25.12.2013 Views

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SLAMorris Final Thesis After Corrections.pdf - Cranfield University

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

An important question for each artefact an analyst identifies is its position within<br />

the file system structure; he must identify the storage structure of the devices.<br />

For example thumbs.db files can be found throughout a Windows XP operating<br />

system and in order to establish the meaning of a particular instance of the<br />

cache it is necessary to establish its relative location [Hurlbut, 2005]. This is<br />

forensically significant as it provides an understanding of where any evidence<br />

came from in relation to the rest of the information being stored. It is equally<br />

important to clarify where a deleted file was in relation to other files on the disk.<br />

However, this can be difficult for an analyst when the folder containing the<br />

deleted file is no longer on the disk; in this case the file is known as an orphan.<br />

Hurlbut investigates methods of identifying this particular class of deleted files<br />

with relative success. For a visual thumbnail it is important to establish a<br />

relationship to the original file the image it relates to; this can provide important<br />

information about the original file, such as the file path or associated dates and<br />

times.<br />

It would not be an effective use of resources to examine every piece of stored<br />

information in every investigation; therefore it is necessary to reduce the<br />

amount of information to be analysed. Whilst this ensures value is obtained<br />

from the resources it may also lead to some important information being missed<br />

[Hama, 1996]. Hama suggested one method of refining the information is to<br />

ignore anything that is unlikely to be relevant to an investigation; for example,<br />

standard libraries or images that come with the operating system or commercial<br />

applications. Whilst this does reduce the number of files for consideration, care<br />

must be taken to ensure that files which are discounted as a result of such preprocessing<br />

have not been altered by a criminal aware of such procedures. Files<br />

can also be discarded on the basis of their extensions; however any method<br />

would need to check that the header and contents of the file match the<br />

extension. Any unused space on the storage media would need searching for<br />

deleted or partial files. <strong>Final</strong>ly string searches can be useful in locating<br />

information, but the results can vary significantly based upon the keyword used.<br />

Page 23

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!