• DocumentCode
    3580936
  • Title

    Development of digital evidence collection methods in case of Digital Forensic using two step inject methods

  • Author

    Syambas, Nana Rachmana ; El Farisi, Naufal

  • Author_Institution
    Sch. of Electr. Eng. & Inf., Bandung Inst. of Technol., Bandung, Indonesia
  • fYear
    2014
  • Firstpage
    1
  • Lastpage
    6
  • Abstract
    Digital Forensics is a branch of forensic science related to legal evidence found in computers and digital storage media. In the process of the investigation, the investigators took digital evidence from computers, laptops, HP, and other electronic goods. But there are times when a suspect or a witness or related person does not want to cooperate with investigators and removing the digital evidence. Therefore a lot of research whose goal is to generate data from the flash memory, a hard disk or other digital storage media data content has been deleted. Unfortunately, such methods can not guarantee the data that has been deleted can be resurrected all, most can only partially and sometimes even then not perfect so the file can not be opened.This paper discusses the development of new methods for retrieval of digital evidence inject the two-step method (TSI), which have focused on the prevention of the loss of digital evidence by suspects or other party.The advantages of this method is the system working in secret and can be combined with other digital evidence excavation applications that already exist so that the accuracy and completeness of the resulting digital evidence can be better. Collaboration with admin-LAN client application also enables future data collection can be performed remotely.
  • Keywords
    digital forensics; flash memories; hard discs; local area networks; HP; TSI; admin-LAN client application; computers; digital evidence collection methods; digital evidence excavation applications; digital forensic; digital storage media; digital storage media data content; electronic goods; flash memory; forensic science; hard disk; laptops; two step inject methods; Cloning; Digital forensics; History; Internet; Portable computers; digital evidence; digital forensic; hidden application; keyloggers;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    Telecommunication Systems Services and Applications (TSSA), 2014 8th International Conference on
  • Type

    conf

  • DOI
    10.1109/TSSA.2014.7065951
  • Filename
    7065951