2013 Seventh International Conference on IT Security Incident Management and IT Forensics 2013
DOI: 10.1109/imf.2013.20
|View full text |Cite
|
Sign up to set email alerts
|

Forensic Application-Fingerprinting Based on File System Metadata

Abstract: While much work has been invested in tools for aquisition and extraction of digital evidence, there are only few tools that allow for automatic event reconstruction. In this paper, we present a generic approach for forensic event reconstruction based on digital evidence from file systems. Our approach applies the idea of fingerprinting to changes made by applications in file system metadata. We present a system with which it is possible to automatically compute file system fingerprints of individual actions. U… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
21
0

Year Published

2014
2014
2021
2021

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 13 publications
(21 citation statements)
references
References 12 publications
0
21
0
Order By: Relevance
“…Event reconstruction, which allows a digital investigator to understand the timeline of a crime, is one of the paramount steps of the digital investigation process [13]. This complex task requires exploration of a large number of events due to the innovation in technology frequently, a heterogeneous, huge quantity of data, and manually-performed event reconstruction process, which is inefficient and expensive [14]. Bang et al [15] discussed how the creation time, last written time, and last accessed time of a file or folder are important factors that can indicate events that have affected a computer system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Event reconstruction, which allows a digital investigator to understand the timeline of a crime, is one of the paramount steps of the digital investigation process [13]. This complex task requires exploration of a large number of events due to the innovation in technology frequently, a heterogeneous, huge quantity of data, and manually-performed event reconstruction process, which is inefficient and expensive [14]. Bang et al [15] discussed how the creation time, last written time, and last accessed time of a file or folder are important factors that can indicate events that have affected a computer system.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Prior works focus on the detection of specific trace update patterns derive signatures either by using snapshot analysis (Kang et al, 2013;Kalber et al, 2013) comparing the updates to data sources between to different snapshots of the same system, or using real-time trace update detection (James et al, 2011). This work proposes an advancement to the real-time trace update detection.…”
Section: Signature Creationmentioning
confidence: 99%
“…A non-probabilistic model was later proposed by James, Gladyshev et al (James, Gladyshev, & Zhu, 2011) that used real-time system analysis to create signatures of user actions based on created observable traces. Similar methods implementing snapshot-based signature derivation have also been proposed for automatic event reconstruction purposes (Kang, Lee, & Lee, 2013;Kalber, Dewald, & Freiling, 2013). Event reconstruction, however, focuses more on the reconstruction of events in time, where this work is concerned only with the detection of traces that may indicate anti-forensic techniques were used on a suspect system.…”
Section: Introductionmentioning
confidence: 99%
“…Examining millions of pieces of raw data to extract high-level information is a time-consuming and exhausting work. Thus, some automatic methods are required to generate high-level information from raw and low-level data [2][3][4].…”
Section: Introductionmentioning
confidence: 99%