• Title/Summary/Keyword: Computer forensic

Search Result 181, Processing Time 0.025 seconds

A Study of Forensic Techniques and Tools on Smart Phone OS Types (Smart Phone OS별 포렌식 기술과 도구에 관한 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.223-226
    • /
    • 2010
  • iPhone and Smart Phone domestic markets are activated with domestic coming out of galaxy S together and the users are increasing. It follows hereupon and with forensic techniques for the cellular phone relation criminal evidence collection of data of existing the mobile forensic engineering research is necessary in about Smart Phone where it has become new techniques and WiFi etc. Convergence. It respects Smart Phone OS star forensic technique and a tool research, iPhone Apple MAC OS X and it researches galaxy S Google Android from the present paper. Smart it uses SYN methods with Phone OS star forensic techniques and it researches in order mobile forensic description below it observes it sees and forensic application methods computer forensic methods and the tools and it researches forensic techniques. The present paper research as IT powerful country will contribute in Smart Phone forensic technical advances of Korea.

  • PDF

Web Log Scenario Make for Forensic (포렌식을 위한 웹로그 시나리오 작성 시스템)

  • Jang, Hae-Sook;Lee, Jin-Kwan;Lee, Jong-Chan;Park, Sang-Joon;Park, Ki-Hong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.01a
    • /
    • pp.303-305
    • /
    • 2011
  • 수많은 웹로그 히스토리의 자료에서 컴퓨터 사이버범죄에 대한 증거자료로 채택되기 위한 기술적인 웹 포렌식 자료의 추출에 사용되는 웹 포렌식 알고리즘은 필수적인 요소이다. 본 논문에서는 웹 로그 시나리오 작성을 제안하고 설계하여, 웹 포렌식을 통한 컴퓨터 사이버범죄에 대한 학문적 기술적 발전에 기여하고자 하는데 본 논문의 목적이 있다. 수많은 웹로그 자료에서 컴퓨터 사이버 범죄에 대한 증거 자료로 채택되기 위한 기술적인 웹 포렌식 자료의 추출에 사용되는 웹 로그 분석 알고리즘은 필수적인 요소이다. 본 논문에서는 웹 포렌식 알고리즘을 제안하고 설계하여, 실제 기업의 웹 서버 시스템에 제안한 알고리즘을 구현해 본다. 웹 서버에서 웹 로그 분석을 위해 사용한 웹 포렌식 알고리즘과 플로우를 설계하고 코딩을 통한 구현을 한다. 구현 결과 웹 포렌식을 통한 컴퓨터 사이버 범죄에 대한 학문적 기술적 발전에 기여하고자 하는데 본 논문의 목적이 있다.

  • PDF

A Study on Comparison Analysis of Digital Forensic Technology for Preventing Information Leakage (정보유출 방지를 위한 디지털 포렌식 기술 비교분석 연구)

  • Park, Gwangmin;Hong, Seungwan;Kim, Jongpil;Chang, Hangbae
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.93-100
    • /
    • 2016
  • Important evidence or clue in general crime as well as crime relevant to computer has been discovered in digital devices including computer with advance of information technology and turning into a information-oriented society. A leakage of industrial technology and confidential business information is related to digital devices such as computer, smart phone, USB, etc. This paper deal with a current state and comparison analysis of digital forensic technology for developing way of forensic field, so we seek for method of preventing information leakage.

A Study of Network Forensic for IDS (IDS 관제를 위한 네트워크 포렌식 연구)

  • Lee, Gi-Sung;No, Si-Young;Park, Sang-Joon;Lee, Jong-Chan;Lee, Seong-Yoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.467-473
    • /
    • 2011
  • The Network-packet in this Paper to ensure the integrity of the legal evidence is effect that can have is to offer an Network-forensics system. The Paper proposed Network-forensics system in the company through legal disputes accident Networking and state agency (with investigative authority) for criminal investigations in networking for the effective and correct way to present a report of user-centric services through effective awareness can be improved.

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Modeling of Collection Process for Real-time Forensic Data (포렌식 데이터의 실시간 수집 절차 모델링)

  • Kim, Tae-Hoon;Park, Nam-Kyu;Choi, Han-Na;Lee, Dae-Yoon;Ahn, Jong-Deuk;Cho, Yong-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.139-145
    • /
    • 2009
  • This study proposes a model of collection process for real-time forensic data, in which the manager was to respond to infringement incidents in terms of system operation and inspection and to collect, analyze and restore forensic data immediately after an incident took place. The suggested model was modeled in seven processes according to functional elements. Unlike the old and managerial forensic processes, the model allowed the manager to react to infringement incidents in the aspects of system operation and inspection and to follow the processes of collecting, analyzing, and restoring forensic data in case of an incident. There also was a feedback process designed towards the step of gathering forensic data through the stages of systematizing reaction strategies in order that he or she be able to bring about comprehensive and structural responses to an incident like the former processes in which it is difficult to bring about instant responses.

Digital Forensic for Location Information using Hierarchical Clustering and k-means Algorithm

  • Lee, Chanjin;Chung, Mokdong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.30-40
    • /
    • 2016
  • Recently, the competition among global IT companies for the market occupancy of the IoT(Internet of Things) is fierce. Internet of Things are all the things and people around the world connected to the Internet, and it is becoming more and more intelligent. In addition, for the purpose of providing users with a customized services to variety of context-awareness, IoT platform and related research have been active area. In this paper, we analyze third party instant messengers of Windows 8 Style UI and propose a digital forensic methodology. And, we are well aware of the Android-based map and navigation applications. What we want to show is GPS information analysis by using the R. In addition, we propose a structured data analysis applying the hierarchical clustering model using GPS data in the digital forensics modules. The proposed model is expected to help support the IOT services and efficient criminal investigation process.

A Study on Forensic Technique Applying Method of Company Accounting Book Data Base File (기업회계장부 압수수색과 DB파일 포렌식 기술 적용방법 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.197-201
    • /
    • 2011
  • 검찰과 경찰에서는 압수수색을 통해 조사를 수행하는데, 기업들은 압수수색 수사를 받기 전에 회계 DB 및 회계 관련 파일 삭제, 파손 및 은닉하는 등의 문제점을 발생시키고 있다. 2008년 삼성화재 비자금 조성 사건과, 2009년 교하 복합커뮤니티 센터의 입찰비리 사건 등 기업회계장부의 포렌식 기술적용방법 문제 등이 발생하고 있다. 본 논문에서는 포렌식 수사 도구인 EnCase, FinalData 등을 연구하고, 기업의 회계 서버에 대해 압수수색 준비와 압수 수색, 획득 증거 분석 등의 절차를 연구한다. 기업의 회계 서버 압수수색 후에 디스크에서 포렌식 증거분석에서 실시되는 증거물 원본 파일보관, 원본성이 입증된 사본생성, 삭제 파일 검사 및 복원, 삭제 내용 확인, 원본 파일과의 대조를 실험을 한다. 본 연구 결과는 포렌식 기술발전에 기여하게 될 것이다.

  • PDF

Criminal Cases and Trends in Forensic Techniques on the Dark Web (다크웹 상의 범죄 사례 및 포렌식 기법 동향)

  • So-Hee Park;Eun-Jeong Do;Hoon-Jae Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.221-223
    • /
    • 2023
  • 오늘날 전 세계적으로 연결되어 있는 인터넷을 통해 사용자들은 아무런 제약 없이 의사소통 및 거래 등 다양한 활동을 할 수 있게 되었다. 그러나 이러한 인터넷상의 자유를 범죄의 수단으로 한 인터넷상의 사이버 범죄가 급속하게 증가하고 있다. 특히 인터넷 중 하나로 분류되는 다크웹에서는 심각한 중대 범죄들이 많이 발생하고 있는데, 다크웹은 일반 네트워크와 달리 암호화 기술을 사용하는 특정 네트워크를 통해서만 접속이 가능하기 때문에 사용자에게 익명성과 비밀성을 제공할 수 웹 사이트이다. 이러한 다크웹의 특성으로 인해 마약 거래, 아동 포르노 유포, 개인정보 유출 등 다양한 사이버 범죄가 발생하고 있다. 본 논문에서는 이러한 다크웹 상에서 발생하는 주요 범죄 사례를 알아보고 이에 대한 포렌식 수사 기법의 동향을 살펴보고자 한다.

  • PDF

Digital Forensics of Microsoft Office 2007-2013 Documents to Prevent Covert Communication

  • Fu, Zhangjie;Sun, Xingming;Xi, Jie
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.525-533
    • /
    • 2015
  • MS Office suit software is the most widely used electronic documents by a large number of users in the world, which has absolute predominance in office software market. MS Office 2007-2013 documents, which use new office open extensible markup language (OOXML) format, could be illegally used as cover mediums to transmit secret information by offenders, because they do not easily arouse others suspicion. This paper proposes nine forensic methods and an integrated forensic tool for OOXML format documents on the basis of researching the potential information hiding methods. The proposed forensic methods and tool cover three categories; document structure, document content, and document format. The aim is to prevent covert communication and provide security detection technology for electronic documents downloaded by users. The proposed methods can prevent the damage of secret information embedded by offenders. Extensive experiments based on real data set demonstrate the effectiveness of the proposed methods.