DocumentCode :
2360460
Title :
A Stepwise Methodology for Tracing Computer Usage
Author :
Lee, SeungBong ; Bang, Jewan ; Lim, KyungSoo ; Kim, Jongsung ; Lee, Sangjin
Author_Institution :
Center for Inf. Security Technol., Korea Univ., Seoul, South Korea
fYear :
2009
fDate :
25-27 Aug. 2009
Firstpage :
1852
Lastpage :
1857
Abstract :
In digital forensics investigation, a general method of investigating the suspect´s computer was to duplicate storage media or image and then obtain the case-related data from these. However, the increase in the capacity of storage media made this method take much longer time. Also, this implies that more data can exist in the suspect´s computer so that finding relevant data will take a lot of time and efforts. Moreover, in case where imaging of the entire disk is not possible due to legal matters, selective acquisition of data is needed. In this paper, we propose methods for selective acquisition of file system metadata, registry & prefetch files, web browser files, specific document files without duplicating or imaging the storage media. Furthermore, we suggest a method to analyze the acquired data stepwise and quickly and effectively trace the use of computer in the crime scene.
Keywords :
computer crime; data acquisition; storage media; computer crime; computer usage tracing; digital forensics investigation; file system meta data; prefetch files; selective data acquisition; storage media imaging; Computer crime; Digital forensics; File systems; Hard disks; History; Image storage; Law; Layout; Legal factors; Pattern analysis; PIM; pre-investigation; selectively acquisition;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
INC, IMS and IDC, 2009. NCM '09. Fifth International Joint Conference on
Conference_Location :
Seoul
Print_ISBN :
978-1-4244-5209-5
Electronic_ISBN :
978-0-7695-3769-6
Type :
conf
DOI :
10.1109/NCM.2009.246
Filename :
5331447
Link To Document :
بازگشت