Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6884436 | Digital Investigation | 2018 | 12 Pages |
Abstract
This study focuses on executing day-to-day (regular) file-system operations and recording which file metadata changes occur after each operation. Each operation was executed, and its fingerprints were detailed. The use of those fingerprints as artifacts for file-system forensic analysis was elaborated via two case studies. The results of the research include a detailed study of each operation, including which system entity (user or service) performed this operation and when, which is vital for most analysis cases. Moreover, the forensic value of examined observations is indicated by employing these artifacts in forensic analysis.
Related Topics
Physical Sciences and Engineering
Computer Science
Computer Networks and Communications
Authors
Mariam Khader, Ali Hadi, Ghazi Al-Naymat,