• Title/Summary/Keyword: Forensic Investigation Tool

Search Result 26, Processing Time 0.025 seconds

A Feature Comparison of Modern Digital Forensic Imaging Software (현대 디지털 포렌식 이미징 소프트웨어 도구 특징 비교에 대한 연구)

  • Ham, Jiyoon;James, Joshua I.
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.15-20
    • /
    • 2019
  • Fundamental processes in digital forensic investigation - such as disk imaging - were developed when digital investigation was relatively young. As digital forensic processes and procedures matured, these fundamental tools, that are the pillars of the reset of the data processing and analysis phases of an investigation, largely stayed the same. This work is a study of modern digital forensic imaging software tools. Specifically, we will examine the feature sets of modern digital forensic imaging tools, as well as their development and release cycles to understand patterns of fundamental tool development. Based on this survey, we show the weakness in current digital investigation fundamental software development and maintenance over time. We also provide recommendations on how to improve fundamental tools.

Design and Implementation of Forensic Tool on Window Live System (윈도우 활성 시스템상의 디지털 증거 수집 도구 설계 및 구현)

  • Baek, Eun-Ju;Sung, Jin-Won;Lim, Kyoung-Su;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.2
    • /
    • pp.91-100
    • /
    • 2007
  • Nowadays, there exist many forensic tools in forensic investigation. For common investigator it may cause some difficulty in handling the existing forensic tools. In case of urgent condition, if it takes long time to get the useful evidence from data, then it makes the investigation process difficult. Thus, the common investigator can collect the evidence easily by simple clicking the mouse. The only thing he needs is a tool for examination before investigating in details. Therefore, in this paper we refer to useful information in the forensic investigation, discuss the design and the implementation of tool.

  • PDF

e-Forensic Tool Research for Obtaining Legal Evidence Ability of Digital Evidence by Intelligence Inspection (디지털 증거물의 법적능력 확보를 위한 정보감사용 e-Forensic 툴 연구)

  • Kim, Seungyong;Kim, Gyeongyong;Hwang, Incheol;Kim, Dongsik
    • Journal of the Society of Disaster Information
    • /
    • v.13 no.2
    • /
    • pp.267-275
    • /
    • 2017
  • This research is about the development of e-forensic tool that extract & analyze different forms of digital evidence that individuals come across in a disaster scene. The tool utilizes digital forensic techniques which makes the tool efficient in any disaster analysis situation. In order for the forensic evidence to be selected as legal evidence, the evidence needs to be proven that it is in its original state with no forgery involved. This is where the e-forensic tool comes in, as its ability to collect digital evidence during investigation has proven; that the tool can keep the evidence in its original state and increase the integrity by generating hash TAG and adding the forensic evidence to a password encoded file.

Improvement of the Working System for Forensic Agents (과학수사요원의 근무제도 개선방안)

  • Cho, Min-Sang;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.188-196
    • /
    • 2015
  • Areas of forensic have been used as a tool in many fields of police investigation, detective, such as research relating to the criminal investigation. Despite it is failure to obtain a central role and status, forensic is nonetheless necessary. This study recognizes the importance of police and forensic activities, and in reviewing the level of support for actual condition of science and forensic investigations, and it has tried to find the problems. Based on this, this study discusses development plans of the working system to explore whether it can improve the efficiencies of forensic activities from the realistic restrictions. These days, one of the main problems that police forensic activities encounter is lack of labor and human resources on the arrested. Therefore, this study aimed to looking for realistic ways to improve efficiencies of forensic agents First, changing the working system and the restructuring the command system requires a long-term perspective. In other words, a regional forensic system is required. Second, the establishment of a Police Investagation Specialization to ensure the professionalism of the investigation is necessary. Third, the system should improve forensic specialties. Fourth, the R&D organization should established to improve the capability for forensic investigations.

A Study of Applicable Strategies on the Open Source Tool in Digital Forensics (디지털 포렌식 관점에서의 오픈소스 도구 적용 방안 연구)

  • Yoon, Su-jin;Kim, Jong-bae;Shin, Yong-tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.271-272
    • /
    • 2014
  • As E-discovery in criminal investigation is increasing, the importance of Forensic Tools which can legally extract data with high effectiveness is getting higher. Digital products are growing fast. Therefore, Forensic Tools should be implemented readily to suit users and events well. Although forensic industry and governments use expensive forensic tools, some have suggested limitations to its use, such as memory limitations and the limits of post-audit. We need to develop open source forensic tools that can implement a variety of forensic tool fast. This research studies digital forensics technical skills which are commercialized currently and suggests applicable strategies of the open digital forensics to help overcome these limitations.

  • PDF

Research about the Identification and Gathering of Digital Forensic Evidence by Cyber Intrusion Accident Types (사이버 침해사고 유형별 디지털 포렌식 증거의 식별 및 수집에 관한 연구)

  • Shin, Kyung-Jun;Lee, Sang-Jin
    • Convergence Security Journal
    • /
    • v.7 no.4
    • /
    • pp.93-105
    • /
    • 2007
  • A digital forensic technology and tools are used much in the rapidly increased cyber intrusion accident investigation. But, almost the identification and gathering tools of digital forensic evidence are very difficultly integrated and simply poor-skill. Thereby, Important digital evidences at intrusion accident investigation of public institution and a private enterprise can be omitted or demaged. In this paper, therefore, we refer to 'The digital forensic tool for identification and gathering evidence' based only Window OS by using 'Log Parser', discuss the methodology for the identification and gathering of digital forensic evidence by cyber intrusion accident types.

  • PDF

A Study of Trace for Data Wiping Tools (완전삭제 도구 사용 흔적에 관한 연구)

  • Kim, Yeon-Soo;Bang, Je-Wan;Kim, Jin-Kook;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.159-164
    • /
    • 2010
  • The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.

Digital Forensic Indicators of Compromise Format(DFIOC) and Its Application (디지털 포렌식 기반의 침해 지표 포맷 개발 및 활용 방안)

  • Lee, Min Wook;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.95-102
    • /
    • 2016
  • Computer security incident such as confidential information leak and data destruction are constantly growing and it becomes threat to information in digital devices. To respond against the incident, digital forensic techniques are also developing to help digital incident investigation. With the development of digital forensic technology, a variety of forensic artifact has been developed to trace the behavior of users. Also, a diversity of forensic tool has been developed to extract information from forensic artifact. However, there is a issue that information from forensic tools has its own forms. To solve this problem, it needs to process data when it is output from forensic tools. Then it needs to compare and analyze processed data to identify how data is related each other and interpret the implications. To reach this, it calls for effective method to store and output data in the course of data processing. This paper aims to propose DFIOC (Digital Forensic Indicators Of Compromise) that is capable of transcribing a variety of forensic artifact information effectively during incident analysis and response. DFIOC, which is XML based format, provides "Evidence" to represent various forensic artifacts in the incident investigation. Furthermore, It provides "Forensic Analysis" to report forensic analysis result and also gives "Indicator" to investigate the trace of incidence quickly. By logging data into one sheet in DFIOC format for forensic analysis process, it is capable of avoiding unnecessary data processing. Lastly, since collected information is recorded in a normalized format, data input and output becomes much easier as well as it will be convenient to use for identification of collected information and analysis of data relationship.

Digital Forensics Investigation of Redis Database (Redis 데이터베이스에 대한 디지털 포렌식 조사 기법 연구)

  • Choi, Jae Mun;Jeong, Doo Won;Yoon, Jong Seong;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.5
    • /
    • pp.117-126
    • /
    • 2016
  • Recently, increasing utilization of Big Data or Social Network Service involves the increases in demand for NoSQL Database that overcomes the limitations of existing relational database. A forensic examination of Relational Database has steadily researched in terms of Digital Forensics. In contrast, the forensic examination of NoSQL Database is rarely studied. In this paper, We introduce Redis (which is) based on Key-Value Store NoSQL Database, and research the collection and analysis of forensic artifacts then propose recovery method of deleted data. Also we developed a recovery tool, it will be verified our recovery algorithm.

A Study on Forensic Technique Applying Method of Company Accounting Book Data Base File (기업회계장부 압수수색과 DB파일 포렌식 기술 적용방법 연구)

  • Lee, Bo-Man;Park, Dea-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2011.06a
    • /
    • pp.197-201
    • /
    • 2011
  • 검찰과 경찰에서는 압수수색을 통해 조사를 수행하는데, 기업들은 압수수색 수사를 받기 전에 회계 DB 및 회계 관련 파일 삭제, 파손 및 은닉하는 등의 문제점을 발생시키고 있다. 2008년 삼성화재 비자금 조성 사건과, 2009년 교하 복합커뮤니티 센터의 입찰비리 사건 등 기업회계장부의 포렌식 기술적용방법 문제 등이 발생하고 있다. 본 논문에서는 포렌식 수사 도구인 EnCase, FinalData 등을 연구하고, 기업의 회계 서버에 대해 압수수색 준비와 압수 수색, 획득 증거 분석 등의 절차를 연구한다. 기업의 회계 서버 압수수색 후에 디스크에서 포렌식 증거분석에서 실시되는 증거물 원본 파일보관, 원본성이 입증된 사본생성, 삭제 파일 검사 및 복원, 삭제 내용 확인, 원본 파일과의 대조를 실험을 한다. 본 연구 결과는 포렌식 기술발전에 기여하게 될 것이다.

  • PDF