SlideShare une entreprise Scribd logo
1  sur  14
Télécharger pour lire hors ligne
Summary report: Survey & Review of
Digital Forensic
Aung Thu Rha Hein (g5536871)
1st February 2014
Content
●
●
●
●
●

Papers Info
Paper objectives
Methodology
Challenges
Future Research
Papers
1. Digital forensics research: The next 10 years
-Simson L. Garfinkel
- Digital Investigation Journal,2010

2. Challenges to Digital Forensic: A Survey of Researcher & Practitioners Attitudes and
Opinions
- M. Al Fahdi, N.L. Clarke, S.M. Furnell
- Information Security for South Africa Conference,2013

3. Taxonomy of computer forensics methodologies and procedures for digital
evidence seizure
- Krishnun Sansurooah
- Australian Digital Forensics Conference,2006

4.

The future of computer forensics: a needs analysis survey
-Marcus K Rogers, Kate Seigfried, Computers & Security Journal, 2004
Papers/2
5.

An Ad Hoc Review of Digital Forensic Models
-M.M. Pollitt, Second International Workshop on Systematic Approaches to Digital Forensic
Engineering, 2007

6.

Network forensic frameworks: Survey and research challenges
-Emmanuel S. Pilli*, R.C. Joshi, Rajdeep Niyogi
- Digital Investigation Journal,2010

7.

A critical review of 7 years of Mobile Device Forensics
-Konstantia Barmpatsalou , Dimitrios Damopoulos, Georgios Kambourakis,Vasilios Katos,

- Digital InvestigationJournal,2013
Paper Objectives
1.

Digital forensics research: The next 10 years
- proposes a methodology to improve the digital forensic research
- point out today DF research challenges
- proposes a new research plan

2.

Challenges to Digital Forensic
- to understand the priority of challenges on Digital Forensic by taking a survey

3.

Taxonomy of computer forensics methodologies and procedures for
digital evidence seizure
- compare the forensic methodologies and propose a recommended methodology

4.

The future of computer forensics: a needs analysis survey
- makes a study on computer forensics to discover the challenge
Paper Objectives
5.

An Ad Hoc Review of Digital Forensic Models
- summary of 15 papers which represents about DF data models

6.

Network forensic frameworks: Survey and research challenges
-overview of network forensic field on tools & frameworks
-also point out Network Forensic research challenge

7.

A critical review of 7 years of Mobile Device Forensics
- through review of mobile device forensic by mobile platforms
Methodology
Basic Methodology
& Process

Acquire
Evidence

Authenticate
evidence

Analyze
Data
Methodology/2
●

●
●

3 methodologies & the detailed process varies
○ Basic Forensic Methodology
○ Cyber Tool Online Search For Evidence (CTOSE)
○ Data Recovery UK (DRUK)
the recommended methodology combines the practice from 3 standards
there are more than dozen DF frameworks
Challenges
●
●

DF research is trending from 1997-2007
After 2007, Digital forensic meets with many challenges

Characteristics comparison
Era

OS

File Format

Computing
Architecture

Storage
Architecture

Tools

1997-2007

Windows
Dominance

few file formats

PC, Centralized

standard cable
interfaces

commercial
tools are
working

2007- recent

increasing OSs

Various file
formats

Client/Server,

Flash, Cloud
Storage

can’t catch
up with req

Other introduced issues: Storage Size, pervasive encryption, legal challenges
Challenges/2
Descriptive Analysis Reult(N=60)

2004,The future of computer forensics: a needs analysis survey
Challenges/3
●

●

●
●
●

Evidence-oriented design influences today’s DF research
○ find evidence instead of assisting investigation
○ not think of cyber-crime, i.e tools are not for hacking cases
○ not possible to perform short-time analysis
○ not capable of generating data from residual file
Visibility,Filter,Report Model
○ data recover before making analysis
○ not possible to do parallel processing
no standard for reverse engineering
‘application instead of tools’ concept by vendors
lost academic research
2010,Digital forensics research: The next 10 years
Challenges/4
●
●
●

●
●

2013 survey takes part in 4 categories:
○ Demographics, Forensic Capabilities, Future Challenge, Legislative Concerns
more than 50%: 3 years of DF experience
Current DF tools & Capabilities:
○ Importance: more than 98% ranks as 4 out of 5
○ Key Limitations: Data Volume, TIme,Tool Capability
○ Tool Capability: not clear result
Technology that least concerns: malware, steganography

2013, Challenges to Digital Forensic
Future Research
●

Challenge: Investigation & Analysis Time

●

Mobile and Network Forensic will be trending

●

anticipated future challenge: Cloud Computing, Anti-forensic, Encryption,Social Networking

●

Should adopt standards for case data, data abstractions and composable models

●

more data abstractions should create

●

should standardise development diversity

●

alternative analysis model: parallel processing, stochastic analysis ...

●

doesn’t work in small-scale dataset

●

standardized test data

Contenu connexe

Tendances

Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draftDamir Delija
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedurenewbie2019
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensiknewbie2019
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensicsMarco Alamanni
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emamahmad abdelhafeez
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)AltheimPrivacy
 
Digital forensics
Digital forensicsDigital forensics
Digital forensicsdentpress
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Damir Delija
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Stepsgamemaker762
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic SoftwaresDhruv Seth
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating proceduresSoumen Debgupta
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Damir Delija
 

Tendances (20)

Why i hate digital forensics - draft
Why i hate digital forensics  -  draftWhy i hate digital forensics  -  draft
Why i hate digital forensics - draft
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensic tools
Digital forensic toolsDigital forensic tools
Digital forensic tools
 
Digital forensic principles and procedure
Digital forensic principles and procedureDigital forensic principles and procedure
Digital forensic principles and procedure
 
Fundamental digital forensik
Fundamental digital forensikFundamental digital forensik
Fundamental digital forensik
 
Brief introduction to digital forensics
Brief introduction to digital forensicsBrief introduction to digital forensics
Brief introduction to digital forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Digital forensics ahmed emam
Digital forensics   ahmed emamDigital forensics   ahmed emam
Digital forensics ahmed emam
 
Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)Digital Forensics by William C. Barker (NIST)
Digital Forensics by William C. Barker (NIST)
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Draft current state of digital forensic and data science
Draft current state of digital forensic and data science Draft current state of digital forensic and data science
Draft current state of digital forensic and data science
 
Digital forensics
Digital forensics Digital forensics
Digital forensics
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
Sued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital ForensicsSued or Suing: Introduction to Digital Forensics
Sued or Suing: Introduction to Digital Forensics
 
Digital forensics Steps
Digital forensics StepsDigital forensics Steps
Digital forensics Steps
 
Computer Forensic Softwares
Computer Forensic SoftwaresComputer Forensic Softwares
Computer Forensic Softwares
 
Cyber forensic standard operating procedures
Cyber forensic standard operating proceduresCyber forensic standard operating procedures
Cyber forensic standard operating procedures
 
computer forensics
computer forensicscomputer forensics
computer forensics
 
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
Concepts and Methodology in Mobile Devices Digital Forensics Education and Tr...
 
Digital Forensics
Digital ForensicsDigital Forensics
Digital Forensics
 

En vedette

Digital forensic | DIGITAL FORENSIC
Digital forensic | DIGITAL FORENSICDigital forensic | DIGITAL FORENSIC
Digital forensic | DIGITAL FORENSICBambang Karyadi
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements Sonali Parab
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digitalyprayudi
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital ForensicsDonald Tabone
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologistDonald Tabone
 
Cell Phone Forensics Research
Cell Phone Forensics ResearchCell Phone Forensics Research
Cell Phone Forensics ResearchHouston Rickard
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Developmentamiable_indian
 
Practical Sentiment Analysis
Practical Sentiment AnalysisPractical Sentiment Analysis
Practical Sentiment AnalysisPeople Pattern
 
Political sentiment analysis using twitter data
Political sentiment analysis using twitter dataPolitical sentiment analysis using twitter data
Political sentiment analysis using twitter dataAmal Mahmoud
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumOWASP Khartoum
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsFilip Maertens
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentationprashant3535
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentationSomya Johri
 
Introduction to Sentiment Analysis
Introduction to Sentiment AnalysisIntroduction to Sentiment Analysis
Introduction to Sentiment AnalysisJaganadh Gopinadhan
 
Sentiment analysis of twitter data
Sentiment analysis of twitter dataSentiment analysis of twitter data
Sentiment analysis of twitter dataBhagyashree Deokar
 
Twitter sentiment-analysis Jiit2013-14
Twitter sentiment-analysis Jiit2013-14Twitter sentiment-analysis Jiit2013-14
Twitter sentiment-analysis Jiit2013-14Rachit Goel
 
Sentiment Analysis in Twitter
Sentiment Analysis in TwitterSentiment Analysis in Twitter
Sentiment Analysis in TwitterAyushi Dalmia
 

En vedette (20)

Digital forensic | DIGITAL FORENSIC
Digital forensic | DIGITAL FORENSICDigital forensic | DIGITAL FORENSIC
Digital forensic | DIGITAL FORENSIC
 
Forensic laboratory setup requirements
Forensic laboratory setup  requirements Forensic laboratory setup  requirements
Forensic laboratory setup requirements
 
Pengenalan Forensik Digital
Pengenalan Forensik DigitalPengenalan Forensik Digital
Pengenalan Forensik Digital
 
The Realm Of Digital Forensics
The Realm Of Digital ForensicsThe Realm Of Digital Forensics
The Realm Of Digital Forensics
 
ISACA_21st century technologist
ISACA_21st century technologistISACA_21st century technologist
ISACA_21st century technologist
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
computer forensics
computer forensics computer forensics
computer forensics
 
Cell Phone Forensics Research
Cell Phone Forensics ResearchCell Phone Forensics Research
Cell Phone Forensics Research
 
Forensic Lab Development
Forensic Lab DevelopmentForensic Lab Development
Forensic Lab Development
 
Practical Sentiment Analysis
Practical Sentiment AnalysisPractical Sentiment Analysis
Practical Sentiment Analysis
 
Political sentiment analysis using twitter data
Political sentiment analysis using twitter dataPolitical sentiment analysis using twitter data
Political sentiment analysis using twitter data
 
Computer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP KhartoumComputer forensic 101 - OWASP Khartoum
Computer forensic 101 - OWASP Khartoum
 
Digital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic InvestigationsDigital Evidence in Computer Forensic Investigations
Digital Evidence in Computer Forensic Investigations
 
Digital Crime & Forensics - Presentation
Digital Crime & Forensics - PresentationDigital Crime & Forensics - Presentation
Digital Crime & Forensics - Presentation
 
Computer forensics ppt
Computer forensics pptComputer forensics ppt
Computer forensics ppt
 
Computer forensics powerpoint presentation
Computer forensics powerpoint presentationComputer forensics powerpoint presentation
Computer forensics powerpoint presentation
 
Introduction to Sentiment Analysis
Introduction to Sentiment AnalysisIntroduction to Sentiment Analysis
Introduction to Sentiment Analysis
 
Sentiment analysis of twitter data
Sentiment analysis of twitter dataSentiment analysis of twitter data
Sentiment analysis of twitter data
 
Twitter sentiment-analysis Jiit2013-14
Twitter sentiment-analysis Jiit2013-14Twitter sentiment-analysis Jiit2013-14
Twitter sentiment-analysis Jiit2013-14
 
Sentiment Analysis in Twitter
Sentiment Analysis in TwitterSentiment Analysis in Twitter
Sentiment Analysis in Twitter
 

Similaire à Survey & Review of Digital Forensic

Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 yearsAl Imran, CISA
 
Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmartheijes
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelCSCJournals
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxFatemaAkter78
 
Privacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software DevelopmentPrivacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software DevelopmentRequirementsEngineeringLaboratory
 
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation ModelAnalysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation ModelIJERD Editor
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Joanne Luciano
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceDr. Richard Otieno
 
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityLecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityAlchemist095
 
Dream It 09[1].06.11 Batpurev
Dream It 09[1].06.11 BatpurevDream It 09[1].06.11 Batpurev
Dream It 09[1].06.11 Batpurevpanall2009
 
Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?Phil Watt
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Ivans Kigwana
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Karlos Svoboda
 
Exploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital EraExploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital EraTogar Simatupang
 
A Survey And Taxonomy Of Distributed Data Mining Research Studies A Systemat...
A Survey And Taxonomy Of Distributed Data Mining Research Studies  A Systemat...A Survey And Taxonomy Of Distributed Data Mining Research Studies  A Systemat...
A Survey And Taxonomy Of Distributed Data Mining Research Studies A Systemat...Sandra Long
 
H2020 Open Research Data pilot
H2020 Open Research Data pilotH2020 Open Research Data pilot
H2020 Open Research Data pilotSarah Jones
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesRónán Kennedy
 

Similaire à Survey & Review of Digital Forensic (20)

Digital Forensics: The next 10 years
Digital Forensics: The next 10 yearsDigital Forensics: The next 10 years
Digital Forensics: The next 10 years
 
Proposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in MyanmarProposed Effective Solution for Cybercrime Investigation in Myanmar
Proposed Effective Solution for Cybercrime Investigation in Myanmar
 
Systematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation ModelSystematic Digital Forensic Investigation Model
Systematic Digital Forensic Investigation Model
 
Chapter 16
Chapter 16Chapter 16
Chapter 16
 
Forensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptxForensics_1st_Presentation.pptx
Forensics_1st_Presentation.pptx
 
Privacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software DevelopmentPrivacy Requirements Engineering in Agile Software Development
Privacy Requirements Engineering in Agile Software Development
 
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation ModelAnalysis of Existing Models & Proposed Cyber Crime Investigation Model
Analysis of Existing Models & Proposed Cyber Crime Investigation Model
 
Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020Luciano uvi hackfest.28.10.2020
Luciano uvi hackfest.28.10.2020
 
Applying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital EvidenceApplying Data Mining Principles in the Extraction of Digital Evidence
Applying Data Mining Principles in the Extraction of Digital Evidence
 
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic securityLecture 4,5, 6 comp forensics 19 9-2018 basic security
Lecture 4,5, 6 comp forensics 19 9-2018 basic security
 
ch01.ppt
ch01.pptch01.ppt
ch01.ppt
 
Dream It 09[1].06.11 Batpurev
Dream It 09[1].06.11 BatpurevDream It 09[1].06.11 Batpurev
Dream It 09[1].06.11 Batpurev
 
Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?Why is TDD so hard for Data Engineering and Analytics Projects?
Why is TDD so hard for Data Engineering and Analytics Projects?
 
Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...Proposed high level solutions to counter online examination fraud using digit...
Proposed high level solutions to counter online examination fraud using digit...
 
Post-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics InvestigationPost-Genesis Digital Forensics Investigation
Post-Genesis Digital Forensics Investigation
 
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
Privacy, Accountability and Trust Privacy, Accountability and Trust Privacy, ...
 
Exploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital EraExploring Research Opportunities in the Digital Era
Exploring Research Opportunities in the Digital Era
 
A Survey And Taxonomy Of Distributed Data Mining Research Studies A Systemat...
A Survey And Taxonomy Of Distributed Data Mining Research Studies  A Systemat...A Survey And Taxonomy Of Distributed Data Mining Research Studies  A Systemat...
A Survey And Taxonomy Of Distributed Data Mining Research Studies A Systemat...
 
H2020 Open Research Data pilot
H2020 Open Research Data pilotH2020 Open Research Data pilot
H2020 Open Research Data pilot
 
From Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital RulesFrom Law to Code: Translating Legal Principles into Digital Rules
From Law to Code: Translating Legal Principles into Digital Rules
 

Plus de Aung Thu Rha Hein

Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Aung Thu Rha Hein
 
Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Aung Thu Rha Hein
 
Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Aung Thu Rha Hein
 
Private Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityAung Thu Rha Hein
 
Partitioned Based Regression Verification
Partitioned Based Regression VerificationPartitioned Based Regression Verification
Partitioned Based Regression VerificationAung Thu Rha Hein
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsAung Thu Rha Hein
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresAung Thu Rha Hein
 
Can the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtCan the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtAung Thu Rha Hein
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentAung Thu Rha Hein
 

Plus de Aung Thu Rha Hein (18)

Writing with ease
Writing with easeWriting with ease
Writing with ease
 
Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists Bioinformatics for Computer Scientists
Bioinformatics for Computer Scientists
 
Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)Analysis of hybrid image with FFT (Fast Fourier Transform)
Analysis of hybrid image with FFT (Fast Fourier Transform)
 
Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)Introduction to Common Weakness Enumeration (CWE)
Introduction to Common Weakness Enumeration (CWE)
 
Private Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic OpportunityPrivate Browsing: A Window of Forensic Opportunity
Private Browsing: A Window of Forensic Opportunity
 
Network switching
Network switchingNetwork switching
Network switching
 
Partitioned Based Regression Verification
Partitioned Based Regression VerificationPartitioned Based Regression Verification
Partitioned Based Regression Verification
 
CRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web ApplicationsCRAXweb: Automatic Exploit Generation for Web Applications
CRAXweb: Automatic Exploit Generation for Web Applications
 
Botnets 101
Botnets 101Botnets 101
Botnets 101
 
Session initiation protocol
Session initiation protocolSession initiation protocol
Session initiation protocol
 
TPC-H in MongoDB
TPC-H in MongoDBTPC-H in MongoDB
TPC-H in MongoDB
 
Web application security: Threats & Countermeasures
Web application security: Threats & CountermeasuresWeb application security: Threats & Countermeasures
Web application security: Threats & Countermeasures
 
Cloud computing security
Cloud computing securityCloud computing security
Cloud computing security
 
Can the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaughtCan the elephants handle the no sql onslaught
Can the elephants handle the no sql onslaught
 
Fuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessmentFuzzy logic based students’ learning assessment
Fuzzy logic based students’ learning assessment
 
Link state routing protocol
Link state routing protocolLink state routing protocol
Link state routing protocol
 
Chat bot analysis
Chat bot analysisChat bot analysis
Chat bot analysis
 
Data mining & column stores
Data mining & column storesData mining & column stores
Data mining & column stores
 

Dernier

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Dernier (20)

08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Survey & Review of Digital Forensic

  • 1. Summary report: Survey & Review of Digital Forensic Aung Thu Rha Hein (g5536871) 1st February 2014
  • 3. Papers 1. Digital forensics research: The next 10 years -Simson L. Garfinkel - Digital Investigation Journal,2010 2. Challenges to Digital Forensic: A Survey of Researcher & Practitioners Attitudes and Opinions - M. Al Fahdi, N.L. Clarke, S.M. Furnell - Information Security for South Africa Conference,2013 3. Taxonomy of computer forensics methodologies and procedures for digital evidence seizure - Krishnun Sansurooah - Australian Digital Forensics Conference,2006 4. The future of computer forensics: a needs analysis survey -Marcus K Rogers, Kate Seigfried, Computers & Security Journal, 2004
  • 4. Papers/2 5. An Ad Hoc Review of Digital Forensic Models -M.M. Pollitt, Second International Workshop on Systematic Approaches to Digital Forensic Engineering, 2007 6. Network forensic frameworks: Survey and research challenges -Emmanuel S. Pilli*, R.C. Joshi, Rajdeep Niyogi - Digital Investigation Journal,2010 7. A critical review of 7 years of Mobile Device Forensics -Konstantia Barmpatsalou , Dimitrios Damopoulos, Georgios Kambourakis,Vasilios Katos, - Digital InvestigationJournal,2013
  • 5. Paper Objectives 1. Digital forensics research: The next 10 years - proposes a methodology to improve the digital forensic research - point out today DF research challenges - proposes a new research plan 2. Challenges to Digital Forensic - to understand the priority of challenges on Digital Forensic by taking a survey 3. Taxonomy of computer forensics methodologies and procedures for digital evidence seizure - compare the forensic methodologies and propose a recommended methodology 4. The future of computer forensics: a needs analysis survey - makes a study on computer forensics to discover the challenge
  • 6. Paper Objectives 5. An Ad Hoc Review of Digital Forensic Models - summary of 15 papers which represents about DF data models 6. Network forensic frameworks: Survey and research challenges -overview of network forensic field on tools & frameworks -also point out Network Forensic research challenge 7. A critical review of 7 years of Mobile Device Forensics - through review of mobile device forensic by mobile platforms
  • 8. Methodology/2 ● ● ● 3 methodologies & the detailed process varies ○ Basic Forensic Methodology ○ Cyber Tool Online Search For Evidence (CTOSE) ○ Data Recovery UK (DRUK) the recommended methodology combines the practice from 3 standards there are more than dozen DF frameworks
  • 9.
  • 10. Challenges ● ● DF research is trending from 1997-2007 After 2007, Digital forensic meets with many challenges Characteristics comparison Era OS File Format Computing Architecture Storage Architecture Tools 1997-2007 Windows Dominance few file formats PC, Centralized standard cable interfaces commercial tools are working 2007- recent increasing OSs Various file formats Client/Server, Flash, Cloud Storage can’t catch up with req Other introduced issues: Storage Size, pervasive encryption, legal challenges
  • 11. Challenges/2 Descriptive Analysis Reult(N=60) 2004,The future of computer forensics: a needs analysis survey
  • 12. Challenges/3 ● ● ● ● ● Evidence-oriented design influences today’s DF research ○ find evidence instead of assisting investigation ○ not think of cyber-crime, i.e tools are not for hacking cases ○ not possible to perform short-time analysis ○ not capable of generating data from residual file Visibility,Filter,Report Model ○ data recover before making analysis ○ not possible to do parallel processing no standard for reverse engineering ‘application instead of tools’ concept by vendors lost academic research 2010,Digital forensics research: The next 10 years
  • 13. Challenges/4 ● ● ● ● ● 2013 survey takes part in 4 categories: ○ Demographics, Forensic Capabilities, Future Challenge, Legislative Concerns more than 50%: 3 years of DF experience Current DF tools & Capabilities: ○ Importance: more than 98% ranks as 4 out of 5 ○ Key Limitations: Data Volume, TIme,Tool Capability ○ Tool Capability: not clear result Technology that least concerns: malware, steganography 2013, Challenges to Digital Forensic
  • 14. Future Research ● Challenge: Investigation & Analysis Time ● Mobile and Network Forensic will be trending ● anticipated future challenge: Cloud Computing, Anti-forensic, Encryption,Social Networking ● Should adopt standards for case data, data abstractions and composable models ● more data abstractions should create ● should standardise development diversity ● alternative analysis model: parallel processing, stochastic analysis ... ● doesn’t work in small-scale dataset ● standardized test data