  • Jeong, Sae-Eung;Cho, Tae-Seon
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.239-245
    • /
    • 2018
  • In the current mainstream pop music scene, Stevie ray vaughan's status is a singer-songwriter and electric blues guitarist, who occupies a very large position despite his short period of activity. His influence has remained to the present day as the voice of many guitarists ranging from his unique sound to his explosive stage performances. Let's take a look at the technical parts of his performance, rhythm and solo performances, among the various traces of his constant reproduction. Based on one of his most famous works, 'Pride and Joy' I analyzed the solo and rhythm, scale that Stevie Ray Vaughan played. Through the African American blues, a peripheral heritage he has been trying to influence and influence, how his traces congregate in the center of today's mainstream pop music scene. This will give us little clues to appreciate before the research that will have a variety of influences and values.

Digital Watermarking Method using Discrete Optimization Method (이산최적화 기법을 사용한 디지털 워터마킹)

  • Lee, Chang-Soon
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.1
    • /
    • pp.44-49
    • /
    • 2014
  • In recent, watermarking technology have been paying attention to methods avoiding illegal use and reproduce of digital contents. Then, in order to protect the right of digital contents, a watermark image is inserted into original images. In different watermarking methods, several technologies using Ant Colony Algorithm have been studied. In this paper, we propose a watermarking method using a discrete optimization method in the ants colony algorithm. This proposed method resembls the process that ants follow the pheromone traps to find out food. And when a watermark image is inserted into original images, the proposed method considers the deployment of obstacles or the balance between cells in the entire digital image. Simulation results show that the proposed method is increased in robustness of watermarked image and is decreased in the perceptibility of watermarking compared to the previous methods.

A Study on Digital Forensic for International Waters (공해상에서 Digital Forensic 연구)

  • Lee, Gyu-An;Shin, Youg-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.209-217
    • /
    • 2007
  • Korea's seas have the potentials of dispute against China or Japan due to the overlap of the territorial waters and EEZ. In case of marine accidents, the nature of the sea tends to eliminate much of the track, making it another hardship in evidence adoption in case of an international dispute along with the false entries of fishing vessels' journals. Marine Digital Forensics protects the functions of computers and IT appliance on vessels and extracts evidence of voyage and accidents to resolve international dispute. The digital evidence, if tampered with its integrity, may lead to the rejection to a critical claim or may even fail to make a case. As a solution, this thesis suggests Marine Digital Forensics as a way to extract evidence and prove a claim. This may be utilized as means of scientific investigation on sea as overseas exchange increases and the vessels digitalize, leading to a solution in international disputes that may occur in the future.

  • PDF

Simplified Forensic Analysis Using List of Deleted Files in IoT Envrionment (사물인터넷 환경에서 삭제된 파일의 목록을 이용한 포렌식 분석 간편화)

  • Lim, Jeong-Hyeon;Lee, Keun-Ho
    • Journal of Internet of Things and Convergence
    • /
    • v.5 no.1
    • /
    • pp.35-39
    • /
    • 2019
  • With the rapid development of the information society, the use of digital devices has increased dramatically and the importance of technology for analyzing them has increased. Digital evidence is stored in many places such as Prefetch, Recent, Registry, and Event Log even if the user has deleted it. Therefore, there is a disadvantage that the forensic analyst can not grasp the files used by the user at the beginning. Therefore, in this paper, we propose a method that the RemoveList folder exists so that the user can grasp the information of the deleted file first, and the information about the deleted file is automatically saved by using AES in RemoveList. Through this, it can be expected that the analyst can alleviate the difficulty of initially grasping the user's PC.