Muutke küpsiste eelistusi

Advances in Digital Forensics III: IFIP International Conference on Digital Forensics , National Center for Forensic Science, Orlando Florida, January 28-January 31, 2007 2007 ed. [Kõva köide]

Edited by , Edited by
Teised raamatud teemal:
  • Kõva köide
  • Hind: 95,02 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Tavahind: 111,79 €
  • Säästad 15%
  • Raamatu kohalejõudmiseks kirjastusest kulub orienteeruvalt 2-4 nädalat
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
Teised raamatud teemal:
In 2006, the Federal Bureau of Investigation (FBI) processed more than two petabytes of digital evidence; in 2007, the volume of digital evidence processed will exceed four petabytes. Electronic devices are becoming smaller and more diverse; memory capacities are increasing according to Moore's Law; distributed networks are growing massively in size and scale. As society embraces new technologies and applications with gusto, digital information will become even more pervasive. Digital investigations already involve searching for the proverbial nee­ dle in the haystack. In five years, possibly sooner, investigators will have to find the one needle in unimaginably large stacks of needles. How will the FBI approach digital investigations of the future? How will state and local law enforcement agents cope? Digital forensics - the scientific discipline focused on the acquisition, preservation, examination, analysis and presentation of digital evidence - will have to provide solutions. The digital forensics research com­ munity must initiate serious eff'orts to develop the next generation of algorithms, procedures and tools that will be desperately needed. This book. Advances in Digital Forensics III^ is the third volume in the annual series produced by the IFIP Working Group 11.9 on Dig­ ital Forensics, an international community of scientists, engineers and practitioners dedicated to advancing the state of the art of research and practice in the emerging discipHne of digital forensics. The book presents original research results and innovative applications in digital forensics.
Contributing Authors ix
Preface xix
PART I LEGAL ISSUES
1 Calibration Testing of Network Tap Devices
3
Barbara Endicott-Popovsky, Brian Chee and Deborah Frincke
2 On the Legality of Analyzing Telephone Call Records
21
C. Swenson, C. Adams, A. Whitledge and S. Shenoi
3 Survey of Law Enforcement Perceptions Regarding Digital Evidence
41
M. Rogers, K. Scarborough, K. Frakes and C. San Martin
PART II INSIDER THREAT DETECTION
4 Insider Threat Analysis Using Information-Centric Modeling
55
D. Ha, S. Upadhyaya, H. Ngo, S. Pramanik, R. Chinchani and S. Mathew
5 An Integrated System for Insider Threat Detection
75
Daniel Ray and Phillip Bradford
PART III ROOTKIT DETECTION
6 Analysis of Tools for Detecting Rootkits and Hidden Processes
89
A. Todd, J. Benson, G. Peterson, T. Franz, M. Stevens and R. Raines
7 A Method for Detecting Linux Kernel Module Rootkits
107
Doug Wampler and James Graham
PART IV AUTHORSHIP ATTRIBUTION
8 Future Trends in Authorship Attribution
119
Patrick Juola
9 The Keyboard Dilemma and Authorship Identification
133
Carole Chaski
PART V FORENSIC TECHNIQUES
10 Factors Affecting One-Way Hashing of CD-R Media
149
Christopher Marberry and Philip Craiger
11 Disk Drive I/O Commands and Write Blocking
163
James Lyle, Steven Mead and Kelsey Rider
12 A New Process Model for Text String Searching
179
Nicole Beebe and Glenn Dietrich
13 Detecting Steganography Using Multi-Class Classification
193
Benjamin Rodriguez and Gilbert Peterson
14 Redacting Digital Information from Electronic Devices
205
A. Barclay, L. Watson, D. Greer, J. Hale and G. Manes
PART VI FILE SYSTEM FORENSICS
15 In-Place File Carving
217
Golden Richard III, Vassil Roussev and Lodovico Marziale
16 File System Journal Forensics
231
Christopher Swenson, Raquel Phillips and Sujeet Shenoi
PART VII NETWORK FORENSICS
17 Using Search Engines to Acquire Network Forensic Evidence
247
Robert McGrew and Rayford Vaughn
18 A Framework for Investigating Railroad Accidents
255
Mark Hartong, Rajni Goel and Duminda Wijeskera
PART VIII PORTABLE ELECTRONIC DEVICE FORENSICS
19 Forensic Analysis of Xbox Consoles
269
Paul Burke and Philip Craiger
20 Super-Resolution Video Analysis for Forensic Investigations
281
Ashish Gehani and John Reif
PART IX EVIDENCE ANALYSIS AND MANAGEMENT
21 Specializing CRISP-DM for Evidence Mining
303
Jacobus Venter, Alta de Waal and Cornelius Willers
22 Applying the Biba Integrity Model to Evidence Management
317
Kweku Arthur, Martin Olivier and Hein Venter
PART X FORMAL METHODS
23 Investigating Computer Attacks Using Attack Trees
331
Nayot Poolsapassit and Indrajit Ray
24 Attack Patterns: A New Forensic and Design Tool
345
Eduardo Fernandez, Juan Pelaez and Maria Larrondo-Petrie