Signature analysis and Computer Forensics

نویسنده

  • Michael Yip
چکیده

Computer Forensics is a process of using scientific knowledge to collect, analyze and present digital evidence to court or tribunals. Since files are the standard persistent form of data on computers, the collection, analysis and presentation of computer files as digital evidence is of utmost essential in Computer Forensics. However, data can be hidden behind files and can be enough to trick the naked eye. Therefore, a more comprehensive data analyzing method called file signature analysis is needed to support the process of Computer Forensics. This method is articulated in details in this article and discussed. Introduction Computer Forensics is the process of using scientific knowledge to collect, analyse and present data to courts. This process involves the preservation, identification, extraction and documentation of computer evidence stored in the form of magnetically, optically or electronically stored media. Steps in forensic process include: 1. Creating an exact physical copy of the digital media e.g. the computer hard disk. This is often called bitwise image 2. Load image to an empty or formatted hard disk 3. Secure the original media in a sealed container 4. Mark and retrieve data of evidential value 5. Present evidence in a readable form for court or tribunal Step 4 involves the examination of the image and the search for evidence. With millions of files being stored on a computer, there is a need for methods to reduce the search space for the forensic examiners and spot out suspicious files. This is where signature analysis is used as part of the forensic process. A signature analysis is a process where files, their headers and extensions are compared with a known database of file headers and extensions in an attempt to verify all files on the storage media and discover those which may be hidden. In order to fully understand the usefulness of signature analysis, this article gives an introduction to the structure of computer files and how such files can be hidden. Then, a demonstration would be articulated to show how signature analysis can be used to defeat such data hiding techniques. Understanding the structure of a file Since data are stored on computers as files, all of these files must be searched and examined as if they were files in an office for the purpose to gather digital evidence. In order to understand the process of

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Digital Forensics Evidence Acquisition and Chain of Custody in Cloud Computing

The new cloud computing concept delivers an adaptable service to many users. This is due to the fact that cloud computing offers an economic solution based on pay-per use idea. At the same time, digital forensics is a relatively new discipline born out due to the growing use of computing and digital solution. Digital forensics in cloud computing brings new technical and legal challenges (e.g. t...

متن کامل

A Signature Detection Scheme for Distributed Storage

Cloud computing is an emerging model of computing that offers elastic scalable computing resources to many concurrent users worldwide. It provides resources that are paid for as they are consumed, dynamically scaled to suit the demands of the user, which makes it attractive to organisations that wish to consolidate resources by creating their own elastic resource platforms or outsource to obtai...

متن کامل

An ECC-Based Mutual Authentication Scheme with One Time Signature (OTS) in Advanced Metering Infrastructure

Advanced metering infrastructure (AMI) is a key part of the smart grid; thus, one of the most important concerns is to offer a secure mutual authentication.  This study focuses on communication between a smart meter and a server on the utility side. Hence, a mutual authentication mechanism in AMI is presented based on the elliptic curve cryptography (ECC) and one time signature (OTS) consists o...

متن کامل

Biometric and Forensic Aspects of Digital Document Processing

Signatures and handwriting have long played a role in dayto-day business transactions and in forensics, e.g., to authenticate documents, as evidence to establish crime or innocence, etc. The individuality of handwriting and signatures is the basis for their relevance to authentication and forensics. This very individuality makes them also potentially useful as a biometric modality. This chapter...

متن کامل

Forensic Data Carving

File or data carving is a term used in the field of Cyber forensics. Cyber forensics is the process of acquisition, authentication, analysis and documentation of evidence extracted from and/or contained in a computer system, computer network and digital media. Extracting data (file) out of undifferentiated blocks (raw data) is called as carving. Identifying and recovering files based on analysi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2008