Windows volatile memory forensics based on correlation analysis

被引:0
|
作者
机构
[1] Zhang, Xiaolu
[2] Hu, Liang
[3] Song, Shinan
[4] Xie, Zhenzhen
[5] Meng, Xiangyu
[6] Zhao, Kuo
来源
Zhao, K. (zhaokuo@jlu.edu.cn) | 1600年 / Academy Publisher卷 / 09期
关键词
Correlation methods - Digital storage - Crime - Digital forensics - Image analysis;
D O I
10.4304/jnw.9.3.645-652
中图分类号
学科分类号
摘要
In this paper, we present an integrated memory forensic solution for multiple Windows memory images. By calculation, the method can find out the correlation degree among the processes of volatile memory images and the hidden clues behind the events of computers, which is usually difficult to be obtained and easily ignored by analyzing one single memory image and forensic investigators. In order to test the validity, we performed an experiment based on two hosts' memory image which contains criminal incidents. According to the experimental result, we find that the event chains reconstructed by our method are similar to the actual actions in the criminal scene. Investigators can review the digital crime scenario which is contained in the data set by analyzing the experimental results. This paper is aimed at finding the valid actions with illegal attempt and making the memory analysis not to be utterly dependent on the operating system and relevant experts. © 2014 ACADEMY PUBLISHER.
引用
收藏
相关论文
共 50 条
  • [1] Windows memory forensics
    Ruff, Nicolas
    JOURNAL IN COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2008, 4 (02): : 83 - 100
  • [2] Advances in volatile memory forensics
    Schatz, Bradley
    Cohen, Michael
    DIGITAL INVESTIGATION, 2017, 20 : 1 - 1
  • [3] Process based volatile memory forensics for ransomware detection
    Arfeen, Asad
    Khan, Muhammad Asim
    Zafar, Obad
    Ahsan, Usama
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2022, 34 (04):
  • [4] Memory forensics and the Windows Subsystem for Linux
    Lewis, Nathan
    Case, Andrew
    Ali-Gombe, Aisha
    Richard, Golden G., III
    DIGITAL INVESTIGATION, 2018, 26 : S3 - S11
  • [5] Smartphone Volatile Memory Acquisition for Security Analysis and Forensics Investigation
    Thing, Vrizlynn L. L.
    Chua, Zheng-Leong
    SECURITY AND PRIVACY PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2013, 405 : 217 - 230
  • [6] Volatile memory forensics of privacy aware browsers
    Mistry, Nilay R.
    Gajjar, Krupa
    Junare, S. O.
    INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2022, 18 (3-4) : 313 - 326
  • [7] A Comprehensive Literature Review on Volatile Memory Forensics
    Hamid, Ishrag
    Rahman, M. M. Hafizur
    ELECTRONICS, 2024, 13 (15)
  • [8] A review on spreading and Forensics Analysis of Windows-Based ransomware
    Chayal N.M.
    Saxena A.
    Khan R.
    Annals of Data Science, 2024, 11 (05) : 1503 - 1524
  • [9] Disk Memory Forensics Analysis of Memory Forensics Frameworks Flow
    Prem, T.
    Selwin, V. Paul
    Mohan, Ashok Kumar
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [10] Email Spoofing Detection Using Volatile Memory Forensics
    Iyer, R. Padmavathi
    Atrey, Pradeep K.
    Varshney, Gaurav
    Misra, Manoj
    2017 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2017, : 619 - 625