Fast Fingerprinting for File-System Forensics

被引:0
|
作者
Chawathe, Sudarshan S. [1 ]
机构
[1] Univ Maine, Sch Comp & Informat Sci, Orono, ME 04469 USA
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
An important method used to speed up forensic file-system analysis is white-listing of files: Well-known files are detected using signatures (message digests) or similar methods, and omitted from further analysis initially, in order to better focus the initial analysis on files likely to be more important. Typical examples of such well-known files include files used by operating systems, popular applications, and software libraries. This paper presents methods for improving the effectiveness and efficiency of such signature-based white-listing during file-system forensics. One concern for effectiveness is the resilience of the white-listing method to an adversary who has complete knowledge of the method and who may make small, inconsequential changes to a large number of well-known files on a target file-system in order to overload the analysis and thereby practically defeat it. Another concern is the ability to detect near-matches in addition to exact matches. Efficiency refers to primarily the rate at which a target file system may be processed during analysis; preparation-time, or indexing, efficiency is a lesser concern as that computation may be performed during non-critical times. Our work builds on techniques such as locality-sensitive hashing to yield an effective filter for further analysis tools.
引用
收藏
页码:591 / 596
页数:6
相关论文
共 50 条
  • [41] Modeling file-system input traces via a two-level arrival process
    Ware, PP
    Page, TW
    Nelson, BL
    1996 WINTER SIMULATION CONFERENCE PROCEEDINGS, 1996, : 1230 - 1237
  • [42] iFetcher: User-Level Prefetching Framework With File-System Event Monitoring for Linux
    Won, Jiwoong
    Kwon, Oseok
    Ryu, Junhee
    Lee, Dongeun
    Kang, Kyungtae
    IEEE ACCESS, 2018, 6 : 46213 - 46226
  • [43] A FAST FILE SYSTEM FOR UNIX
    MCKUSICK, MK
    JOY, WN
    LEFFLER, SJ
    FABRY, RS
    ACM TRANSACTIONS ON COMPUTER SYSTEMS, 1984, 2 (03): : 181 - 197
  • [44] Rootkit Guard (RG) - An Architecture for Rootkit Resistant File-System Implementation Based on TPM
    Yew, Teh Jia
    Samsudin, Khairulmizam
    Udzir, Nur Izura
    Hashim, Shaiful Jahari
    PERTANIKA JOURNAL OF SCIENCE AND TECHNOLOGY, 2013, 21 (02): : 507 - 519
  • [45] File system anti-forensics – types, techniques and tools
    Wani M.A.
    AlZahrani A.
    Bhat W.A.
    Computer Fraud and Security, 2020, 2020 (03): : 14 - 19
  • [46] Computer Forensics Research and Implementation Based on NTFS File System
    Liu Naiqi
    Wang Zhongshan
    Hao Yujie
    QinKe
    2008 ISECS INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT, VOL 1, PROCEEDINGS, 2008, : 519 - +
  • [47] Analysis and Implementation of UFS File System Based on Computer Forensics
    Yang Lei
    Gao Qinquan
    Luo Delin
    Wu Shunxiang
    QUANTUM, NANO, MICRO AND INFORMATION TECHNOLOGIES, 2011, 39 : 186 - 191
  • [48] A comparison of machine learning techniques for file system forensics analysis
    Mohammad, Rami Mustafa A.
    Alqahtani, Mohammed
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2019, 46 : 53 - 61
  • [49] DESIGN FOR NETWORK FILE FORENSICS SYSTEM BASED ON APPROXIMATE MATCHING
    Xu, Fei
    Liu, Pinxin
    FORENSIC SCIENCE INTERNATIONAL, 2017, 277 : 120 - 120
  • [50] Column: File Cabinet Forensics
    Garfinkel, Simson
    JOURNAL OF DIGITAL FORENSICS SECURITY AND LAW, 2011, 6 (04) : 7 - 9