Advances in Digital Forensics III: IFIP International Conference on Digital Forensics , National Center for Forensic Science, Orlando Florida, January 28-January 31, 2007Philip Craiger, Sujeet Shenoi Springer, 2007 M11 14 - 357 páginas In 2006, the Federal Bureau of Investigation (FBI) processed more than two petabytes of digital evidence; in 2007, the volume of digital evidence processed will exceed four petabytes. Electronic devices are becoming smaller and more diverse; memory capacities are increasing according to Moore's Law; distributed networks are growing massively in size and scale. As society embraces new technologies and applications with gusto, digital information will become even more pervasive. Digital investigations already involve searching for the proverbial nee dle in the haystack. In five years, possibly sooner, investigators will have to find the one needle in unimaginably large stacks of needles. How will the FBI approach digital investigations of the future? How will state and local law enforcement agents cope? Digital forensics - the scientific discipline focused on the acquisition, preservation, examination, analysis and presentation of digital evidence - will have to provide solutions. The digital forensics research com munity must initiate serious eff'orts to develop the next generation of algorithms, procedures and tools that will be desperately needed. This book. Advances in Digital Forensics III^ is the third volume in the annual series produced by the IFIP Working Group 11.9 on Dig ital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging discipHne of digital forensics. The book presents original research results and innovative applications in digital forensics. |
Contenido
Survey of Law Enforcement Perceptions Regarding Digital Evidence 41 | 40 |
4 | 55 |
An Integrated System for Insider Threat Detection 75 | 74 |
6 | 89 |
9 | 122 |
10 | 148 |
Disk Drive IO Commands and Write Blocking | 163 |
A New Process Model for Text String Searching 179 | 178 |
15 | 216 |
File System Journal Forensics | 231 |
Using Search Engines to Acquire Network Forensic Evidence | 247 |
19 | 267 |
21 | 301 |
Applying the Biba Integrity Model to Evidence Management | 317 |
24 | 332 |
Detecting Steganography Using MultiClass Classification | 193 |
Otras ediciones - Ver todas
Advances in Digital Forensics III: IFIP International Conference on Digital ... Philip Craiger,Sujeet Shenoi Sin vista previa disponible - 2010 |
Términos y frases comunes
Advances in Digital algorithms analyzing applications attack tree authorship attribution authorship identification block CDRs cell site classification commands Computer Science configuration Court Craiger CRISP-DM data mining database digital evidence digital forensics disk documents electronic embedding EnCase ext3 Figure file carving file system forensic tools function hard drive hash values hidden host IceSword ICMAP identify in-place carving interface involving journal kernel law enforcement agency linguistic Linux logical graph machine metadata methods multi-class network forensic node obtain operating system packets patterns pen register ports privileged Proceedings query RDTs redaction ReiserFS reported research interests include rootkit detection rootkits Sectors server Shenoi specific steganography stylometry support vector machine system call table target techniques Technology text string search tion token trace device trap and trace U.S. Supreme Court VoIP vulnerabilities Windows write blockers X-Ways Xbox