期刊文献+
共找到13篇文章
< 1 >
每页显示 20 50 100
Modeling Digital Evidence Management and Dynamics Using Petri Nets
1
作者 Jasmin Cosic Zoran Cosic Miroslav Baca 《Computer Technology and Application》 2011年第7期545-549,共5页
In all phases of forensic investigation, digital evidence is exposed to external influences and coming into contact with many factors. Legal admissibility of digital evidence is the ability of that evidence being acce... In all phases of forensic investigation, digital evidence is exposed to external influences and coming into contact with many factors. Legal admissibility of digital evidence is the ability of that evidence being accepted as evidence in a court of law. Life cycle of digital evidence is very complex. In each stage there is more impact that can violate a chain of custody and its integrity. Contact with different variables occurs through a life cycle of digital evidence and can disrupt its integrity. In order for the evidence to be accepted by the court as valid, chain of custody for digital evidence must be kept, or it must be known who exactly came into contact with evidence in each stage of the investigation. This paper presents a dynamics and life cycle of digital evidence. The Petri nets will be proposed and used for modeling and simulation of this process. 展开更多
关键词 digital evidence digital forensic chain of custody digital evidence integrity digital evidence manipulating Petri nets
下载PDF
A Digital Evidence Fusion Method in Network Forensics Systems with Dempster-Shafer Theory 被引量:2
2
作者 TIAN Zhihong JIANG Wei +1 位作者 LI Yang DONG Lan 《China Communications》 SCIE CSCD 2014年第5期91-97,共7页
Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of se... Network intrusion forensics is an important extension to present security infrastructure,and is becoming the focus of forensics research field.However,comparison with sophisticated multi-stage attacks and volume of sensor data,current practices in network forensic analysis are to manually examine,an error prone,labor-intensive and time consuming process.To solve these problems,in this paper we propose a digital evidence fusion method for network forensics with Dempster-Shafer theory that can detect efficiently computer crime in networked environments,and fuse digital evidence from different sources such as hosts and sub-networks automatically.In the end,we evaluate the method on well-known KDD Cup1999 dataset.The results prove our method is very effective for real-time network forensics,and can provide comprehensible messages for a forensic investigators. 展开更多
关键词 network forensics security dempster-shafer theory digital evidence fusion
下载PDF
Forensics: Collection of Sound Digital Evidence
3
作者 Richard Kabanda Harihar Thapa Luis Rivera 《Journal of Information Security》 2023年第4期454-463,共10页
This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introd... This summary paper will discuss the concept of forensic evidence and evidence collection methods. Emphasis will be placed on the techniques used to collect forensically sound digital evidence for the purpose of introduction to digital forensics. This discussion will thereafter result in identifying and categorizing the different types of digital forensics evidence and a clear procedure for how to collect forensically sound digital evidence. This paper will further discuss the creation of awareness and promote the idea that competent practice of computer forensics collection is important for admissibility in court. 展开更多
关键词 Electronic Discovery Reference Model National Institute of Standards and Technology (NIST) Message-Digest Algorithm Secure Hash Algorithm Forensically Sound digital evidence
下载PDF
Lightweight and Manageable Digital Evidence Preservation System on Bitcoin 被引量:5
4
作者 Mingming Wang Qianhong Wu +3 位作者 Bo Qin Qin Wang Jianwei Liu Zhenyu Guan 《Journal of Computer Science & Technology》 SCIE EI CSCD 2018年第3期568-586,共19页
An effective and secure system used for evidence preservation is essential to possess the properties of anti- loss, anti-forgery, anti-tamper and perfect verifiability. Traditional architecture which relies on central... An effective and secure system used for evidence preservation is essential to possess the properties of anti- loss, anti-forgery, anti-tamper and perfect verifiability. Traditional architecture which relies on centralized cloud storage is depressingly beset by the security problems such as incomplete confidence and unreliable regulation. Moreover, an expensive, inefficient and incompatible design impedes the effort of evidence preservation. In contrast, the decentralized blockchain network is qualified as a perfect replacement for its secure anonymity, irrevocable commitment, and transparent traceability. Combining with subliminal channels in blockchain, we have weaved the transaction network with newly designed evidence audit network. In this paper, we have presented and implemented a lightweight digital evidence-preservation architecture which possesses the features of privacy-anonymity, audit-transparency, function-scalability and operation-lightweight. The anonymity is naturally formed from the cryptographic design, since the cipher evidence under encrypted cryptosystem and hash-based functions leakages nothing to the public. Covert channels are efficiently excavated to optimize the cost, connectivity and security of the framework, transforming the great computation power of Bitcoin network to the value of credit. The transparency used for audit, which relates to the proof of existence, comes from instant timestamps and irreversible hash functions in mature blockchain network. The scalability is represented by the evidence chain interacted with the original blockchain, and the extended chains on top of mainchain will cover the most of auditors in different institutions. And the lightweight, which is equal to low-cost, is derived from our fine-grained hierarchical services. At last, analyses of efficiency, security, and availability have shown the complete accomplishment of our system. 展开更多
关键词 blockchain covert channel data auditing digital evidence
原文传递
Analysis of Telephone Call Detail Records based on Fuzzy Decision Tree 被引量:1
5
作者 Ding Liping Gu jian +1 位作者 Wang Yongji Wu Jingzheng 《China Communications》 SCIE CSCD 2010年第6期120-127,共8页
Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of di... Digital evidences can be obtained from computers and various kinds of digital devices, such as telephones, mp3/mp4 players, printers, cameras, etc. Telephone Call Detail Records (CDRs) are one important source of digital evidences that can identify suspects and their partners. Law enforcement authorities may intercept and record specific conversations with a court order and CDRs can be obtained from telephone service providers. However, the CDRs of a suspect for a period of time are often fairly large in volume. To obtain useful information and make appropriate decisions automatically from such large amount of CDRs become more and more difficult. Current analysis tools are designed to present only numerical results rather than help us make useful decisions. In this paper, an algorithm based on Fuzzy Decision Tree (FDT) for analyzing CDRs is proposed. We conducted experimental evaluation to verify the proposed algorithm and the result is very promising. 展开更多
关键词 FORENSICS digital evidence telephonecall records fuzzy decision tree
下载PDF
A Transductive Scheme Based Inference Techniques for Network Forensic Analysis 被引量:1
6
作者 TIAN Zhihong JIANG Wei LI Yang 《China Communications》 SCIE CSCD 2015年第2期167-176,共10页
Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;th... Network forensics is a security infrastructure,and becomes the research focus of forensic investigation.However many challenges still exist in conducting network forensics:network has produced large amounts of data;the comprehensibility of evidence extracting from collected data;the efficiency of evidence analysis methods,etc.To solve these problems,in this paper we develop a network intrusion forensics system based on transductive scheme that can detect and analyze efficiently computer crime in networked environments,and extract digital evidence automatically.At the end of the paper,we evaluate our method on a series of experiments on KDD Cup 1999 dataset.The results demonstrate that our methods are actually effective for real-time network forensics,and can provide comprehensible aid for a forensic expert. 展开更多
关键词 network forensics transductive scheme security digital evidence
下载PDF
An Automatically Filtering Blacklist Model of Social Network Based on Semantic Web
7
作者 Le Ha Guo-Zi Sun 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期67-73,共7页
According to the features of the semantic web technology,it is very suitable to solve the security issue of the current social network environment.Firstly,in this paper,it extends the existing ontology model of the so... According to the features of the semantic web technology,it is very suitable to solve the security issue of the current social network environment.Firstly,in this paper,it extends the existing ontology model of the social network with some relevant classes,and introduces a brand new ontology which is used to represent the malicious information.After introducing these models,a method of identifying the malicious message is raised.Finally,the experiments and simulations analyze the feasibility of the whole system.The results validate that the malicious users can be automatically filtered,and some worthy digital evidence can be effectively provided to forensic investigators. 展开更多
关键词 social network semantic web ONTOLOGY OWL digital evidence
下载PDF
Research and Review on Computer Forensics
8
作者 Guo Hong Jin Bo Huang Daoli 《China Communications》 SCIE CSCD 2010年第6期37-43,共7页
With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help... With the development of Internet and information technology, the digital crimes are also on the rise. Computer forensics is an emerging research area that applies computer investigation and analysis techniques to help detection of these crimes and gathering of digital evidence suitable for presentation in courts. This paper provides foundational concept of computer forensics, outlines various principles of computer forensics, discusses the model of computer forensics and presents a proposed model. 展开更多
关键词 computer forensics computer crime digital evidence
下载PDF
Computer Forensics Framework for Efficient and Lawful Privacy-Preserved Investigation
9
作者 Waleed Halboob Jalal Almuhtadi 《Computer Systems Science & Engineering》 SCIE EI 2023年第5期2071-2092,共22页
Privacy preservation(PP)in Digital forensics(DF)is a conflicted and non-trivial issue.Existing solutions use the searchable encryption concept and,as a result,are not efficient and support only a keyword search.Moreov... Privacy preservation(PP)in Digital forensics(DF)is a conflicted and non-trivial issue.Existing solutions use the searchable encryption concept and,as a result,are not efficient and support only a keyword search.Moreover,the collected forensic data cannot be analyzed using existing well-known digital tools.This research paper first investigates the lawful requirements for PP in DF based on the organization for economic co-operation and development OECB)privacy guidelines.To have an efficient investigation process and meet the increased volume of data,the presented framework is designed based on the selective imaging concept and advanced encryption standard(AES).The proposed framework has two main modules,namely Selective Imaging Module(SIM)and Selective Analysis Module(SAM).The SIM and SAM modules are implemented based on advanced forensic format 4(AFF4)and SleuthKit open source forensics frameworks,respectively,and,accordingly,the proposed framework is evaluated in a forensically sound manner.The evaluation result is compared with other relevant works and,as a result,the proposed solution provides a privacy-preserving,efficient forensic imaging and analysis process while having also sufficient methods.Moreover,the AFF4 forensic image,produced by the SIM module,can be analyzed not only by SAM,but also by other well-known analysis tools available on the market. 展开更多
关键词 digital forensics digital evidence AFF4 privacy preservation selective imaging
下载PDF
Computer Forensics-An Essential Element of Modern IT Security
10
作者 Frank Y.W.Law K.P.Chow 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期5-8,共4页
Computer forensics is the science of obtaining,preserving,and documenting evidence from computers,mobile devices as well as other digital electronic storage devices.All must be done in a manner designed to preserve th... Computer forensics is the science of obtaining,preserving,and documenting evidence from computers,mobile devices as well as other digital electronic storage devices.All must be done in a manner designed to preserve the probative value of the evidence and to assure its admissibility in a legal proceeding.However,computer forensics is continually evolving as existing technologies progress and new technologies are introduced.For example,digital investigators are required to investigate content on mobile device or data stored at the cloud servers.With the popularity of computers in everyday life as well as the acceleration of cybercrime rates in recent years,computer forensics is becoming an essential element of modern IT security.This paper will cover the development of computer forensics in law enforcement and discuss the development in the latest live forensics skillsets.A number of interested areas of computer forensics will be also highlighted to explain how it can support IT security and civil / criminal investigation. 展开更多
关键词 computer forensics CYBERCRIME digital evidence
下载PDF
Effects of Motivation and Demography on the Quantitative Plausibility of the Trojan Horse Defence Against Possession of Child Pornography 被引量:1
11
作者 Richard E Overill Jantje A M Silomon +1 位作者 Kam-Pui Chow Hayson Tse 《Journal of Harbin Institute of Technology(New Series)》 EI CAS 2014年第6期9-15,共7页
The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hy... The Enhanced Complexity Model( ECM) developed previously has been further extended to produce a Motivationally Enhanced Complexity Model( MECM) which enables the degree of motivation,capability and opportunity of a hypothetical Trojan Horse author to be included in quantifying the relative plausibility of competing explanations for the existence of uncontested digital evidence.This new model has been applied to the case of the Trojan Horse defence( THD) against the possession of child pornography.Our results demonstrate that the THD in this case cannot be plausibly sustained unless it can be shown that an ‘off-theshelf'( OTS) Trojan Horse for this task is available and it is not detectable by the target computer,at the material time. 展开更多
关键词 Trojan Horse defence child pornography digital forensic evidence complexity quantitative plausibility metrics posterior odds
下载PDF
k-Dimensional hashing scheme for hard disk integrity verification in computer forensics
12
作者 Zoe Lin JIANG Lucas Chi Kwong HUI +1 位作者 Siu Ming YIU Kam Pui CHOW 《Journal of Zhejiang University-Science C(Computers and Electronics)》 SCIE EI 2011年第10期809-818,共10页
Verifying the integrity of a hard disk is an important concern in computer forensics,as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during the investigation.A t... Verifying the integrity of a hard disk is an important concern in computer forensics,as the law enforcement party needs to confirm that the data inside the hard disk have not been modified during the investigation.A typical approach is to compute a single chained hash value of all sectors in a specific order.However,this technique loses the integrity of all other sectors even if only one of the sectors becomes a bad sector occasionally or is modified intentionally.In this paper we propose a k-dimensional hashing scheme,kD for short,to distribute sectors into a kD space,and to calculate multiple hash values for sectors in k dimensions as integrity evidence.Since the integrity of the sectors can be verified depending on any hash value calculated using the sectors,the probability to verify the integrity of unchanged sectors can be high even with bad/modified sectors in the hard disk.We show how to efficiently implement this kD hashing scheme such that the storage of hash values can be reduced while increasing the chance of an unaffected sector to be verified successfully.Experimental results of a 3D scheme show that both the time for computing the hash values and the storage for the hash values are reasonable. 展开更多
关键词 Computer forensics digital evidence Hard disk integrity k-Dimensional hashing
原文传递
The Modern Development of New Promising Fields in Forensic Examinations
13
作者 Igor V.Borysenko Oleg Yu.Bululukov +2 位作者 Valeriy D.Pcholkin Vasyl V.Baranchuk Vladlena O.Prykhodko 《Journal of Forensic Science and Medicine》 2021年第4期137-144,共8页
The relevance of the study is forensic expert activity in terms of forensic examinations have been so transformed that existing theoretical provisions do not already solve traditional problems in some fields;their sol... The relevance of the study is forensic expert activity in terms of forensic examinations have been so transformed that existing theoretical provisions do not already solve traditional problems in some fields;their solvation requires new approaches of both theoretical and practical nature.In this regard,the purpose of this study is to analyze the content of new innovative directions in forensic examinations,including criminalistic ones,and the possibility of their effective application in forensic expert activity.The methodological basis of the study is the dialectical method of scientific knowledge,which allowed the authors to consider the theoretical and scientific,and practical foundations of modem trends in forensic examinations,including criminalistic ones.It also helped to identify promising fields of examinations necessary for crime prevention.Therefore,authors singled out the following advanced fields:biometric and computer forensic analyses,polygraph,and odor and trace evidence analyses.The materials of the article are of practical value for forensic experts and criminologists,law enforcement agencies. 展开更多
关键词 Analysis of digital evidence odor evidence analysis POLYGRAPH psychophysiological examinations trace evidence analysis
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部