A stepwise methodology for tracing computer usage

Seung Bong Lee, Jewan Bang, Kyung Soo Lim, Jongsung Kim, Sangjin Lee

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Citations (Scopus)

Abstract

In digital forensics investigation, a general method of investigating the suspect's computer was to duplicate storage media or image and then obtain the case-related data from these. However, the increase in the capacity of storage media made this method take much longer time. Also, this implies that more data can exist in the suspect's computer so that finding relevant data will take a lot of time and efforts. Moreover, in case where imaging of the entire disk is not possible due to legal matters, selective acquisition of data is needed. In this paper, we propose methods for selective acquisition of file system metadata, registry & prefetch files, web browser files, specific document files without duplicating or imaging the storage media. Furthermore, we suggest a method to analyze the acquired data stepwise and quickly and effectively trace the use of computer in the crime scene.

Original languageEnglish
Title of host publicationNCM 2009 - 5th International Joint Conference on INC, IMS, and IDC
Pages1852-1857
Number of pages6
DOIs
Publication statusPublished - 2009 Dec 1
EventNCM 2009 - 5th International Joint Conference on Int. Conf. on Networked Computing, Int. Conf. on Advanced Information Management and Service, and Int. Conf. on Digital Content, Multimedia Technology and its Applications - Seoul, Korea, Republic of
Duration: 2009 Aug 252009 Aug 27

Publication series

NameNCM 2009 - 5th International Joint Conference on INC, IMS, and IDC

Other

OtherNCM 2009 - 5th International Joint Conference on Int. Conf. on Networked Computing, Int. Conf. on Advanced Information Management and Service, and Int. Conf. on Digital Content, Multimedia Technology and its Applications
CountryKorea, Republic of
CitySeoul
Period09/8/2509/8/27

Keywords

  • PIM
  • Pre-investigation
  • Selectively acquisition

ASJC Scopus subject areas

  • Computer Graphics and Computer-Aided Design
  • Computer Science Applications
  • Software

Fingerprint Dive into the research topics of 'A stepwise methodology for tracing computer usage'. Together they form a unique fingerprint.

  • Cite this

    Lee, S. B., Bang, J., Lim, K. S., Kim, J., & Lee, S. (2009). A stepwise methodology for tracing computer usage. In NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC (pp. 1852-1857). [5331447] (NCM 2009 - 5th International Joint Conference on INC, IMS, and IDC). https://doi.org/10.1109/NCM.2009.246