DocumentCode
608011
Title
Forensically-Sound Methods to Collect Live Network Evidence
Author
Castiglione, Arcangelo ; Cattaneo, Giuseppe ; De Maio, Giancarlo ; De Santis, Alfredo
fYear
2013
fDate
25-28 March 2013
Firstpage
405
Lastpage
412
Abstract
In the last decade Digital Forensics has experienced several issues when dealing with network evidence. An analyst, which is in charge of managing evidence flowing over a network have to face problems due to the volatile nature of such information. In facts, such data may change over time, may be lying on a server out of the his jurisdiction, or geographically far from where the crime was committed. In this paper two methods to allow remote collection of network evidence produced by online services such as web pages, chats, documents, photos and videos are presented. They enable the analyst to drive the acquisition process through the online services considered potential sources of evidence. During the process, all data flowing through the network is automatically collected (i.e., all the IP packets). The second one also collects the graphical representation of the acquisition (e.g., how the browser visualizes such data). Both methods introduce a trusted third party (acting as a digital notary) which is in charge of collecting and ``certifying´´ network evidence. Before closing the acquisition process, a detailed report of the collected evidence is generated and made available to the analyst along with the collected data. Cryptographic primitives are used to demonstrate ex post data integrity, how it has been acquired and the acquisition time. As a proof of concept two prototypes have been implemented. To enhance the Court confidence of the collected evidence, at the same time, the service could be run across multiple coordinated servers acquiring the same data from different point of the network.
Keywords
cryptography; data acquisition; data structures; digital forensics; trusted computing; acquisition process; court confidence; cryptographic primitives; digital forensics; ex post data integrity; forensically-sound methods; graphical acquisition representation; live network evidence collection; multiple coordinated servers; network evidence certification; online services; remote network evidence collection; trusted third party; Browsers; Computers; Forensics; Protocols; Servers; Videos; Web pages; Certified Network Acquisitions; Digital Forensics; Digital Investigations; Live Network Acquisitions; Live Network Investigation; Network Forensics;
fLanguage
English
Publisher
ieee
Conference_Titel
Advanced Information Networking and Applications (AINA), 2013 IEEE 27th International Conference on
Conference_Location
Barcelona
ISSN
1550-445X
Print_ISBN
978-1-4673-5550-6
Electronic_ISBN
1550-445X
Type
conf
DOI
10.1109/AINA.2013.133
Filename
6531784
Link To Document