30.06.2013 Views

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

Evaluating A Selection of Tools for Extraction of Forensic Data: Disk ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>for</strong> fast searching <strong>of</strong> evidence from large amounts <strong>of</strong> data. EnCase and FTK are now<br />

becoming <strong>for</strong>ensic proven s<strong>of</strong>tware tools and commonly used in private and public<br />

sector <strong>for</strong> digital <strong>for</strong>ensics investigation. A number <strong>of</strong> outstanding Linux and Unix<br />

based <strong>for</strong>ensic tools with user friendly GUI have been developed, such as Sleuthkit,<br />

SMART and Helix (shown in Table 2.2). Farmer and Venema (1999) created a<br />

s<strong>of</strong>tware toolkit called The Coroner‟s Toolkit (TCT) to respond to the lack <strong>of</strong> <strong>for</strong>ensic<br />

s<strong>of</strong>tware in UNIX plat<strong>for</strong>m. TCT (shown in Table 2.2) is capable <strong>of</strong> analysing all the<br />

activities in a live system and capturing all the current state in<strong>for</strong>mation <strong>of</strong> the<br />

plat<strong>for</strong>m. However, this toolkit was not designed to produce court admissible evidence<br />

but to determine what happened on a compromised machine. A debate has arisen to<br />

discuss whether open source digital <strong>for</strong>ensic tools can be used <strong>for</strong> digital <strong>for</strong>ensic<br />

investigation. Kenneally (2001) and Carrier (2002) have published their articles to<br />

support the debate.<br />

The popularity <strong>of</strong> the Internet has grown exponentially and crimes involving<br />

the Internet also have been increasing dramatically. The term network <strong>for</strong>ensics has<br />

emerged. Cohen & Schroader (2007, p.172) define network <strong>for</strong>ensics as the sniffing,<br />

recording, and analysis <strong>of</strong> network traffic and events. Progress has been made in<br />

innovation <strong>of</strong> network <strong>for</strong>ensic tools. Sitaraman & Venkatesan (2006) maintain that<br />

several tools such as Snort, TcpDump, Pcap and NetAnalysis (shown in Table 2.2) can<br />

per<strong>for</strong>m network <strong>for</strong>ensic activities. Some commercial tools such as NetIntercept,<br />

SilentRunnder (shown in Table 2.2) provide integrated search, visualisation and<br />

comprehensive analysis features <strong>for</strong> <strong>for</strong>ensic investigators to retrieve evidence from<br />

network traffic (Casey, 2004). Different <strong>for</strong>ms <strong>of</strong> evidence in a networking<br />

environment post a challenge <strong>for</strong> digital <strong>for</strong>ensics investigators because a single tool<br />

may not be able to support all types <strong>of</strong> evidence. Usually a combination <strong>of</strong> tools and<br />

excellent individual skills are required to extract and analyse different types <strong>of</strong><br />

in<strong>for</strong>mation.<br />

Table 2.2 provides a list <strong>of</strong> products including s<strong>of</strong>tware and hardware that are<br />

reviewed in Chapter 2. The purpose <strong>of</strong> the Table 2.2 is to make a ready comparison<br />

between different digital <strong>for</strong>ensic tools. The digital <strong>for</strong>ensic tools are listed and<br />

comparative data are provided to guide the research focus. Table 2.2 also helps the<br />

15

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!