RAM data significance in Digital Forensics

被引:0
|
作者
Hausknecht, K. [1 ]
Foit, D. [1 ]
Buric, J. [1 ]
机构
[1] INsig2 Dooo, Zagreb, Croatia
关键词
RAM; Live data forensics; Imaging; Volatility; Batch scripts; Windows processes; Network connections; Passwords; Windows registry; Extraction; Malware;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In present modern times when operating systems require larger amounts of RAM or Random Access Memory, we usually come across computers with 4 GB RAM, but given the price drops, it is quite usual to come across computers with 64 GB of RAM as well. By imaging this part of computer memory and by performing forensics analysis of the data located in RAM, it can be easily concluded that performing RAM imagining and analysis should be one of the essential steps in any forensic investigation. This paper will give a short introduction to digital forensics and the role of live data forensics. Furthermore, the mail goal will be to show and explain the importance of forensics of live machines and artefacts which can be found as well as methods and tools which are used for extracting and analyzing data from RAM. In addition, it will be shown that sometimes in forensic investigations, data contained in RAM can contain enough evidence to solve the whole case and actually be everything a digital forensics investigator really need.
引用
收藏
页码:1372 / 1375
页数:4
相关论文
共 50 条
  • [1] Big Data and Digital Forensics Rethinking Digital Forensics
    Adedayo, Oluwasola Mary
    2016 IEEE INTERNATIONAL CONFERENCE ON CYBERCRIME AND COMPUTER FORENSIC (ICCCF), 2016,
  • [2] Hashing and data Fingerprinting in digital Forensics
    Roussev, Vassil
    IEEE SECURITY & PRIVACY, 2009, 7 (02) : 49 - 55
  • [3] The truth is in there: Sleuthing for data with digital forensics
    Miller, Ron
    ECONTENT, 2007, 30 (02) : 38 - 43
  • [4] Digital, big data and computational forensics
    Geradts, Zeno
    FORENSIC SCIENCES RESEARCH, 2018, 3 (03) : 179 - 182
  • [5] Big Data Management in Digital Forensics
    Qi, Man
    Liu, Yang
    Lu, Lin
    Liu, Junyong
    Li, Maozhen
    2014 IEEE 17TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL SCIENCE AND ENGINEERING (CSE), 2014, : 238 - 243
  • [7] A data mining framework for digital forensics investigations
    Kahvedzic, Damir
    Kuncik, Noemi
    Kechadi, Tahar
    WMSCI 2007: 11TH WORLD MULTI-CONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL III, PROCEEDINGS, 2007, : 158 - 163
  • [8] DATA CORPORA FOR DIGITAL FORENSICS EDUCATION AND RESEARCH
    Yannikos, York
    Graner, Lukas
    Steinebach, Martin
    Winter, Christian
    ADVANCES IN DIGITAL FORENSICS X, 2014, 433 : 309 - 325
  • [9] Hiding data, forensics, and anti-forensics - Delving into the digital warrens for concealing data.
    Berghel, Hal
    COMMUNICATIONS OF THE ACM, 2007, 50 (04) : 15 - 20
  • [10] Digital Forensics Challenges to Big Data in the Cloud
    Feng, Xiahua
    Zhao, Yuping
    2017 IEEE INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA), 2017, : 858 - 862