2015 9th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing 2015
DOI: 10.1109/imis.2015.68
|View full text |Cite
|
Sign up to set email alerts
|

NTFS Directory Index Analysis for Computer Forensics

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 0 publications
0
3
0
Order By: Relevance
“…When the forensic tools scan the device for images this malicious file may not show as it is declared as a document. Cho (2016) found several tools that can be used to change the creation, last modified and recent timestamps for files on the OS. Once this change has been made the forensic tools would display the modified date and time to the analyst.…”
Section: Trail Obfuscationmentioning
confidence: 99%
“…When the forensic tools scan the device for images this malicious file may not show as it is declared as a document. Cho (2016) found several tools that can be used to change the creation, last modified and recent timestamps for files on the OS. Once this change has been made the forensic tools would display the modified date and time to the analyst.…”
Section: Trail Obfuscationmentioning
confidence: 99%
“…Because most of the evidence that can be obtained during a digital forensic investigation is stored in file units, file system forensics is the most basic and important factor for forensic investigators. Various forensic methods, such as analysis of tree structure [1][2][3][4] and the recovery of deleted file data [5][6][7], have been studied to find important evidence in file systems. Among these file system forensic methods, the recovery of file system metadata is a key technique that makes digital forensic investigations possible by recovering metadata when it is not possible to obtain metadata in a regular manner because file system structure is damaged due to an accident/disaster or cyber terrorism [8][9].…”
Section: Introductionmentioning
confidence: 99%
“…In other word, file systems do not remove data from storage media because it is time-consuming [14]. In this research, the structure of the NTFS file system has been studied because of the system spreads around the world and the desirability of many users [15,16]. The majority of the previous research is classified according to two categories: the first describes the structure of the NTFS file system, and the second type of research was as few as we mentioned.This work was found to provide a detail description of the structure of the NTFS file system, especially the master file table (MFT) structure [17], which is the heart of the NTFS file system and is the basis for file recovery for the target file system [18][19][20].…”
Section: Introductionmentioning
confidence: 99%