Windows volatile memory forensics based on correlation analysis

被引:0
|
作者
机构
[1] Zhang, Xiaolu
[2] Hu, Liang
[3] Song, Shinan
[4] Xie, Zhenzhen
[5] Meng, Xiangyu
[6] Zhao, Kuo
来源
Zhao, K. (zhaokuo@jlu.edu.cn) | 1600年 / Academy Publisher卷 / 09期
关键词
Correlation methods - Digital storage - Crime - Digital forensics - Image analysis;
D O I
10.4304/jnw.9.3.645-652
中图分类号
学科分类号
摘要
In this paper, we present an integrated memory forensic solution for multiple Windows memory images. By calculation, the method can find out the correlation degree among the processes of volatile memory images and the hidden clues behind the events of computers, which is usually difficult to be obtained and easily ignored by analyzing one single memory image and forensic investigators. In order to test the validity, we performed an experiment based on two hosts' memory image which contains criminal incidents. According to the experimental result, we find that the event chains reconstructed by our method are similar to the actual actions in the criminal scene. Investigators can review the digital crime scenario which is contained in the data set by analyzing the experimental results. This paper is aimed at finding the valid actions with illegal attempt and making the memory analysis not to be utterly dependent on the operating system and relevant experts. © 2014 ACADEMY PUBLISHER.
引用
收藏
相关论文
共 50 条
  • [21] Non-Volatile Memory Forensic Analysis in Windows 10 IoT Core
    Castelo Gomez, Juan Manuel
    Roldan Gomez, Jose
    Carrillo Mondejar, Javier
    Martinez Martinez, Jose Luis
    ENTROPY, 2019, 21 (12)
  • [22] Volatile Memory Collection and Analysis for Windows Mission-Critical Computer Systems
    Savoldi, Antonio
    Gubian, Paolo
    INTERNATIONAL JOURNAL OF DIGITAL CRIME AND FORENSICS, 2009, 1 (03) : 42 - 61
  • [23] HPDBF: A Forensics Method for Hidden Process Based on Memory Analysis
    Zhao Yu-tao
    Li Qing-bao
    Zeng Guang-yu
    Cheng San-jun
    PROCEEDINGS OF 2016 5TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), 2016, : 705 - 710
  • [24] A Method of Android Application Forensics Based on Heap Memory Analysis
    Zhang, Junfu
    E, Chengyuan
    Hu, Aiqun
    PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND APPLICATION ENGINEERING (CSAE2018), 2018,
  • [25] A Malware Detection Scheme via Smart Memory Forensics for Windows Devices
    Naeem, Muhammad Rashid
    Khan, Mansoor
    Abdullah, Ako Muhammad
    Noor, Fazal
    Khan, Muhammad Ijaz
    Khan, Muhammad Asghar
    Ullah, Insaf
    Room, Shah
    MOBILE INFORMATION SYSTEMS, 2022, 2022
  • [26] A Novel Methodology for Windows 7 x64 Memory Forensics
    Suma, G. S.
    Dija, S.
    Thomas, K. L.
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND COMPUTING RESEARCH (IEEE ICCIC), 2014, : 504 - 509
  • [27] Windows 8 Cloud Storage Analysis: Dropbox Forensics
    Mehreen, S.
    Aslam, B.
    2015 12TH INTERNATIONAL BHURBAN CONFERENCE ON APPLIED SCIENCES AND TECHNOLOGY (IBCAST), 2015, : 312 - 317
  • [28] Windows pagefile collection and analysis for a live forensics context
    Lee, Seokhee
    Savoldi, Antonio
    Lee, Sangjin
    Lim, Jongin
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, WORKSHOP PAPERS, VOL 2, 2007, : 97 - +
  • [29] IDENTIFYING VOLATILE DATA FROM MULTIPLE MEMORY DUMPS IN LIVE FORENSICS
    Law, Frank
    Chan, Patrick
    Yiu, Siu-Ming
    Tang, Benjamin
    Lai, Pierre
    Chow, Kam-Pui
    Ieong, Ricci
    Kwan, Michael
    Hon, Wing-Kai
    Hui, Lucas
    ADVANCES IN DIGITAL FORENSICS VI, 2010, 337 : 185 - +
  • [30] Extraction of Forensic Evidences from Windows Volatile Memory
    Patil, Dinesh N.
    Meshram, Bandu B.
    2017 2ND INTERNATIONAL CONFERENCE FOR CONVERGENCE IN TECHNOLOGY (I2CT), 2017, : 421 - 425