Digital Forensic Tools: The Next Generation

Digital Forensic Tools: The Next Generation

III Richard (University of New Orleans, USA) and Vassil Roussev (University of New Orleans, USA)
Copyright: © 2006 |Pages: 16
DOI: 10.4018/978-1-59140-872-7.ch004
OnDemand PDF Download:


Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and analysis of digital evidence. Unfortunately, most current digital forensics tools fall short in several ways. First, they are unable to cope with the ever-increasing storage capacity of target devices. As capacities grow into hundreds of gigabytes or terabytes, the traditional approach of utilizing a single workstation to perform a digital forensics investigation against a single evidence source, such as a hard drive, will become completely intractable. Further, huge targets will require more sophisticated analysis techniques, such as automated categorization of images. We believe that the next generation of digital forensics tools will employ high-performance computing, more sophisticated evidence discovery and analysis techniques, and better collaborative functions to allow digital forensics investigators to perform investigations much more efficiently than they do today. This chapter examines the next generation of digital forensics tools.

Complete Chapter List

Search this Book:
Table of Contents
Kyriakos Tsiflakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Panagiotis Kanellis, Evangelos Kiountouzis, Nicholas Kolokotronis, Drakoulis Martakos
Chapter 1
Thomas M. Chen, Chris Davis
This chapter gives an overview of the major types of electronic attacks encountered today and likely to continue into the foreseeable future. A... Sample PDF
An Overview of Electronic Attacks
Chapter 2
Steven Furnell, Jeremy Ward
In the two decades since its first significant appearance, malware has become the most prominent and costly threat to modern IT systems. This... Sample PDF
Malware: An Evolving Threat
Chapter 3
Sriranjani Sitaraman, Subbarayan Venkatesan
This chapter introduces computer and network forensics. The world of forensics is well understood in the non-digital world, whereas this is a... Sample PDF
Computer and Network Forensics
Chapter 4
III Richard, Vassil Roussev
Digital forensics investigators have access to a wide variety of tools, both commercial and open source, which assist in the preservation and... Sample PDF
Digital Forensic Tools: The Next Generation
Chapter 5
Philip Craiger, Jeff Swauger, Chris Marberry, Connie Hendricks
An important result of the U.S. Supreme Courts Daubert decision is that the digital forensic tools must be validated if the results of examinations... Sample PDF
Validation of Digital Forensic Tools
Chapter 6
Dario Valentino Forete
Log file correlation comprises two components: Intrusion Detection and Network Forensics. The skillful and mutualistic combination of these distinct... Sample PDF
Log Correlation: Tools and Techniques
Chapter 7
Pallavi Kahai, Kamesh Namuduri, Ravi Pense
Security incidents that threaten the normal functioning of the organization are on the rise. In order to resist network attacks most organizations... Sample PDF
Tracing Cyber Crimes with a Privacy-Enabled Forensic Profiling System
Chapter 8
Caroline Chibelushi, Bernadette Sharp, Hanifa Shah
The advancement of multimedia and communication systems has not only provided faster and better communication facilities but also facilitated easier... Sample PDF
ASKARI: A Crime Text Mining Approach
Chapter 9
Sos S. Agaian, Benjamin M. Rodriguez
This chapter focuses on the development of digital forensic steganalysis tools/methods through analysis and evaluation of the most popular “sample... Sample PDF
Baseic Steganalysis for the Digital Media Forensics Examiner
Chapter 10
Warren Wylupski, David R. Champion, Zachary Grant
One of the emerging issues in the field of digital crime and digital forensics is corporate preparedness in dealing with attacks on computer network... Sample PDF
Incident Preparedness and Response: Devlopming a Security Policy
Chapter 11
S.H. (Basie) von Solms, C.P. (Buks) Louwrens
The purpose of this chapter is twofold: Firstly, we want to determine the relationships, if any, between the discipline of digital forensics and the... Sample PDF
The Relationship Between Digital Forensics, Corporate Governance, IT Governance, and IS Governance
Chapter 12
Andreas Mitrakas, Damián Zaitch
The steep increase of cyber crime has rendered digital forensics an area of paramount importance to keep cyber threats in check and invoke legal... Sample PDF
Law, CyberCrime and Digital Forensics: Trailing Digital Suspects
Chapter 13
Bernd Carsten Stahl, Moira Carroll-Mayer, Peter Norris
In order to be able to address issues of digital crime and forensic science in cyberspace, there is a need for specifically skilled individuals.... Sample PDF
Forensic Computing: The Problem of Developing a Multidisciplinary University Course
Chapter 14
Christopher Malinowski
This chapter considers and presents training possibilities for computer forensic investigators. The author differentiates between civil service and... Sample PDF
Training the Cyber Investigator
Chapter 15
Michael A. Caloyannides
Digital data increasingly presented in courts as evidence is mistakenly viewed by judges and juries as inherently unalterable. In fact, digital data... Sample PDF
Digital "Evidence" is Often Evidence of Nothing
About the Authors