A Digital Triage Forensics Framework of Window Malware Forensic Toolkit

被引:0
作者
Kao, Da-Yu [1 ]
Wu, Guan-Jie [1 ]
机构
[1] Cent Police Univ, Dept Informat Management, Taoyuan 33304, Taiwan
来源
49TH ANNUAL IEEE INTERNATIONAL CARNAHAN CONFERENCE ON SECURITY TECHNOLOGY (ICCST) | 2015年
关键词
digital forensics; digital triage forensics; ISO/IEC; 27037; cybercrime; malware; hacker;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
The rise of malware attack and data leakage is putting the Internet at a higher risk. Digital forensic examiners responsible for cyber security incident need to continually update their processes, knowledge and tools due to changing technology. These attack activities can be investigated by means of Digital Triage Forensics (DTF) methodologies. DTF is a procedural model for the crime scene investigation of digital forensic applications. It takes place as a way of gathering quick intelligence, and presents methods of conducting pre/post-blast investigations. A DTF framework of Window malware forensic toolkit is further proposed. It is also based on ISO/IEC 27037: 2012 - guidelines for specific activities in the handling of digital evidence. The argument is made for a careful use of digital forensic investigations to improve the overall quality of expert examiners. This solution may improve the speed and quality of pre/post-blast investigations. By considering how triage solutions are being implemented into digital investigations, this study presents a critical analysis of malware forensics. The analysis serves as feedback for integrating digital forensic considerations, and specifies directions for further standardization efforts.
引用
收藏
页码:217 / 222
页数:6
相关论文
共 19 条
  • [1] [Anonymous], CYBER WARFARE
  • [2] Aquilina J. M., 2008, MALWARE FORENSICS IN, P93
  • [3] Association of Chief Police Officers (ACPO), 2012, ACPO GOOD PRACT GUID, P6
  • [4] Bashir M.S., 2013, The international Journal of Forensic Computer Science, P35
  • [5] Casey E., 2011, DIGITAL EVIDENCE COM, V3rd, P187
  • [6] Casey E, 2010, HANDBOOK OF DIGITAL FORENSICS AND INVESTIGATION, P21, DOI 10.1016/B978-0-12-374267-4.00002-1
  • [7] Flandrin F., 2014, 7 INT C CYB FOR ED T, DOI [10.13140/2.1.3293.6004, DOI 10.13140/2.1.3293.6004]
  • [8] Hosseinkhani J., 2014, International Journal of Advanced Computer Science and Information Technology, V3, P32
  • [9] International Organization for Standardization (ISO), 2015, 270432015 ISOIEC
  • [10] ISO, 2012, ISO/IEC 27037:2012