Skip to main content

A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space

  • Conference paper
Forensics in Telecommunications, Information, and Multimedia (e-Forensics 2010)

Abstract

Computer forensics has become a vital tool in providing evidence in investigations of computer misuse, attacks against computer systems and more traditional crimes like money laundering and fraud where digital devices are involved. Investigators frequently perform preliminary analysis at the crime scene on these suspect devices to determine the existence of target files like child pornography. Hence, it is crucial to design a tool which is portable and which can perform efficient preliminary analysis. In this paper, we adopt the space efficient data structure of fingerprint hash table for storing the massive forensic data from law enforcement databases in a flash drive and utilize hash trees for fast searches. Then, we apply group testing to identify the fragmentation points of fragmented files and the starting cluster of the next fragment based on statistics on the gap between the fragments.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. An introduction to Computer Forensics, http://www.dns.co.uk

  2. Computer Online Forensic Evidence Extractor (COFEE), http://www.microsoft.com/industry/government/solutions/cofee/default.aspx

  3. Garfinkel, S.L.: Carving contiguous and fragmented files with fast object validation. Digital Investigation 4, 2–12 (2007)

    Article  Google Scholar 

  4. Antognini, C.: Bloom Filters, http://antognini.ch/papers/BloomFilters20080620.pdf

  5. Fan, L., Cao, P., Almeida, J., Broder, A.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. In: ACM SIGCOMM 1998, Vancouver, Canada (1998)

    Google Scholar 

  6. Squid Web Cache, http://www.squid-cache.org/

  7. Broder, A., Mitzenmacher, M.: Network Applications of Bloom Filters: A Survey, http://www.eecs.harvard.edu/~michaelm/NEWWORK/postscripts/BloomFilterSurvey.pdf

  8. Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms. The MIT Press, Cambridge (2001)

    MATH  Google Scholar 

  9. Hua, N., Zhao, H., Lin, B., Xu, J.: Rank-Indexed Hashing: A Compact Construction of Bloom Filters and Variants. In: IEEE Conference on Network Protocols (ICNP), pp. 73–82 (2008)

    Google Scholar 

  10. Carrier, B.: File System Forensic Analysis. Addison Wesley Professional, Reading (2005)

    Google Scholar 

  11. Hong, Y.-W., Scaglione, A.: Generalized group testing for retrieving distributed information. In: IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP), Philadelphia, PA (2005)

    Google Scholar 

  12. Chapweske, J., Mohr, G.: Tree Hash EXchange format (THEX), http://zgp.org/pipermail/p2p-hackers/2002-June/000621.html

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering

About this paper

Cite this paper

Lei, Z., Dule, T., Lin, X. (2011). A Novel Forensics Analysis Method for Evidence Extraction from Unallocated Space. In: Lai, X., Gu, D., Jin, B., Wang, Y., Li, H. (eds) Forensics in Telecommunications, Information, and Multimedia. e-Forensics 2010. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 56. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23602-0_5

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23602-0_5

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23601-3

  • Online ISBN: 978-3-642-23602-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics