Windows volatile memory forensics based on correlation analysis

被引:0
|
作者
机构
[1] Zhang, Xiaolu
[2] Hu, Liang
[3] Song, Shinan
[4] Xie, Zhenzhen
[5] Meng, Xiangyu
[6] Zhao, Kuo
来源
Zhao, K. (zhaokuo@jlu.edu.cn) | 1600年 / Academy Publisher卷 / 09期
关键词
Correlation methods - Digital storage - Crime - Digital forensics - Image analysis;
D O I
10.4304/jnw.9.3.645-652
中图分类号
学科分类号
摘要
In this paper, we present an integrated memory forensic solution for multiple Windows memory images. By calculation, the method can find out the correlation degree among the processes of volatile memory images and the hidden clues behind the events of computers, which is usually difficult to be obtained and easily ignored by analyzing one single memory image and forensic investigators. In order to test the validity, we performed an experiment based on two hosts' memory image which contains criminal incidents. According to the experimental result, we find that the event chains reconstructed by our method are similar to the actual actions in the criminal scene. Investigators can review the digital crime scenario which is contained in the data set by analyzing the experimental results. This paper is aimed at finding the valid actions with illegal attempt and making the memory analysis not to be utterly dependent on the operating system and relevant experts. © 2014 ACADEMY PUBLISHER.
引用
收藏
相关论文
共 50 条
  • [41] Live Memory Forensics Investigations: A Comparative Analysis
    Syamsuddin, Irfan
    Syamsuar, Dedy
    JOURNAL OF ADVANCES IN INFORMATION TECHNOLOGY, 2023, 14 (05) : 950 - 959
  • [42] Editorial: Advanced Techniques for Memory Forensics Analysis
    Andrea Lanzi
    Mobile Networks and Applications, 2020, 25 : 234 - 235
  • [43] Editorial: Advanced Techniques for Memory Forensics Analysis
    Lanzi, Andrea
    MOBILE NETWORKS & APPLICATIONS, 2020, 25 (01): : 234 - 235
  • [44] Hidden Process Offline Forensic Based on Memory Analysis in Windows
    CUI Jingsong
    ZHANG Heng
    QI Jing
    PENG Rong
    ZHANG Manli
    Wuhan University Journal of Natural Sciences, 2017, 22 (04) : 346 - 354
  • [45] Private Data Acquisition Method Based on System-Level Data Migration and Volatile Memory Forensics for Android Applications
    Feng, Peijun
    Li, Qingbao
    Zhang, Ping
    Chen, Zhifeng
    IEEE ACCESS, 2019, 7 : 16695 - 16703
  • [46] Automated Windows event log forensics
    Murphey, Rich
    DIGITAL INVESTIGATION, 2007, 4 (92-100) : S92 - S100
  • [47] Line messenger forensics on Windows 10
    Chang, Ming Sang
    Chang, Chih Yen
    Journal of Computers (Taiwan), 2019, 30 (01): : 114 - 125
  • [48] IMO Forensics in Android and Windows Systems
    Ababneh, Ahmad
    Abu Awwad, Mohammad
    Al-Saleh, Mohammed I.
    2017 8TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2017, : 1 - 6
  • [49] Windows Surface RT tablet forensics
    Iqbal, Asif
    Al Obaidli, Hanan
    Marrington, Andrew
    Jones, Andy
    DIGITAL INVESTIGATION, 2014, 11 : S87 - S93
  • [50] MemForC: Memory Forensics Corpus Creation for Malware Analysis
    Orgah, Augustine
    Richard, Golden, III
    Case, Andrew
    PROCEEDINGS OF THE 16TH INTERNATIONAL CONFERENCE ON CYBER WARFARE AND SECURITY (ICCWS 2021), 2021, : 249 - 256