Windows volatile memory forensics based on correlation analysis

被引:0
|
作者
机构
[1] Zhang, Xiaolu
[2] Hu, Liang
[3] Song, Shinan
[4] Xie, Zhenzhen
[5] Meng, Xiangyu
[6] Zhao, Kuo
来源
Zhao, K. (zhaokuo@jlu.edu.cn) | 1600年 / Academy Publisher卷 / 09期
关键词
Correlation methods - Digital storage - Crime - Digital forensics - Image analysis;
D O I
10.4304/jnw.9.3.645-652
中图分类号
学科分类号
摘要
In this paper, we present an integrated memory forensic solution for multiple Windows memory images. By calculation, the method can find out the correlation degree among the processes of volatile memory images and the hidden clues behind the events of computers, which is usually difficult to be obtained and easily ignored by analyzing one single memory image and forensic investigators. In order to test the validity, we performed an experiment based on two hosts' memory image which contains criminal incidents. According to the experimental result, we find that the event chains reconstructed by our method are similar to the actual actions in the criminal scene. Investigators can review the digital crime scenario which is contained in the data set by analyzing the experimental results. This paper is aimed at finding the valid actions with illegal attempt and making the memory analysis not to be utterly dependent on the operating system and relevant experts. © 2014 ACADEMY PUBLISHER.
引用
收藏
相关论文
共 50 条
  • [31] Detection of Anti-forensics and Malware Applications in Volatile Memory Acquisition
    Ratcliffe, Chandlor
    Bokolo, Biodoumoye George
    Oladimeji, Damilola
    Zhou, Bing
    ADVANCES AND TRENDS IN ARTIFICIAL INTELLIGENCE: THEORY AND PRACTICES IN ARTIFICIAL INTELLIGENCE, 2022, 13343 : 516 - 527
  • [32] Volatile Memory Forensics Acquisition Efficacy: A Comparative Study Towards Analysing Firmware-Based Rootkits
    Taylor, Jacob
    Turnbull, Benjamin
    Creech, Gideon
    13TH INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY (ARES 2018), 2019,
  • [33] Characteristics and detectability of Windows auto-start extensibility points in memory forensics
    Uroz, Daniel
    Rodriguez, Ricardo J.
    DIGITAL INVESTIGATION, 2019, 28 : S95 - S104
  • [34] Windows Mobile advanced forensics
    Klaver, C.
    DIGITAL INVESTIGATION, 2010, 6 (3-4) : 147 - 167
  • [35] Introduction to Windows Mobile Forensics
    Casey, Eoghan
    Bann, Michael
    Doyle, John
    DIGITAL INVESTIGATION, 2010, 6 (3-4) : 136 - 146
  • [36] Digital Forensics Analysis of Windows 11 Shellbag with Comparative Tools
    Neyaz, Ashar
    Shashidhar, Narasimha
    Varol, Cihan
    Rasheed, Amar
    2022 10TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSICS AND SECURITY (ISDFS), 2022,
  • [37] Timestamp Patterns in Windows Forensics
    Luh, Robert
    Galhuber, Michael
    ERCIM NEWS, 2022, (129): : 27 - 28
  • [38] Windows Mobile LiveSD Forensics
    Canlar, Eyup S.
    Conti, Mauro
    Crispo, Bruno
    Di Pietro, Roberto
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (02) : 677 - 684
  • [39] Development of a deep stacked ensemble with process based volatile memory forensics for platform independent malware detection and classification
    Naeem, Hamad
    Dong, Shi
    Falana, Olorunjube James
    Ullah, Farhan
    EXPERT SYSTEMS WITH APPLICATIONS, 2023, 223
  • [40] Initial case analysis using windows registry in computer forensics
    Chang, Kisik
    Kim, Gibum
    Kim, Kwonyoup
    Kim, Woosuk
    PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, 2007, : 563 - 568