메뉴 건너뛰기




Volumn 55, Issue 6, 2010, Pages 1471-1480

Advanced framework for digital forensic technologies and procedures

Author keywords

Admissible evidence; Digital forensics; Forensic procedures; Forensic science; Sensor networks; Service oriented architectures

Indexed keywords

ARTICLE; COMPUTER NETWORK; COMPUTER SECURITY; FORENSIC SCIENCE; HUMAN; METHODOLOGY; MICROCOMPUTER; VICTIM;

EID: 78149296009     PISSN: 00221198     EISSN: 15564029     Source Type: Journal    
DOI: 10.1111/j.1556-4029.2010.01528.x     Document Type: Article
Times cited : (20)

References (57)
  • 2
    • 0038205937 scopus 로고    scopus 로고
    • The role of criminal profiling in the computer forensics process
    • Rogers M. The role of criminal profiling in the computer forensics process. Comput Secur 2003;22(4):292-8.
    • (2003) Comput Secur , vol.22 , Issue.4 , pp. 292-298
    • Rogers, M.1
  • 3
    • 0038027865 scopus 로고    scopus 로고
    • Computer forensics: incident response essentials
    • New York, NY: Addison-Wesley Professional
    • Kruse WJ, Heiser JG. Computer forensics: incident response essentials. New York, NY: Addison-Wesley Professional, 2002.
    • (2002)
    • Kruse, W.J.1    Heiser, J.G.2
  • 4
    • 0036756440 scopus 로고    scopus 로고
    • End-to-end digital forensics
    • Stephenson P. End-to-end digital forensics. Computer Fraud and Security 2002;2002(9):17-9.
    • (2002) Computer Fraud and Security , vol.2002 , Issue.9 , pp. 17-19
    • Stephenson, P.1
  • 5
    • 84892804004 scopus 로고    scopus 로고
    • Managing information systems security and privacy
    • Heidelberg/New York: Springer
    • Trček D. Managing information systems security and privacy. Heidelberg/New York: Springer, 2006.
    • (2006)
    • Trček, D.1
  • 6
    • 33751404666 scopus 로고    scopus 로고
    • Measures of retaining digital evidence to prosecute computer-based cyber-crimes
    • Wang SJ. Measures of retaining digital evidence to prosecute computer-based cyber-crimes. Computer Standards & Interfaces 2007;29(2):216-23.
    • (2007) Computer Standards & Interfaces , vol.29 , Issue.2 , pp. 216-223
    • Wang, S.J.1
  • 7
    • 78149314410 scopus 로고    scopus 로고
    • Palmer G, editor. A, road map for digital forensic research, Report From the First Digital Forensic Research Workshop (DFRWS)). Utica, NY: AFRL/IFGB; 2001 Nov. Report No.: DTR-T001-01 FINAL.
    • Palmer G, editor. A road map for digital forensic research (Report From the First Digital Forensic Research Workshop (DFRWS)). Utica, NY: AFRL/IFGB; 2001 Nov. Report No.: DTR-T001-01 FINAL.
  • 8
    • 78149312907 scopus 로고    scopus 로고
    • Forensics: The science of crime-solving series
    • Philadelphia, PA: Ser. Mason Crest Publishers
    • Hunter W. Forensics: The science of crime-solving series. Philadelphia, PA: Ser. Mason Crest Publishers, 2005.
    • (2005)
    • Hunter, W.1
  • 10
    • 78149326620 scopus 로고    scopus 로고
    • Proceedings of the Fifth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (CPN '04); 2004 Oct 8-11; Aarhus, Denmark
    • In: Jensen K, editor. Aarhus, Denmark: CPN Group-Department of Computer Science/University of Aarhus
    • Stephenson P. A formal model for information risk analysis using colored petri nets. In: Jensen K, editor. Proceedings of the Fifth Workshop and Tutorial on Practical Use of Coloured Petri Nets and the CPN Tools (CPN '04); 2004 Oct 8-11; Aarhus, Denmark. Aarhus, Denmark: CPN Group-Department of Computer Science/University of Aarhus, 2004;167-84.
    • (2004) A formal model for information risk analysis using colored petri nets , pp. 167-184
    • Stephenson, P.1
  • 11
    • 33745981764 scopus 로고    scopus 로고
    • A cyber forensics ontology: creating a new approach to studying cyber forensics
    • Brinson A, Robinson A, Rogers M. A cyber forensics ontology: creating a new approach to studying cyber forensics. Digit Invest 2006;3(Suppl. 1):37-43.
    • (2006) Digit Invest , vol.3 , Issue.SUPPL. 1 , pp. 37-43
    • Brinson, A.1    Robinson, A.2    Rogers, M.3
  • 12
    • 33746255206 scopus 로고    scopus 로고
    • FORZA-Digital forensics investigation framework that incorporate legal issues
    • Ieong RSC. FORZA-Digital forensics investigation framework that incorporate legal issues. Digit Invest 2006;3(Suppl. 1):29-36.
    • (2006) Digit Invest , vol.3 , Issue.SUPPL. 1 , pp. 29-36
    • Ieong, R.S.C.1
  • 13
    • 51149091325 scopus 로고    scopus 로고
    • A theoretical framework for organizational network forensic readiness
    • Endicott-Popovsky B, Frincke DA, Taylor CA. A theoretical framework for organizational network forensic readiness. J Comput 2007;2(3):1-11.
    • (2007) J Comput , vol.2 , Issue.3 , pp. 1-11
    • Endicott-Popovsky, B.1    Frincke, D.A.2    Taylor, C.A.3
  • 14
    • 34447558144 scopus 로고    scopus 로고
    • Specifying digital forensics: a forensics policy approach
    • Taylor C, Endicott-Popovsky B, Frincke DA. Specifying digital forensics: a forensics policy approach. Digital Investigation 2007;4(Suppl. 1):101-4.
    • (2007) Digital Investigation , vol.4 , Issue.SUPPL. 1 , pp. 101-104
    • Taylor, C.1    Endicott-Popovsky, B.2    Frincke, D.A.3
  • 15
    • 36248946132 scopus 로고    scopus 로고
    • New approaches for security, privacy and trust in complex environments (IFIP International Federation for Information Processing)
    • In: Venter H, Eloff M, Labuschagne L, Eloff VSR, editors. Boston, MA: Springer
    • Grobler T, Louwrens B. Digital forensic readiness as a component of information security: best practice. In: Venter H, Eloff M, Labuschagne L, Eloff VSR, editors. New approaches for security, privacy and trust in complex environments (IFIP International Federation for Information Processing). Boston, MA: Springer, 2007;13-24.
    • (2007) Digital forensic readiness as a component of information security: best practice , pp. 13-24
    • Grobler, T.1    Louwrens, B.2
  • 16
    • 51149113181 scopus 로고    scopus 로고
    • Legal aspects of digital forensics
    • Washington, DC: The George Washington University
    • Ryan DJ, Shpantzer G. Legal aspects of digital forensics. Washington, DC: The George Washington University, 2002.
    • (2002)
    • Ryan, D.J.1    Shpantzer, G.2
  • 17
    • 34548120271 scopus 로고    scopus 로고
    • An ad hoc review of digital forensic models. Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2007); 2007 Apr 10-12; Seattle, WA. Washington, DC: IEEE Computer Society
    • Pollitt MM. An ad hoc review of digital forensic models. Proceedings of the Second International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2007); 2007 Apr 10-12; Seattle, WA. Washington, DC: IEEE Computer Society, 2007;10-2.
    • (2007) , pp. 10-12
    • Pollitt, M.M.1
  • 18
    • 50849093942 scopus 로고    scopus 로고
    • SADFE 2008. Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering
    • In: Rekhis S, Krichene J, Boudriga N, editors. ; 2008 May; Oakland, CA. Washington, DC: IEEE Computer Society
    • Rekhis S, Krichene J, Boudriga N. Cognitive-maps based investigation of digital security incidents. In: Rekhis S, Krichene J, Boudriga N, editors. SADFE 2008. Proceedings of the 2008 Third International Workshop on Systematic Approaches to Digital Forensic Engineering; 2008 May; Oakland, CA. Washington, DC: IEEE Computer Society, 2008;25-40.
    • (2008) Cognitive-maps based investigation of digital security incidents , pp. 25-40
    • Rekhis, S.1    Krichene, J.2    Boudriga, N.3
  • 20
    • 78149356870 scopus 로고    scopus 로고
    • Digital forensics
    • Cohen F. Digital forensics. Network Sec 2000;2000(1):18-20.
    • (2000) Network Sec , vol.2000 , Issue.1 , pp. 18-20
    • Cohen, F.1
  • 21
    • 33746009068 scopus 로고    scopus 로고
    • A correlation method for establishing provenance of timestamps in digital evidence
    • Schatz B, Mohay G, Clark A. A correlation method for establishing provenance of timestamps in digital evidence. Digit Invest 2006;3(Suppl. 1):98-107.
    • (2006) Digit Invest , vol.3 , Issue.SUPPL. 1 , pp. 98-107
    • Schatz, B.1    Mohay, G.2    Clark, A.3
  • 22
    • 84881148080 scopus 로고    scopus 로고
    • Timestamp evidence correlation by model based clock hypothesis testing. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST, Article No 15.
    • Willassen SY. Timestamp evidence correlation by model based clock hypothesis testing. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST, 2008;Article No 15.
    • (2008)
    • Willassen, S.Y.1
  • 25
    • 34447620631 scopus 로고    scopus 로고
    • An efficient technique for enhancing forensic capabilities of Ext2 file system
    • Barik MS, Gupta G, Sinha S, Mishra A, Mazumdar C. An efficient technique for enhancing forensic capabilities of Ext2 file system. Digit Invest 2007;4(Suppl. 1):55-61.
    • (2007) Digit Invest , vol.4 , Issue.SUPPL. 1 , pp. 55-61
    • Barik, M.S.1    Gupta, G.2    Sinha, S.3    Mishra, A.4    Mazumdar, C.5
  • 26
    • 40749152296 scopus 로고    scopus 로고
    • Probabilistic packet marking for large-scale IP traceback
    • Goodrich MT. Probabilistic packet marking for large-scale IP traceback. IEEE/ACM Transactions on Networking (TON) 2008;16(1):15-24.
    • (2008) IEEE/ACM Transactions on Networking (TON) , vol.16 , Issue.1 , pp. 15-24
    • Goodrich, M.T.1
  • 27
    • 57949093224 scopus 로고    scopus 로고
    • Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation
    • Sung M, Xu J, Li J, Li L. Large-scale IP traceback in high-speed internet: practical techniques and information-theoretic foundation. IEEE/ACM Transactions on Networking (TON) 2008;16(6):1253-66.
    • (2008) IEEE/ACM Transactions on Networking (TON) , vol.16 , Issue.6 , pp. 1253-1266
    • Sung, M.1    Xu, J.2    Li, J.3    Li, L.4
  • 28
    • 77952377075 scopus 로고    scopus 로고
    • A general model of probabilistic packet marking for IP traceback. Proceedings of the 2008 of the ASIAN ACM Symposium on Information, Computer and Communications Security; 2008 Mar 18-20; Tokyo, Japan. New York, NY: ACM
    • Lu L, Chan MC, Chang EC. A general model of probabilistic packet marking for IP traceback. Proceedings of the 2008 of the ASIAN ACM Symposium on Information, Computer and Communications Security; 2008 Mar 18-20; Tokyo, Japan. New York, NY: ACM;179-88.
    • Lu, L.1    Chan, M.C.2    Chang, E.C.3
  • 29
    • 42049090373 scopus 로고    scopus 로고
    • Packet forwarding with source verification
    • Shue CA, Gupta M, Davy MP. Packet forwarding with source verification. Computer Networks 2008;52(8):1567-82.
    • (2008) Computer Networks , vol.52 , Issue.8 , pp. 1567-1582
    • Shue, C.A.1    Gupta, M.2    Davy, M.P.3
  • 30
    • 84969877105 scopus 로고    scopus 로고
    • Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST, Article No 8.
    • Nilsson DK, Larson UE. Conducting forensic investigations of cyber attacks on automobile in-vehicle networks. Proceedings of the 1st International Conference on Forensic Applications and Techniques in Telecommunications, Information, and Multimedia and Workshop; 2008 Jan 21-23; Adelaide, Australia. Brussels, Belgium: ICST 2008;Article No 8.
    • (2008)
    • Nilsson, D.K.1    Larson, U.E.2
  • 31
    • 78149351642 scopus 로고    scopus 로고
    • Forensic readiness. Cambridge, MA: @stake Inc., accessed August 13, 2009).
    • Tan J. Forensic readiness. Cambridge, MA: @stake Inc., 2001, (accessed August 13, 2009).
    • (2001)
    • Tan, J.1
  • 32
    • 24344496999 scopus 로고    scopus 로고
    • A ten step process for forensic readiness
    • Rowlingson R. A ten step process for forensic readiness. Int J Digit Evid 2004;2(3):1-28.
    • (2004) Int J Digit Evid , vol.2 , Issue.3 , pp. 1-28
    • Rowlingson, R.1
  • 33
    • 78149320387 scopus 로고    scopus 로고
    • Policies to enhance computer and network forensics. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security; 2001 June 5-6; West Point, NY. IEEE
    • Yasinsac A, Manzano Y. Policies to enhance computer and network forensics. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security; 2001 June 5-6; West Point, NY. IEEE, 2001.
    • (2001)
    • Yasinsac, A.1    Manzano, Y.2
  • 34
    • 1942505732 scopus 로고    scopus 로고
    • Management strategies for implementing forensic security measure
    • Wolfe-Wilson J, Wolfe HB. Management strategies for implementing forensic security measure. Info Tech Sec Report 2003;8(2):55-64.
    • (2003) Info Tech Sec Report , vol.8 , Issue.2 , pp. 55-64
    • Wolfe-Wilson, J.1    Wolfe, H.B.2
  • 35
    • 1242286401 scopus 로고    scopus 로고
    • The future of computer forensics: a needs analysis survey
    • Rogers MK, Seigfried K. The future of computer forensics: a needs analysis survey. Comput & Secur 2004;23(1):12-6.
    • (2004) Comput & Secur , vol.23 , Issue.1 , pp. 12-16
    • Rogers, M.K.1    Seigfried, K.2
  • 36
    • 3042642695 scopus 로고    scopus 로고
    • Getting physical with the digital investigation process
    • Carrier B, Spafford E. Getting physical with the digital investigation process. Int J Digit Evid 2003;2(2):???-???.
    • (2003) Int J Digit Evid , vol.2 , Issue.2
    • Carrier, B.1    Spafford, E.2
  • 38
    • 0347577437 scopus 로고
    • Security architecture for open distributed systems (Wiley Series in Communications & Distributed Systems)
    • Chichester, England: John Wiley & Sons
    • Muftic S, Patel A, Sanders P, Colon R, Heijnsdijk J, Pulkkinen U. Security architecture for open distributed systems (Wiley Series in Communications & Distributed Systems). Chichester, England: John Wiley & Sons, 1993.
    • (1993)
    • Muftic, S.1    Patel, A.2    Sanders, P.3    Colon, R.4    Heijnsdijk, J.5    Pulkkinen, U.6
  • 39
    • 56849106276 scopus 로고    scopus 로고
    • Computer forensics: high-tech law enforcement
    • Garber L. Computer forensics: high-tech law enforcement. IEEE Computer 2001;34(1):22-7.
    • (2001) IEEE Computer , vol.34 , Issue.1 , pp. 22-27
    • Garber, L.1
  • 41
    • 84988573115 scopus 로고    scopus 로고
    • The design and implementation of tripwire: a file system integrity checker. Proceedings of the 2nd ACM Conference on Computer and Communications Security; 1994 Nov 2-4; Fairfax, VA. New York, NY: ACM, 1994
    • Gene HK, Spafford EH. The design and implementation of tripwire: a file system integrity checker. Proceedings of the 2nd ACM Conference on Computer and Communications Security; 1994 Nov 2-4; Fairfax, VA. New York, NY: ACM 1994;18-29.
    • Gene, H.K.1    Spafford, E.H.2
  • 42
    • 85090433665 scopus 로고    scopus 로고
    • SNORT-Lightweight intrusion detection system for networks. Proceedings of the 13th USENIX Conference on System Administration; 1999 Nov 7-12; Seattle, WA. Berkeley, CA: USENIX Association
    • Roesch M. SNORT-Lightweight intrusion detection system for networks. Proceedings of the 13th USENIX Conference on System Administration; 1999 Nov 7-12; Seattle, WA. Berkeley, CA: USENIX Association, 1999;229-38.
    • (1999) , pp. 229-238
    • Roesch, M.1
  • 43
    • 78149343689 scopus 로고
    • Data Protection Directive 95/64/EC. Official Journal of the European Communities L281, European Commission.
    • Data Protection Directive 95/64/EC. Official Journal of the European Communities L281, European Commission. 1995.
    • (1995)
  • 44
    • 78149322067 scopus 로고    scopus 로고
    • Services deployment methodologies for weak processing devices: an analysis. In: System theory and applications. Proceedings of the 11th WSEAS International Conference on Systems; 2007 Jul 23-25; Agios Nikolaos, Greece. Stevens Point, WI: WSEAS Press
    • Trček D. Services deployment methodologies for weak processing devices: an analysis. In: System theory and applications. Proceedings of the 11th WSEAS International Conference on Systems; 2007 Jul 23-25; Agios Nikolaos, Greece. Stevens Point, WI: WSEAS Press 2007;357-60.
    • (2007) , pp. 357-360
    • Trček, D.1
  • 45
    • 58049127833 scopus 로고    scopus 로고
    • DiCAP: distributed packet capturing architecture for high-speed network links. 33rd Annual IEEE Conference on Local Computer Networks (LCN); 2008 Oct 14-17; Montreal, Canada. IEEE Computer Society
    • Morariu C, Stiller B. DiCAP: distributed packet capturing architecture for high-speed network links. 33rd Annual IEEE Conference on Local Computer Networks (LCN); 2008 Oct 14-17; Montreal, Canada. IEEE Computer Society, 2008;168-75.
    • (2008) , pp. 168-175
    • Morariu, C.1    Stiller, B.2
  • 46
    • 78149332931 scopus 로고    scopus 로고
    • Open Source Forensics: Open Source Tools
    • Open Source Forensics: Open Source Tools.
  • 47
    • 39749098014 scopus 로고    scopus 로고
    • Is the open way a better way? Digital forensics using open source tools. Proceedings of the 40th Hawaii International Conference on System Sciences; 2007 Jan 3-6; Waikola Village, Hawaii. Washington, DC: IEEE Computer Society
    • Manson D, Carlin A, Ramos S, Gyger A, Kaufman M, Treichelt J. Is the open way a better way? Digital forensics using open source tools. Proceedings of the 40th Hawaii International Conference on System Sciences; 2007 Jan 3-6; Waikola Village, Hawaii. Washington, DC: IEEE Computer Society 2007;266b.
    • (2007)
    • Manson, D.1    Carlin, A.2    Ramos, S.3    Gyger, A.4    Kaufman, M.5    Treichelt, J.6
  • 48
    • 38549099956 scopus 로고    scopus 로고
    • Open source digital forensics tools: the legal argument
    • Cambridge, MA: @stake Inc.
    • Carrier B. Open source digital forensics tools: the legal argument. Cambridge, MA: @stake Inc., 2002.
    • (2002)
    • Carrier, B.1
  • 49
    • 78149325013 scopus 로고    scopus 로고
    • The two-edged sword: Legal computer forensics and open source
    • Byfield B. The two-edged sword: Legal computer forensics and open source. News Forge 2005;???:???-???.
    • (2005) News Forge
    • Byfield, B.1
  • 50
    • 78149336862 scopus 로고    scopus 로고
    • Sleuthkit/Autopsy: an open source forensic package. February 15
    • Gyger A. Sleuthkit/Autopsy: an open source forensic package. February 15, 2006.
    • (2006)
    • Gyger, A.1
  • 51
    • 35448935930 scopus 로고    scopus 로고
    • Scrubbing stubborn data
    • Geiger M, Cranor LF. Scrubbing stubborn data. IEEE Sec & Priv 2006;4(5):16-25.
    • (2006) IEEE Sec & Priv , vol.4 , Issue.5 , pp. 16-25
    • Geiger, M.1    Cranor, L.F.2
  • 52
    • 48749091043 scopus 로고    scopus 로고
    • An overall assessment of Mobile Internal Acquisition Tool
    • Distefano A, Me G. An overall assessment of Mobile Internal Acquisition Tool. Digit Invest 2008;5(Suppl. 1):S121-7.
    • (2008) Digit Invest , vol.5 , Issue.SUPPL. 1
    • Distefano, A.1    Me, G.2
  • 53
    • 84900130540 scopus 로고    scopus 로고
    • Digital crime and forensic science in cyberspace (N/A)
    • In: Kanellis P, editor. Hershey, PA: Idea Group Publishing
    • Richard GG, Roussev V. Digital forensics tools: the next generation. In: Kanellis P, editor. Digital crime and forensic science in cyberspace (N/A). Hershey, PA: Idea Group Publishing, 2006;76-81.
    • (2006) Digital forensics tools: the next generation , pp. 76-81
    • Richard, G.G.1    Roussev, V.2
  • 54
    • 78149346759 scopus 로고    scopus 로고
    • Scientific Working Group on Digital Evidence., Best practices for computer forensics, Version 2.1 (July 2006), accessed August 13, 2009).
    • Scientific Working Group on Digital Evidence. Best practices for computer forensics, Version 2.1 (July 2006), (accessed August 13, 2009).
  • 55
    • 78149332219 scopus 로고    scopus 로고
    • ENFSI., Guidelines for best practice in the forensic examination of digital technology, FIT-2005-001, No. 6, accessed August 13, 2009).
    • ENFSI. Guidelines for best practice in the forensic examination of digital technology, FIT-2005-001, No. 6, (accessed August 13, 2009).
  • 56
    • 0003470701 scopus 로고    scopus 로고
    • General requirements for the competence of testing and calibration laboratories, ISO/IEC 17025
    • ISO/IEC., 2nd edn. Geneva, Switzerland: ISO
    • ISO/IEC. General requirements for the competence of testing and calibration laboratories, ISO/IEC 17025, 2nd edn. Geneva, Switzerland: ISO, 2005.
    • (2005)
  • 57
    • 0038365269 scopus 로고    scopus 로고
    • Model law on electronic commerce
    • UNCITRAL., Vienna, Austria: United Nations Commission on International Trade Law (UNCITRAL)
    • UNCITRAL. Model law on electronic commerce. Vienna, Austria: United Nations Commission on International Trade Law (UNCITRAL), 1996.
    • (1996)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.