Digital Forensics in a Cyber Warfare Context

نویسنده

  • Alessandro Guarino
چکیده

The paper explores the application of digital forensics techniques to cyber warfare scenarios. A common accepted taxonomy for digital forensics (and antiforensics) activities, techniques, procedures and work flows does not yet exist but guidelines and even international standards have given the field a framework: this paper explores how digital forensics can be logically framed in the context of cyber warfare. The attribution of a cyber attack is widely considered a fundamental aspect to be resolved before the formulation of every cyber strategy by nation-states. Digital forensics procedures and protocols established in civilian contexts can be adopted by military and intelligence bodies. The paper explores the field of digital forensics as applied to cyber warfare, mainly for defensive and intelligence operations. It proposed a taxonomy for digital forensics activities and on the time dimension how it is applied to the phases of forensic operations: prioritization, collection, acquisition, analysis, interpretation, reporting/dissemination, detailing a model that tailors techniques to military context, giving also a review of existing literature. Defensive and intelligence activities also need knowledge of the range of anti-forensics techniques applied by counterparts, so an analysis of the anti-forensics arsenal and how it correlates with forensics processes is conducted. In the conclusion the paper shows the cardinal role of digital forensics (postattack and in readiness processed) even in military activities and the value of concepts developed in the civilian world, albeit adapted.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Big Data in Distributed Analytics, Cybersecurity, Cyber Warfare and Digital Forensics

Big Data can reduce the processing time of large volumes of data in the distributed computing environment using Hadoop. It also can predict potential cybersecurity breaches, help stop cyber attacks, and facilitate post-breach digital forensic analysis. This paper introduces Big Data applications in distributed analytics, general cybersecurity (general cyber threats, cyber attacks, and cyber sec...

متن کامل

Plethora of Cyber Forensics

As threats against digital assets have risen and there is necessitate exposing and eliminating hidden risks and threats. The ability of exposing is called “cyber forensics.” Cyber Penetrators have adopted more sophistical tools and tactics that endanger the operations of the global phenomena. These attackers are also using anti-forensic techniques to hide evidence of a cyber crime. Cyber forens...

متن کامل

Avoiding Cyber-attacks to DMZ and Capturing Forensics from Intruders Using Honeypots

Nowadays, honeypots are widely used to divert attackers from the original target and keep them busy within a decoy environment. DeMilitarized Zone (DMZ) is an important zone for network administrators, because many of the services to the public network is provided at this zone. Many of the security tools such as firewalls, intrusion detection systems and several other secu...

متن کامل

Cyber Forensics: A Military Operations Perspective

This paper discusses some of the unique military requirements and challenges in Cyber Forensics. A definition of Cyber Forensics is presented in a military context. Capabilities needed to perform cyber forensic analysis in a networked environment are discussed, along with a list of current shortcomings in providing these capabilities and a technology needs list. Finally, it is shown how these t...

متن کامل

Cyber Forensics Ontology for Cyber Criminal Investigation

We developed Cyber Forensics Ontology for the criminal investigation in cyber space. Cyber crime is classified into cyber terror and general cyber crime, and those two classes are connected with each other. The investigation of cyber terror requires high technology, system environment and experts, and general cyber crime is connected with general crime by evidence from digital data and cyber sp...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2013