- Title
- Effective digital forensic analysis of the NTFS disk image
- Creator
- Alazab, Mamoun; Venkatraman, Sitalakshmi; Watters, Paul
- Date
- 2009
- Type
- Text; Journal article
- Identifier
- http://researchonline.federation.edu.au/vital/access/HandleResolver/1959.17/65602
- Identifier
- vital:3553
- Identifier
- http://www.ubicc.org/files/pdf/3_371.pdf
- Identifier
- ISSN:1992-8424
- Abstract
- Forensic analysis of the Windows NT File System (NTFS) could provide useful information leading towards malware detection and presentation of digital evidence for the court of law. Since NTFS records every event of the system, forensic tools are required to process an enormous amount of information related to user / kernel environment, buffer overflows, trace conditions, network stack, etc. This has led to imperfect forensic tools that are practical for implementation and hence become popular, but are not comprehensive and effective. Many existing techniques have failed to identify malicious code in hidden data of the NTFS disk image. This research discusses the analysis technique we have adopted to successfully detect maliciousness in hidden data, by investigating the NTFS boot sector. We have conducted experimental studies with some of the existing popular forensics tools and have identified their limitations. Further, through our proposed three-stage forensic analysis process, our experimental investigation attempts to unearth the vulnerabilities of NTFS disk image and the weaknesses of the current forensic techniques.
- Publisher
- UBICC Publishers
- Relation
- Ubiquitous Computing and Communication Journal Vol. 4, no. 3 (Special issue on ICIT 2009 Conference - Applied Computing) (2009), p. 551-558
- Rights
- Open Access
- Rights
- Copyright UBICC Journal
- Rights
- This metadata is freely available under a CCO license
- Subject
- NTFS; Forensics; Disk image; Data hiding
- Reviewed
- Hits: 1021
- Visitors: 1082
- Downloads: 1
Thumbnail | File | Description | Size | Format |
---|