2
Most read
12
Most read
13
Most read
Digital Forensic:
Brief Intro & Research challenge
Aung Thu Rha Hein (g5536871)
4th February 2014
Content
●
●
●
●
●
●
●
●
●

What is Digital Forensic
Examples Of DF Cases
Digital Forensic Branches
Use of Digital Forensic
Methodology
Tools
Research Challenge
Future Challenge
Discussion & Conclusion
Digital Forensic
● preservation, identification, extraction,interpretation &
documentation of computer evidence which can be
used in the court of law.
● Goal: To explain the current state of digital artifact
Examples Of DF Cases
August 6, 2009 DDoS attacks
To Social Sites
Examples Of DF Cases/2
● BTK Killer
○ serial killer arrested by investigating letters sent via
floppy disk
● David Riley
○ Air Force Major sent images of child pornography
over internet
Digital Forensic Branches
➔
➔
➔
➔
➔

Disk Forensic
◆ Flash, HDD, USB Device
Network Forensic
◆ monitoring and analyzing network traffic
Memory Forensic
◆ analysis of system dump
Mobile Forensic
◆ acquire deleted or undeleted data
Cloud Forensic
◆ forensic network analysis on Cloud computing architecture
Use of Digital Forensic
➔ Criminal Investigations
◆ Child Pornography,identify thief, e-Crimes
➔ Civil Litigation
◆ eDiscovery
➔ Intelligence
◆ Terrorist attacks
Methodology
● Basic Methodology
Acquire
Evidence

Authenticate
evidence

Analyze
Data
Methodology/2
●

●
●

3 standard methodologies & the detailed process varies
○ Basic Forensic Methodology
○ Cyber Tool Online Search For Evidence (CTOSE)
○ Data Recovery UK (DRUK)
the recommended methodology6 combines the practice from 3 standards
there are more than dozen DF frameworks
[6] Krishnun Sansurooah,Taxonomy of computer forensics methodologies and procedures for digital evidence seizure,
2006.
Taxonomy of
DF
Methodology

Content
Digital Forensic Tools
Tools

Use

Forensic Toolkit AccessData Group, LLC

Multipurpose tool (acquisition,verification,
searching, reporting, wiping, etc.)

SMART & SMART for Linux ASR Data, Data
Acquisition and Analysis, LLC

Multipurpose tool (acquisition,verification,
searching, reporting, wiping, etc.)

Softblock, Macquisition, Blacklight BlackBag Multiple Macintosh forensic
Technologies, Inc.
tools
Raptor Forward Discovery, Inc.

Linux-based acquisition and
preview tool
Research Challenges
●
●

DF research is trending from 1997-2007
After 2007, Digital forensic meets with many challenges

Characteristics comparison
Era

OS

File Format

Computing
Architecture

Storage
Architecture

Tools

1997-2007

Windows
Dominance

few file formats

PC, Centralized

standard cable
interfaces

commercial
tools are
working

2007- recent

increasing OSs

Various file
formats

Client/Server,Cloud

Flash, Cloud
Storage

can’t catch up
with req

Other introduced issues: Storage Size, pervasive encryption, legal challenges
Research Challenges/2
●

●

●
●
●

Evidence-oriented design influences today’s DF research
○ find evidence instead of assisting investigation
○ not think of cyber-crime, i.e tools are not for hacking cases
○ not possible to perform short-time analysis
○ not capable of generating data from residual file
Visibility,Filter,Report Model
○ data recover before making analysis
○ not possible to do parallel processing
no standard for reverse engineering
‘application instead of tools’ concept by vendors
lost academic research
2010,Digital forensics research: The next 10 years
Research Challenges/3
●
●
●

●
●

2013 survey takes part in 4 categories:
○ Demographics, Forensic Capabilities, Future Challenge, Legislative Concerns
more than 50%of participants: 3 years of DF experience
Current DF tools & Capabilities:
○ Importance: more than 98% ranks as 4 out of 5
○ Key Limitations: Data Volume, TIme, Tool Capability
○ Tool Capability: not clear result
Technology that least concerns: malware, steganography

2013, Challenges to Digital Forensic
Future Challenge
●

Challenge: Investigation & Analysis Time

●

Mobile and Network Forensic will be trending

●

anticipated future challenge: Cloud Computing, Anti-forensic, Encryption, Social Networking

●

Should adopt standards for case data, data abstractions and composable models

●

more data abstractions should create

●

should standardise development diversity

●

alternative analysis model: parallel processing, stochastic analysis ...

●

doesn’t work in small-scale dataset

●

standardized test data
Discussion & Conclusion
●
●
●
●

The importance of DF
DF has been in “Golden Age” and it is over
encounters many research challenges
needs a clear research plan/agenda

Thank you...
Questions?
References
[1] J. Sammons, Ed., “The Basics of Digital Forensics”. Boston: Syngress, 2012.
[2] S. L. Garfinkel, “Digital forensics research: The next 10 years,” Digital Investigation, vol. 7, Supplement, pp. S64–S73,
Aug. 2010.
[3] M. Al Fahdi, N. L. Clarke, and S. M. Furnell, “Challenges to digital forensics: A survey of researchers amp; practitioners
attitudes and opinions,” in Information Security for South Africa, 2013, 2013, pp. 1–8.
[4] E. S. Pilli, R. C. Joshi, and R. Niyogi, “Network forensic frameworks: Survey and research challenges,” Digital
Investigation, vol. 7, no. 1–2, pp. 14–27, Oct. 2010.
[5] Marcus K Rogers and Kate Seigfried, “The future of computer forensics: a needs analysis survey,” Computers &
Security, vol. 23, no. 1, pp. 12–16, Feb. 2004.
[6] Krishnun Sansurooah, “Taxonomy of computer forensics methodologies and procedures for digital evidence seizure”,
Australian Digital Forensics Conference,2006

More Related Content

PPTX
Digital Forensics
PPTX
Digital forensics
PPT
Lecture2 Introduction to Digital Forensics.ppt
PPTX
Computer forensics toolkit
PDF
Network Forensic
PPTX
L6 Digital Forensic Investigation Tools.pptx
PPTX
Digital forensics
Digital Forensics
Digital forensics
Lecture2 Introduction to Digital Forensics.ppt
Computer forensics toolkit
Network Forensic
L6 Digital Forensic Investigation Tools.pptx
Digital forensics

What's hot (20)

PPTX
Digital Forensic ppt
PPTX
Mobile Forensics
PPTX
Digital forensic tools
PPTX
Computer forensic ppt
PPTX
Mobile Forensics
PPTX
mobile forensic.pptx
PPT
Introduction to computer forensic
PPT
computer forensics
PPTX
Digital forensics
PDF
Cyber Forensics Module 1
PPTX
Digital investigation
PPTX
Digital Evidence by Raghu Khimani
PPTX
Digital forensics
PPTX
First Responder Officer in Cyber Crime
PPTX
Network Forensics
PPTX
computer forensics
PDF
Digital forensic principles and procedure
PPTX
Computer forensics
PPT
Collecting and preserving digital evidence
PPT
Digital Forensic
Digital Forensic ppt
Mobile Forensics
Digital forensic tools
Computer forensic ppt
Mobile Forensics
mobile forensic.pptx
Introduction to computer forensic
computer forensics
Digital forensics
Cyber Forensics Module 1
Digital investigation
Digital Evidence by Raghu Khimani
Digital forensics
First Responder Officer in Cyber Crime
Network Forensics
computer forensics
Digital forensic principles and procedure
Computer forensics
Collecting and preserving digital evidence
Digital Forensic
Ad

Viewers also liked (20)

PDF
Forensics of a Windows System
PDF
Digital forensic upload
PPT
Anti-Forensics: Real world identification, analysis and prevention
PDF
NTFS file system
PPTX
Social Media Forensics for Investigators
PPT
Translating Geek To Attorneys It Security
PPTX
Computer forensic 101 - OWASP Khartoum
PPT
F Database
PDF
Windows 7 forensics event logs-dtl-r3
PPTX
Windows Forensics
PDF
Windows logging cheat sheet
PDF
Windows 8.x Forensics 1.0
PPT
Vista Forensics
PPT
Unit B Windows 7
ODP
Introduction to memory forensics
PPTX
Open Source Forensics
PDF
Forensic Anaysis on Twitter
PPT
Edrm
PDF
2010 2013 sandro suffert memory forensics introdutory work shop - public
PPTX
Web and Social Media Image Forensics for News Professionals
Forensics of a Windows System
Digital forensic upload
Anti-Forensics: Real world identification, analysis and prevention
NTFS file system
Social Media Forensics for Investigators
Translating Geek To Attorneys It Security
Computer forensic 101 - OWASP Khartoum
F Database
Windows 7 forensics event logs-dtl-r3
Windows Forensics
Windows logging cheat sheet
Windows 8.x Forensics 1.0
Vista Forensics
Unit B Windows 7
Introduction to memory forensics
Open Source Forensics
Forensic Anaysis on Twitter
Edrm
2010 2013 sandro suffert memory forensics introdutory work shop - public
Web and Social Media Image Forensics for News Professionals
Ad

Similar to Digital Forensic: Brief Intro & Research Challenge (20)

PDF
Survey & Review of Digital Forensic
PPTX
Digital forensics research: The next 10 years
PDF
Introduction to Forensic Research Digital Forensics
DOCX
What is Digital Forensics.docx
PPT
Digital Forensics: The next 10 years
PPT
Computer_forensics_ppt.ppt
PPT
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
PPTX
Digital Forensics presentation describing its types
PDF
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
PPTX
Draft current state of digital forensic and data science
DOCX
Digital forensics Steps
PPT
sakshi Computer_forensics_ppt.ppt
PDF
Digital forensic
PPTX
Digital forensics ahmed emam
PPTX
Unit 4 -Digital Forensic Chapter for MSBTE engineering students
PDF
Review on effectiveness of deep learning approach in digital forensics
PDF
Digital forensic science and its scope manesh t
PPTX
3170725_Unit-1.pptx
PPTX
3170725_Unit-1.pptx
PDF
digital forensics-9 of cyber security.pdf
Survey & Review of Digital Forensic
Digital forensics research: The next 10 years
Introduction to Forensic Research Digital Forensics
What is Digital Forensics.docx
Digital Forensics: The next 10 years
Computer_forensics_ppt.ppt
Computer forensics intro(Pendahuluan Komputer Forensik).ppt
Digital Forensics presentation describing its types
FORENSIC COMPUTING MODELS: TECHNICAL OVERVIEW
Draft current state of digital forensic and data science
Digital forensics Steps
sakshi Computer_forensics_ppt.ppt
Digital forensic
Digital forensics ahmed emam
Unit 4 -Digital Forensic Chapter for MSBTE engineering students
Review on effectiveness of deep learning approach in digital forensics
Digital forensic science and its scope manesh t
3170725_Unit-1.pptx
3170725_Unit-1.pptx
digital forensics-9 of cyber security.pdf

More from Aung Thu Rha Hein (18)

PPTX
Writing with ease
PDF
Bioinformatics for Computer Scientists
PPTX
Analysis of hybrid image with FFT (Fast Fourier Transform)
PPTX
Introduction to Common Weakness Enumeration (CWE)
PDF
Private Browsing: A Window of Forensic Opportunity
PDF
Network switching
PPTX
Partitioned Based Regression Verification
PDF
CRAXweb: Automatic Exploit Generation for Web Applications
PPTX
Botnets 101
PPTX
Session initiation protocol
PPTX
TPC-H in MongoDB
PPTX
Web application security: Threats & Countermeasures
PPTX
Cloud computing security
PPTX
Can the elephants handle the no sql onslaught
PPTX
Fuzzy logic based students’ learning assessment
PPTX
Link state routing protocol
PPTX
Chat bot analysis
PDF
Data mining & column stores
Writing with ease
Bioinformatics for Computer Scientists
Analysis of hybrid image with FFT (Fast Fourier Transform)
Introduction to Common Weakness Enumeration (CWE)
Private Browsing: A Window of Forensic Opportunity
Network switching
Partitioned Based Regression Verification
CRAXweb: Automatic Exploit Generation for Web Applications
Botnets 101
Session initiation protocol
TPC-H in MongoDB
Web application security: Threats & Countermeasures
Cloud computing security
Can the elephants handle the no sql onslaught
Fuzzy logic based students’ learning assessment
Link state routing protocol
Chat bot analysis
Data mining & column stores

Recently uploaded (20)

PPT
Geologic Time for studying geology for geologist
PDF
A comparative study of natural language inference in Swahili using monolingua...
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PPTX
O2C Customer Invoices to Receipt V15A.pptx
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Zenith AI: Advanced Artificial Intelligence
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
STKI Israel Market Study 2025 version august
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
DP Operators-handbook-extract for the Mautical Institute
PDF
Hindi spoken digit analysis for native and non-native speakers
PPTX
Final SEM Unit 1 for mit wpu at pune .pptx
PPT
What is a Computer? Input Devices /output devices
PDF
Hybrid model detection and classification of lung cancer
PDF
Unlock new opportunities with location data.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A novel scalable deep ensemble learning framework for big data classification...
Geologic Time for studying geology for geologist
A comparative study of natural language inference in Swahili using monolingua...
sustainability-14-14877-v2.pddhzftheheeeee
O2C Customer Invoices to Receipt V15A.pptx
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
observCloud-Native Containerability and monitoring.pptx
Hybrid horned lizard optimization algorithm-aquila optimizer for DC motor
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Zenith AI: Advanced Artificial Intelligence
WOOl fibre morphology and structure.pdf for textiles
STKI Israel Market Study 2025 version august
Group 1 Presentation -Planning and Decision Making .pptx
DP Operators-handbook-extract for the Mautical Institute
Hindi spoken digit analysis for native and non-native speakers
Final SEM Unit 1 for mit wpu at pune .pptx
What is a Computer? Input Devices /output devices
Hybrid model detection and classification of lung cancer
Unlock new opportunities with location data.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
A novel scalable deep ensemble learning framework for big data classification...

Digital Forensic: Brief Intro & Research Challenge

  • 1. Digital Forensic: Brief Intro & Research challenge Aung Thu Rha Hein (g5536871) 4th February 2014
  • 2. Content ● ● ● ● ● ● ● ● ● What is Digital Forensic Examples Of DF Cases Digital Forensic Branches Use of Digital Forensic Methodology Tools Research Challenge Future Challenge Discussion & Conclusion
  • 3. Digital Forensic ● preservation, identification, extraction,interpretation & documentation of computer evidence which can be used in the court of law. ● Goal: To explain the current state of digital artifact
  • 4. Examples Of DF Cases August 6, 2009 DDoS attacks To Social Sites
  • 5. Examples Of DF Cases/2 ● BTK Killer ○ serial killer arrested by investigating letters sent via floppy disk ● David Riley ○ Air Force Major sent images of child pornography over internet
  • 6. Digital Forensic Branches ➔ ➔ ➔ ➔ ➔ Disk Forensic ◆ Flash, HDD, USB Device Network Forensic ◆ monitoring and analyzing network traffic Memory Forensic ◆ analysis of system dump Mobile Forensic ◆ acquire deleted or undeleted data Cloud Forensic ◆ forensic network analysis on Cloud computing architecture
  • 7. Use of Digital Forensic ➔ Criminal Investigations ◆ Child Pornography,identify thief, e-Crimes ➔ Civil Litigation ◆ eDiscovery ➔ Intelligence ◆ Terrorist attacks
  • 9. Methodology/2 ● ● ● 3 standard methodologies & the detailed process varies ○ Basic Forensic Methodology ○ Cyber Tool Online Search For Evidence (CTOSE) ○ Data Recovery UK (DRUK) the recommended methodology6 combines the practice from 3 standards there are more than dozen DF frameworks [6] Krishnun Sansurooah,Taxonomy of computer forensics methodologies and procedures for digital evidence seizure, 2006.
  • 11. Digital Forensic Tools Tools Use Forensic Toolkit AccessData Group, LLC Multipurpose tool (acquisition,verification, searching, reporting, wiping, etc.) SMART & SMART for Linux ASR Data, Data Acquisition and Analysis, LLC Multipurpose tool (acquisition,verification, searching, reporting, wiping, etc.) Softblock, Macquisition, Blacklight BlackBag Multiple Macintosh forensic Technologies, Inc. tools Raptor Forward Discovery, Inc. Linux-based acquisition and preview tool
  • 12. Research Challenges ● ● DF research is trending from 1997-2007 After 2007, Digital forensic meets with many challenges Characteristics comparison Era OS File Format Computing Architecture Storage Architecture Tools 1997-2007 Windows Dominance few file formats PC, Centralized standard cable interfaces commercial tools are working 2007- recent increasing OSs Various file formats Client/Server,Cloud Flash, Cloud Storage can’t catch up with req Other introduced issues: Storage Size, pervasive encryption, legal challenges
  • 13. Research Challenges/2 ● ● ● ● ● Evidence-oriented design influences today’s DF research ○ find evidence instead of assisting investigation ○ not think of cyber-crime, i.e tools are not for hacking cases ○ not possible to perform short-time analysis ○ not capable of generating data from residual file Visibility,Filter,Report Model ○ data recover before making analysis ○ not possible to do parallel processing no standard for reverse engineering ‘application instead of tools’ concept by vendors lost academic research 2010,Digital forensics research: The next 10 years
  • 14. Research Challenges/3 ● ● ● ● ● 2013 survey takes part in 4 categories: ○ Demographics, Forensic Capabilities, Future Challenge, Legislative Concerns more than 50%of participants: 3 years of DF experience Current DF tools & Capabilities: ○ Importance: more than 98% ranks as 4 out of 5 ○ Key Limitations: Data Volume, TIme, Tool Capability ○ Tool Capability: not clear result Technology that least concerns: malware, steganography 2013, Challenges to Digital Forensic
  • 15. Future Challenge ● Challenge: Investigation & Analysis Time ● Mobile and Network Forensic will be trending ● anticipated future challenge: Cloud Computing, Anti-forensic, Encryption, Social Networking ● Should adopt standards for case data, data abstractions and composable models ● more data abstractions should create ● should standardise development diversity ● alternative analysis model: parallel processing, stochastic analysis ... ● doesn’t work in small-scale dataset ● standardized test data
  • 16. Discussion & Conclusion ● ● ● ● The importance of DF DF has been in “Golden Age” and it is over encounters many research challenges needs a clear research plan/agenda Thank you... Questions?
  • 17. References [1] J. Sammons, Ed., “The Basics of Digital Forensics”. Boston: Syngress, 2012. [2] S. L. Garfinkel, “Digital forensics research: The next 10 years,” Digital Investigation, vol. 7, Supplement, pp. S64–S73, Aug. 2010. [3] M. Al Fahdi, N. L. Clarke, and S. M. Furnell, “Challenges to digital forensics: A survey of researchers amp; practitioners attitudes and opinions,” in Information Security for South Africa, 2013, 2013, pp. 1–8. [4] E. S. Pilli, R. C. Joshi, and R. Niyogi, “Network forensic frameworks: Survey and research challenges,” Digital Investigation, vol. 7, no. 1–2, pp. 14–27, Oct. 2010. [5] Marcus K Rogers and Kate Seigfried, “The future of computer forensics: a needs analysis survey,” Computers & Security, vol. 23, no. 1, pp. 12–16, Feb. 2004. [6] Krishnun Sansurooah, “Taxonomy of computer forensics methodologies and procedures for digital evidence seizure”, Australian Digital Forensics Conference,2006