• Title/Summary/Keyword: Forensic Framework

Search Result 22, Processing Time 0.026 seconds

A Framework for Data Recovery and Analysis from Digital Forensics Point of View (디지털 포렌식 관점의 데이터 복구 및 분석 프레임워크)

  • Kim, Jin-Kook;Park, Jung-Heum;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.391-398
    • /
    • 2010
  • Most of digital forensics tools focus on file analysis of allocated area on storage. So, there is a lack of recovery methods for deleted files by suspects or previously used files. To efficiently analyze deleted files, digital forensic tools depend on data recovery tools. These process not appropriate for quick and efficient responses the incident or integrity preservation. This paper suggests the framework for data recovery and analysis tools from digital forensics point of view and presents implementation results.

A Study on Forensic Framework for Collapse Incident Investigation (붕괴사고 조사를 위한 포렌식 프레임워크 적용방안)

  • Lee, Ji-Soo;Lee, Yoon-Ha;Park, Nam-Hee;Lee, Kyung-Su
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2017.11a
    • /
    • pp.199-200
    • /
    • 2017
  • 본 연구는 붕괴사고에 대해 원인을 도출하기 위한 조사방법으로 과학적 재난원인 조사기법은 포렌식 기법을 국내에 적용하는데 목적이 있다. 목적달성을 위한 과정의 일환으로 본 연구에서는 조사를 수행하는 일련의 프레임워크를 국내의 실정에 적합하도록 개발하여 적용하기 위해 국외 붕괴사고 조사절차와 포렌식 기법이 적용된 사례를 분석하였다. 그리고 가설의 수집단계-증거수집-가설분석 및 검증-결론도출의 조사 전 단계에서 공학적 검증이 필요한 요소를 도출하고, 붕괴의 사고유형에 따라 요구되는 기법을 도출하고자 하였다. 본 연구는 재난원인조사 분석에 있어 아직 국내에 명확하게 정착하기 못한 포렌식 조사기법의 기본적인 틀을 구축할 수 있다는데 의의가 있다. 특히, 화학사고나, 화재사고 등 다른 재난에 비해 붕괴사고의 경우 국내 외에서 포렌식 조사기법을 적용한 연구나 사례가 상대적으로 부족한 실정이기 때문에 본 연구는 향후 선도적인 가이드라인의 형태로 활용될 수 있을 것이라 판단된다.

  • PDF

An Assets and Insolvency Prediction Framework based on Forensic Readiness using AHP and XML (AHP와 XML을 이용한 포렌식 준비도 기반의 자산 및 부실예측 프레임워크)

  • Jeong, Minseung;Kim, Jaechun;Park, Younghee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.695-698
    • /
    • 2014
  • 본 논문은 AHP의사결정 기법의 계층적 분석과 자산 및 부실채권에 대한 예측 평가르 수행하는 프레임워크를 설계하고 위험탐지 분석 시나리오 등을 통해 상황변화에 따른 모니터링에서 수집된 자료를 수집, 분석할 수 있는 포렌식 준비도 모형을 제안한다. 제안하는 시스템은 기업에서 운영하고 있는 기존의 레거시 시스템과 연계하여 자산 및 부실예측평가 항목을 다양한 속성에 따라 그룹화하고 분석을 수행함으로써 기업의 자산과 리스크를 보다 효율적이고 안정적으로 관리할 수 있으며, 부실 자산에 대한 관리와 회수를 통해 기업 경쟁력 및 수익률을 향상시킬 수 있다. 또한 포렌식 준비도와 분석 모니터링을 활용하여 민사 및 형사 소송 등의 기업 간 분쟁에 대하여 수집된 증거자료를 제공할 수 있으며, 민원발생과 기타 사고를 예방하고 처리비용을 줄일 수 있다.

Framework for Design and Implementation of SmartPhone Forensic Based on Web Service (웹 서비스 기반의 스마트폰 포렌식 프레임 워크 설계 및 구현)

  • Kim, Hyoung-Hwan;Jeon, SangJun;Kim, DoHyun;Lee, Sangjin;Un, Sungkyong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.842-845
    • /
    • 2011
  • 현재의 스마트폰 기반의 모바일 애플리케이션은 기본적인 전화, 문자와 같은 기능들 외 네비게이션과 같은 유용하고 편리한 기능들이 사용되고 있다. 이러한 애플리케이션에는 사용자와 관련된 많은 개인 정보들이 포함되어있고, 저장된 개인 정보는 사건 발생 시 사건의 직접적인 증거 혹은 간접적은 증거로 활용될 수 있다. 스마트폰에 저장된 증거를 수집하고 분석할 때 조사관들이 사용할 수 있는 기존의 도구는 복잡한 사용방법을 숙지해야 하고, 인증된 소프트웨어가 설치되어 있는 컴퓨터에서 국한되어 분석이 가능했다. 본 논문에서는 이와 같은 문제를 해결하기 위한 웹 서비스 개념의 스마트폰 포렌식 프레임워크를 제시한다.

Container Vulnerability Intruder Detection Framework based on Memory Trap Technique (메모리 트랩기법을 활용한 컨테이너 취약점 침입 탐지 프레임워크)

  • Choi, Sang-Hoon;Jeon, Woo-Jin;Park, Ki-Woong
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.3
    • /
    • pp.26-33
    • /
    • 2017
  • Recently container technologies have been receiving attention for efficient use of the cloud platform. Container virtualization technology has the advantage of a highly portable, high density when compared with the existing hypervisor. Container virtualization technology, however, uses a virtualization technology at the operating system level, which is shared by a single kernel to run multiple instances. For this reason, the feature of container is that the attacker can obtain the root privilege of the host operating system internal the container. Due to the characteristics of the container, the attacker can attack the root privilege of the host operating system in the container utilizing the vulnerability of the kernel. In this paper, we propose a framework for efficiently detecting and responding to root privilege attacks of a host operating system in a container. This framework uses a memory trap technique to detect changes in a specific memory area of a container and to suspend the operation of the container when it is detected.

Pentesting-Based Proactive Cloud Infringement Incident Response Framework (모의해킹 기반 사전 예방적 클라우드 침해 사고 대응 프레임워크)

  • Hyeon No;Ji-won Ock;Seong-min Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.487-498
    • /
    • 2023
  • Security incidents using vulnerabilities in cloud services occur, but it is difficult to collect and analyze traces of incidents in cloud environments with complex and diverse service models. As a result, the importance of cloud forensics research has emerged, and infringement response scenarios must be designed from the perspective of cloud service users (CSUs) and cloud service providers (CSPs) based on representative security threat cases in the public cloud service model. This simulated hacking-based proactive cloud infringement response framework can be used to respond to the cloud service critical resource attack process from the viewpoint of vulnerability detection before cyberattacks occur on the cloud, and can also be expected for data acquisition. Therefore, in this paper, we propose a framework for preventive cloud infringement based on simulated hacking by analyzing and utilizing Cloudfox, a cloud penetration test tool.

Organizational Ostracism: A Potential Framework in Order to Deal with It

  • Mlika, Mona;Khelil, Mehdi Ben;Salem, Nidhal Haj
    • Safety and Health at Work
    • /
    • v.8 no.4
    • /
    • pp.398-401
    • /
    • 2017
  • Background: Organizational ostracism is defined as a violation of norms that we are suggested to acknowledge at the workplace. It results in the exclusion of one person or multiple persons, and causes damage to our innate need to belong. This kind of behaviorism can be engaged through a hierarchical or nonhierarchical relationship. Three elements interact in the framework of organizational ostracism: the actor, the target, and the institution. Our aim was to describe the different factors interacting with every element in order to produce recommendations targeting to prevent the occurrence of such behaviorism in an institution and to help targets of such a violence in order to handle this situation and go forward. As psychological impact of ostracism has frequently been studied in the literature, we focused on its impact on professional tasks. Methods: We performed a questionnaire-based study about organizational ostracism. This questionnaire was established through an online platform (https://www.sondageonline.com) and made available through the following link: https://goo.gl/forms/KrkVXe3bMEc79cau2. A keyword was sent to all participants. We created a 23-interrogation questionnaire with open and short questions. Nonwritten consent was obtained from all participants. Results: The actor of ostracism engaged in ostracism, in most of the cases, with other persons without a real purpose. The actor of ostracism had an antecedent of problematic relationship at work in 82.9% of the cases. Of the participants, 58.5% were of the view that ostracism aimed to cause hurt and isolate them. Professional isolation was observed in 58.5% of the cases; 51.2% of the participants tried to improve their work potential and explained their reaction by an intrinsic motivation. The organization atmosphere was judged to be bad in most of the cases. Conclusion: Our study showed that ostracism was mainly observed in public practice.

Seismic performance of a wall-frame air traffic control tower

  • Moravej, Hossein;Vafaei, Mohammadreza;Abu Bakar, Suhaimi
    • Earthquakes and Structures
    • /
    • v.10 no.2
    • /
    • pp.463-482
    • /
    • 2016
  • Air Traffic Control (ATC) towers play significant role in the functionality of each airport. In spite of having complex dynamic behavior and major role in mitigating post-earthquake problems, less attention has been paid to the seismic performance of these structures. Herein, seismic response of an existing ATC tower with a wall-frame structural system that has been designed and detailed according to a local building code was evaluated through the framework of performance-based seismic design. Results of this study indicated that the linear static and dynamic analyses used for the design of this tower were incapable of providing a safety margin for the required seismic performance levels especially when the tower was subjected to strong ground motions. It was concluded that, for seismic design of ATC towers practice engineers should refer to a more sophisticated seismic design approach (e.g., performance-based seismic design) which accounts for inelastic behavior of structural components in order to comply with the higher seismic performance objectives of ATC towers.

Design and Implementation of a Real-time Integrated Analysis Framework based on Multiprocessor Search Modules against Malicious Codes (악성코드 대응 MPSM기반 실시간통합분석체계의 설계 및 구현)

  • Moon, Yoon Jong
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.69-82
    • /
    • 2015
  • This dissertation introduce how to react against the cybercrime and analysis of malware detection. Also this dissertation emphasize the importance about efficient control of correspond process for the information security. Cybercrime and cyber breach are becoming increasingly intelligent and sophisticated. To correspond those crimes, the strategy of defense need change soft kill to hard kill. So this dissertation includes the study of weak point about OS, Application system. Also this dissertation suggest that API structure for handling and analyzing big data forensic.

Comparison of data mining algorithms for sex determination based on mastoid process measurements using cone-beam computed tomography

  • Farhadian, Maryam;Salemi, Fatemeh;Shokri, Abbas;Safi, Yaser;Rahimpanah, Shahin
    • Imaging Science in Dentistry
    • /
    • v.50 no.4
    • /
    • pp.323-330
    • /
    • 2020
  • Purpose: The mastoid region is ideal for studying sexual dimorphism due to its anatomical position at the base of the skull. This study aimed to determine sex in the Iranian population based on measurements of the mastoid process using different data mining algorithms. Materials and Methods: This retrospective study was conducted on 190 3-dimensional cone-beam computed tomographic (CBCT) images of 105 women and 85 men between the ages of 18 and 70 years. On each CBCT scan, the following 9 landmarks were measured: the distance between the porion and the mastoidale; the mastoid length, height, and width; the distance between the mastoidale and the mastoid incision; the intermastoid distance (IMD); the distance between the lowest point of the mastoid triangle and the most prominent convex surface of the mastoid (MF); the distance between the most prominent convex mastoid point (IMSLD); and the intersecting angle drawn from the most prominent right and left mastoid point (MMCA). Several predictive models were constructed and their accuracy was compared using cross-validation. Results: The results of the t-test revealed a statistically significant difference between the sexes in all variables except MF and MMCA. The random forest model, with an accuracy of 97.0%, had the best performance in predicting sex. The IMSLD and IMD made the largest contributions to predicting sex, while the MMCA variable had the least significant role. Conclusion: These results show the possibility of developing an accurate tool using data mining algorithms for sex determination in the forensic framework.