17.10.2014 Views

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

Crosby-Signed Thesis - Alliance Digital Repository

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

IMPACT OF IPV6 TRANSITION MECHANISMS ON THE NETWORK FORENSIC<br />

219<br />

This RFC 3089 IEFT document discusses the SOCKS64 IPv6/IPv4 transition<br />

mechanism. This method involves inserting a socket between the application and the<br />

outbound NIC to allow both IPv6 and IPv4 hosts to communicate with an application<br />

through a translation API.<br />

Lan, T. H..Lin, A. C..Lin, I. L., & Wu, T. (2005). Establishment of the standard operating<br />

procedure (SOP) for gathering digital evidence. Paper presented at the First International<br />

Workshop on Systematic Approaches to <strong>Digital</strong> Forensic Engineering (SADFE’05).<br />

Retrieved from http://doi.ieeecomputersociety.org/10.1109/SADFE.2005.12<br />

doi:10.1109/SADFE.2005.12<br />

This IEEE conference paper addresses the low credibility of digital evidence in ad-hoc<br />

digital investigations. The qualitative methodology used is weakly supported by<br />

references to evidence handling procedures used by the FBI and Chinese investigators.<br />

They also base their proposed model on Lin (2000) "Study of Evidence Act on <strong>Digital</strong><br />

Data", Chang (2000) "Study of Computer crime Evidence", and Casey (2000) "Handbook<br />

of Computer Crime: Forensic Science, Computer and the Internet". The proposed model<br />

is detailed and appears to be a model that could work in practice or further developed by<br />

other researchers. The paper seems to be more like a presentation of the authors views<br />

and beliefs that may be based more on experience than on their research efforts.<br />

Lee, S..Shin, M.-K..Kim, Y.-J..Nordmark, E., & Durand, A. (2002). Dual stack hosts using<br />

"bump-in-the-API" (BIA). RFC 3338: Internet Engineering Task Force (IETF).<br />

This RFC 3338 IETF document discusses the bump in the API IPv6 transition<br />

mechanism. This mechanism inserts functions between the TCP API and the network<br />

protocol stack to translate IPv4 API calls from applications into IPv6 API calls. The

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!