Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1244002.1244049acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

Deriving cse-specific live forensics investigation procedures from FORZA

Published: 11 March 2007 Publication History

Abstract

Performing live forensics investigation becomes a trend in digital forensics. Different vendors and software developer implement their own investigation procedures. By applying FORZA framework -- a digital forensics investigation framework, investigation requirement could be translated and formulated into criteria in applying appropriate forensics investigation requirement. Through this model, only necessary searching would be applied to live investigation process instead of simply passing all investigation process to live investigation unintentionally.
In this paper, the FORZA framework that applied to live forensics investigation will be presented and illustrated using the investigation of the first BT illegal movie upload investigation.

References

[1]
Adelstein, F., "Live Forensics: Diagnosing Your System Without Killing It First", Communications of the ACM (Vol. 49, No. 2), February 2006, pp 63--66
[2]
Brown Christopher L. T., "Benefits and Techniques for Live Investigations", HTCIA International Conference, 2005
[3]
Casey E., Stanley A., "Tool review -- remote forensic preservation and examination tools", Digital Investigation 2004; 1(4), pp284 -- 297
[4]
DFRWS, Report from the First Digital Forensic Research Workshop. DTR-T001-01 FINAL A Road Map for Digital Forensic Research. Final version, November 6, 2001. http://www.dfrws.org
[5]
HKSAR v Chan Nai Ming, {2005}, TMCC 1268/2005, http://www.smlawpub.com.hk/cases/2005/1024.htm
[6]
Ieong Ricci S. C., "FORZA -- Digital forensics investigation framework that incorporate legal issues", Digital Forensics Research Workshop (DFRWS), 2006
[7]
John McLeod, "IRCR v2", http://tools.phantombyte.com/
[8]
Jesse Kornblum, "Preservation of Fragile Digital Evidence by First Responders", Digital Forensics Research Workshop (DFRWS), 2002
[9]
Kenneally Erin E., Brown Christopher L. T., "Risk sensitive digital evidence collection", Digital Investigation 2005; 2(2), pp101 -- 119
[10]
Knoppix, "First Responder Guide for Law Enforcement and Corrections Officers", 01 July 2003
[11]
McDougal Monty, "Live Forensics on a Windows System: Using Windows Forensic Toolchest (WFT)", http://www.foolmoon.net/security, 10 Jun 2006
[12]
Nikkel Bruce J., "Generalizing sources of live network evidence", Digital Investigation 2005; 2(3), pp193 -- 200
[13]
Nikkel Bruce J., "Improving evidence acquisition from live network sources", Digital Investigation 2006; 3(2), pp89 -- 96
[14]
Reith M., Carr., C., and Gunsch, G., "An Examination of Digital Forensic Models." International Journal of Digital Evidence (1:3), Fall 2002, pp 1--12.
[15]
Sommer Peter, "Downloads, logs, and captures: evidence from cyberspace", Journal of Financial Crime, October 1997
[16]
U.S. Department of Justice, "Electronic crime scene investigation -- a guide for first responders", 2001
[17]
U.S. Department of Justice, "Forensic Examination of Digital Evidence: A Guide for Law Enforcement", 2004

Cited By

View all
  • (2010)A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations2010 International Conference on Availability, Reliability and Security10.1109/ARES.2010.62(677-682)Online publication date: Feb-2010

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
March 2007
1688 pages
ISBN:1595934804
DOI:10.1145/1244002
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 11 March 2007

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. FORZA
  2. digital forensics framework
  3. live forensics

Qualifiers

  • Article

Conference

SAC07
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)8
  • Downloads (Last 6 weeks)0
Reflects downloads up to 21 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2010)A Framework to Guide the Implementation of Proactive Digital Forensics in Organisations2010 International Conference on Availability, Reliability and Security10.1109/ARES.2010.62(677-682)Online publication date: Feb-2010

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media