Skip to main content
Log in

An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments

  • Published:
Wireless Personal Communications Aims and scope Submit manuscript

Abstract

Innumerable firms are extensively integrating state-of-the-art ICT to boost the competitiveness of the organizations in all aspects. Simultaneously, the unprecedented availability of UC networks and mobile devices are exponentially growing. Unfortunately, based on the current voluminous computer crime incidents, the ICT deployments under UC infrastructures might jeopardize the organizations if they ignore the imminent necessity of DF in their homogeneous/heterogeneous ISs. Most enterprises are dearth of vigilance concerning the above issues although they might be aware that the salient and stringent computer crimes are capable of devastating the company’s intangible assets silently. Vandalism of intellectual property or conducting industrial espionage for the valuable assets via trustworthy UC networks becomes an approaching menace. Hence, the DF plays an essential role in the information security arena. Demonstrably, there is no one DF suite can encompass all aspects or purposes due to the dynamic diversities of computer crimes in their natures. Interchangeably utilizing various DF tools is a decent approach to find the causes for the associate computer crimes and prevents the related information security incidents from occurring. At last, a DF scenario review utilizing the proposed ontology-driven model with respect to the UC environment was conducted and demonstrated.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Andrew, M. W. (2007). Defining a process model for forensic analysis of digital evidence devices and storage media. In Proceedings of the 2nd international workshop on systematic approaches to digital forensic engineering (SADFE 2007). IEEE.

  2. Anson S., Bunting S. (2007) Windows network forensics and investigation. Wiley Publishing, New York

    Google Scholar 

  3. Battistoni, R., Biagio, A. D., Pietro, R. D., Formica M., & Mancini L. V. (2008). A live digital forensic system for windows networks (Vol. 278, pp. 653–667). International Federation for Information Processing (IFIP). Boston: Springer.

  4. Brinson A., Robinson A., Rogers M. (2006) A cyber forensic ontology: Creating a new approach to studying cyber forensics. Digital Investigation 3: 37–43

    Article  Google Scholar 

  5. Burmester, M., & Mulholland, J. (2006). The advent of trusted computing: Implications for digital forensics (pp. 283–287). In Proceedings of the 2006 ACM symposium on applied computing, April 23–27, Dijon, France.

  6. Casey E. (2006) Investigating sophisticated security breaches. Communication of the ACM 49(2): 48–54

    Article  Google Scholar 

  7. Cassidy, R. F., Chavez, A., Trent J., & Urrea, J. (2008). Remote forensic analysis of process control systems (Vol. 253, pp. 223–235). International federation for information processing (IFIP), Critical Infrastructure Protection. Boston: Springer.

  8. Chaikin D. (2006) Network investigations of cyber attacks: The limit of digital evidence. Crime Law Social Change 46: 239–256

    Article  Google Scholar 

  9. Chen H. et al (2004) Crime data mining: A general framework and some examples. IEEE Computer 37(4): 50–56

    Google Scholar 

  10. Craiger P. (2007) Training and education in digital evidence, handbook of digital and multimedia forensic evidence. Human Press Inc, Totowa, NJ, pp 11–22

    Google Scholar 

  11. Ley D. (2007) Ubiquitous computing. Emerging technologies for learning. Becta 2: 64–79

    Google Scholar 

  12. Lyle J. R. (2006) A strategy for testing hardware write block devices. Digital Investigation 3: 3–9

    Article  Google Scholar 

  13. Nelson, B., Phillips, A., Enfinger, F., & Steuart, C. (2008). Guide to computer forensics and investigations (3rd ed., pp. 223–235). Course Technology.

  14. Nena L. (2006) Crime investigation: A course in computer forensics. Communications of AIS 18: 2–34

    Google Scholar 

  15. Oh, S. M., Kim, Y. M., Jang, J. H., Koh, B. S. & Choi, Y. R. (2007). A study of volatile information collection of computer forensics system for computer emergency based on ubiquitous computing. In 3rd International Conference on Natural Computation (ICNC 2007). IEEE.

  16. Pollitt, M. (2007). An ad hoc review of digital forensic models. In Proceedings of the 2nd international workshop on Systematic Approaches to Digital Forensic Engineering (SADFE 2007). IEEE.

  17. Richard G. G. III, Roussev V. (2006) Next-generation digital forensics. Communication of the ACM 49(2): 76–80

    Article  Google Scholar 

  18. http://www.encase.com.

  19. http://www.techpathways.com.

  20. http://www.accessdata.com.

  21. http://www.finaldata.com.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Hai-Cheng Chu.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Chu, HC., Deng, DJ. & Chao, HC. An Ontology-driven Model for Digital Forensics Investigations of Computer Incidents under the Ubiquitous Computing Environments. Wireless Pers Commun 56, 5–19 (2011). https://doi.org/10.1007/s11277-009-9886-x

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11277-009-9886-x

Keywords

Navigation