An Open-Source Forensics Platform

Digital forensics plays a crucial part in the investigation of crimes involving electronic equipmen t. Masses of digital evidence collected at a crime scene w ill have to be analyzed by digital forensics experts in a n attempt to discover how a digital crime was committed and by whom. This is a labour-intensive and timeconsuming process which can be improved using specially designed digital tools. This paper proposes a n open-source forensics platform that may be used as a base for other digital forensics projects. The propose d forensics platform may be used by researchers as a base to develop digital forensics research prototypes and b y industry to conduct digital investigations after it has become apparent that a digital crime has been committed. This aim of proposed platform project is enable researchers to develop forensic prototypes more rapidly and help to ensure the quality of the forens ics tools making use of the platform.

[1]  Eoghan Casey,et al.  Network traffic as a source of evidence: tool strengths, weaknesses, and future needs , 2004, Digit. Investig..

[2]  Mariëlle den Hengst,et al.  Proceedings of the 34th annual Hawaii International Conference on System Sciences , 2001 .

[3]  Marcus K. Rogers,et al.  The future of computer forensics: a needs analysis survey , 2004, Comput. Secur..

[4]  Frank Adelstein,et al.  Live forensics: diagnosing your system without killing it first , 2006, CACM.

[5]  Karl N. Levitt,et al.  Automated analysis for digital forensic science: semantic integrity checking , 2003, 19th Annual Computer Security Applications Conference, 2003. Proceedings..

[6]  K. Eckstein Forensics for advanced UNIX file systems , 2004, Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004..

[7]  Brian D. Carrier Risks of live digital forensic analysis , 2006, CACM.

[8]  Anna Carlin,et al.  Is the Open Way a Better Way? Digital Forensics Using Open Source Tools , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).

[9]  Eoghan Casey,et al.  Investigating sophisticated security breaches , 2006, CACM.

[10]  Shiuh-Jeng Wang,et al.  Measures of retaining digital evidence to prosecute computer-based cyber-crimes , 2007, Comput. Stand. Interfaces.

[11]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[12]  Michael S. Greenberg,et al.  Network Forensics Analysis , 2002, IEEE Internet Comput..

[13]  Eoghan Casey,et al.  Tool review - remote forensic preservation and examination tools , 2004, Digit. Investig..

[14]  Jill Slay,et al.  Digital forensics: exploring validation, verification & certification , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).

[15]  James L. Lyle,et al.  NIST CFTT: Testing Disk Imaging Tools , 2002, Int. J. Digit. EVid..

[16]  Fred C Kerr Media analyses based on Microsoft NTFS file ownership. , 2006, Forensic science international.

[17]  George M. Mohay Technical challenges and directions for digital forensics , 2005, First International Workshop on Systematic Approaches to Digital Forensic Engineering (SADFE'05).