Preview

What Is Volatile Memory Investigation

Good Essays
Open Document
Open Document
646 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What Is Volatile Memory Investigation
The success of the digital investigation is dependent on the availability and maintaining the quality of the data being collected. Because the digital evidence that is collected must be presented in its original form to the court for the proof against the crime. In this project one of the methods of digital forensic investigation is discussed which is memory imaging analysis. The analysis of volatile memory image is chosen over the Live Response approach of investigation. The advantage of the investigation method used in this project offers the efficient and easy use of forensics tools that are based command line approach,by introducing them under common GUI framework. The GUI based tool runs commands at the back end which offers the automation …show more content…
Today solving any cyber crime put up new challenges for a digital forensics investigator.[5] Digital forensics is the process of uncovering and interpreting an electronic data. The goal of investigation is to preserve the evidence that is obtained during an investigation process. This evidence is termed as a digital evidence which must be preserved to reconstruct the past events. The analysis of volatile memory plays a very significant role in a process of digital investigation process. The volatile memory contains many important artifacts which can be used in forensic investigation process. The information may …show more content…
Volatile memory analysis using a Live Response method helps to collect all relevant evidences from a system. These evidences can be used to prove any incident occurred that might have compromised a system resulting into a cyber crime.[2] Another method to analyze a volatile memory is to perform memory image analysis. The analysis of a volatile memory is performed by capturing an image of RAM known as memory dump.Digital Forensics investigator make use of forensics tools in an investigation process, which are present in commercial and open domains. Depending upon the requirement of analysis, forensic toolkits are categorized like file system and data analysis tools, memory analysis tools, disk analysis tools, registry analysis tools, Internet analysis tools and many more analysis tools. The commonly used toolkits for analyzing file systems are Encase,FTK,X-Ways,Nuix,Sleuthkit,DFF,Snorkeland LibForensics. Of these tools,Encase, FTK and X-Ways are commercial toolkits while Sleuthkit, DFF and LibForensics are in open domain. To extract the malicious processes out of the genuine processes from memory image, the file signature scanner tool known as YARA tool can be used. The YARA is an open source tool designed to help malware researcher to identify and classify malware samples. It uses the efficient pattern-matching rules.YARA supports the use of three different types of strings

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Discontent is building against executive bonuses of more than 1 billion euros ($1.33 billion) at Anheuser-Busch InBev triggered when the brewer cut its huge debt two years ahead of target. This 2008 exceptional option grant was set to vest if the group's net debt to core EBITDA profit ratio fell below 2.5 times before the end of 2013. The actual debt ratio fell to 2.26 times by the end of 2011 which is 2 years early. This bonus issue annoyed the group managers and office staff who are seeking for work security guarantees according to union officials while Brito, the CEO of AB-InBev appeared to have security up to 2019 when his options fully vest. This annoyed both the white collars and blue collars…

    • 486 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    272. Newman, R. (2007). Computer Forensics: Evidence Collection and Managment. Boca Raton FL: Taylor & Francis Group. LLC.…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Satisfactory Essays

    Iscs 451 Assignment 6

    • 576 Words
    • 3 Pages

    A checklist should be created off of the operating procedures and brought to each crime scene by the investigator. Every electronic device should be photographed before touching anything. The checklist should be followed step by step and every item needs to be put into an evidence bag and tagged. Then a chain of custody document needs to be created for every piece of evidence. No analysis should be done on the original copy of any device. All analysis should be done on system image copies of each…

    • 576 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Forensics2E Lab02 AW

    • 256 Words
    • 2 Pages

    In this lab, you acted as a forensic specialist assisting the lead forensics investigator at the Cyber…

    • 256 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Cis 417 Assignment 1

    • 755 Words
    • 4 Pages

    There are many challenges for a computer forensics specialist and everyone faces the same challenges. There first challenge is to find a way to examine an increasing number of digital devices, each containing an immense volume of data, in a timely manner with limited resources (Charles L Cohen, n.d.). Another challenge is the fact that offenders are finding easier ways to store data. They…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Many times, computer forensics practitioners work with traditional forensics experts in criminal investigations to reveal evidence. With frequent work experiences with forensics experts and lawyers, having a general knowledge of relevant laws and ethics is a nice complement to any computer forensics practitioner’s skill set. Furthermore, as many audits are conducted on businesses and illegal organizations are done electronically, computer forensics experts may want to have working knowledge in accounting and/or finance in order to prepare for such jobs.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 5 Assignment

    • 349 Words
    • 1 Page

    A computer forensic investigation has three phases. List what they are and describe the activities that happen in each phase. The three phases of computer forensic investigations are; acquire the evidence, authenticate the evidence, and analyze the evidence. In acquiring the evidence the data is collected. Authenticating the evidence a chain of custody is used for the evidence to ensure its trustworthiness. Finally in analyzing the evidence the data is viewed and if need be a copy of the evidence can be created.…

    • 349 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 1

    • 414 Words
    • 2 Pages

    4. Why would you use a tool like DevManView while performing a computer forensic investigation?…

    • 414 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Sometimes there can be a sudden requirement to perform hard drive forensic examination. The goals of your forensic examination can be related to virtually any subject, since any type of case/action can take place. Sometimes many instances you may not always perform a full-scale investigation or “fishing expedition” when reviewing the contents of media; in other words, your forensic examination of media may include criteria that focuses and narrows your examination.…

    • 140 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    EnCase Forensic v7.05.02 claims to be a wide, industry-colors information processing system research resolution - and it does not delude. The use interface (UI) is a dexterous, simple and cheerful platform from which to employment. The suppleness and versatility of the interface is one of the effect's greatest strengths, as it creates a more precious experience for the use. The weapon's features also serve to make it an attraction wish. It contribute the capacity to analyze Linux, Unix and Mac systems, as well as major telephone and tablet operating systems, such as Android and Apple iOS and more. The evidence CPU is customizable and efficient.…

    • 1310 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    After the preservation phase, forensics are required to locate and identify any evidence that can be used to aid the crime case. There are several locations where evidence are usually found such as in the hard drive on the user’s personal computer, laptop, smart phone or tablet (ACPO, 2012). It is also critical that forensics are aware of the intention of the particular investigation. This aids in the forensics' efforts of locating digital evidences that are relevant to the case. For example, in the case of a server intrusion, forensics should look out for signs such as a rootkit installation, analyze configuration files, logs files and etc. These are possible locations and processes where traces of evidence can be picked out from (Carrier and Spafford, 2003).…

    • 257 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Identity theft has ruined the lives of many. It is crucial and necessary to educate more professionals in the computer forensic field to combat this and many other cybercrimes. The following paper will help inform about identity theft and to explain how it can be resolved through digital forensics. What is identity theft? The U.S. Department of Justice defines it as when “someone wrongfully obtains and uses another person 's personal data in some way that involves fraud or deception, typically for economic gain.” There are many ways to do this. One way is when dumpster divers spend time looking through trash in…

    • 1160 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    forensic

    • 266 Words
    • 1 Page

    Information technology knowledge and skills are necessary tools of the forensic accountant in a world filled which paperless crimes. At minimum, forensic accountants must know the point at which they should contact an expert in computer hardware or software. Examples of ways that forensic accountants use information technology skills to quarantine data, extract data through data mining, design and implement controls over data manipulation, accumulate baseline information for comparison purpose, and analyze data.…

    • 266 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Nothing

    • 4138 Words
    • 17 Pages

    The search for physical evidence at a crime scene must be done thoroughly and followed by the protocol. How the criminalist will decide to execute the crime-scene investigation depends on the size and the locale of the area, as well as on the actions of the suspect(s) and victim(s) at the scene. It must be considered that physical evidence can be anything, from a massive object to a microscopic trace, however, some evidence are clearly visible but others need to be examined in the laboratory in order to be detected. Physical evidence must be processed in a way so as to prevent any change from happening between the time that was collected on the crime scene and the time it is received by the laboratory. When collecting physical evidence from a scene, any criminalist must be aware of the fact that recovery of one type of evidence can destroy another.…

    • 4138 Words
    • 17 Pages
    Better Essays
  • Good Essays

    Digital Forensics

    • 672 Words
    • 3 Pages

    Digital forensics is a branch of forensic science involving the recovery and investigation of material found in digital devices used in crimes or by criminals. In the past 15 years it has expanded greatly with all the advances in technology but much of the new technology has not been studied yet. The research I am doing is important because if the study is successful in the future many forensic departments could use my research to solve crimes.…

    • 672 Words
    • 3 Pages
    Good Essays