Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study

Evaluation of Autopsy and Volatility for Cybercrime Investigation: A Forensic Lucid Case Study

Ahmed Almutairi, Behzad Shoarian Satari, Carlos Rivas, Cristian Florin Stanciu, Mozhdeh Yamani, Zahra Zohoorsaadat, Serguei A. Mokhov
Copyright: © 2020 |Pages: 32
DOI: 10.4018/IJDCF.2020010104
Article PDF Download
Open access articles are freely available for download

Abstract

In this article, the authors successfully created two new plugins one for Autopsy Forensic Tool, and the other for Volatility Framework. Both plugins are useful for encoding digital evidences in Forensic Lucid which is the goal of this work. The first plugin was integrated in Autopsy to generate a report for the case of a Brute Force Authentication attack by looking for evidence in server logs based on a key search. On the other hand, the second plugin named ForensicLucidDeviceTree aims to find whether a device stack has been infected by a root-kit or not expression is implied by the previous statement. The results of both plugins are shown in Forensic Lucid Format and were successfully compiled using GIPC compiler.
Article Preview
Top

1. Introduction

1.1. Motivation

The motivation behind this project is to re-evaluate the open source forensic tools through their hands-on use, such as that of Sleuthkit (Carrier, n.d.), and more of its Autopsy (Carrier, n.d.), and other tools in a simulated investigation, reasoning, analysis, and reporting for sample cases. The use of tools is followed by adaptation and encoding of the case’s knowledge base (output) extracted from forensic artifact analysis in Forensic Lucid. Thus, the tools should be evaluated how easy is to extract their outputs, reports, and translate into the format for Forensic Lucid. The sample data would come from the honeynet (Honeynet Project, 2015) and DFRWS (Palmer, 2001) projects/challenges.

1.2. Overview

In Section 2 we provide a detailed background of our research on Autopsy (Carrier, n.d.), Volatility, Forensic Lucid, and GIPSY, that has a Forensic Lucid compiler – GIPC. In Section 3 we detail our experiments, writing plug-ins for Autopsy and Volatility, and encoding sample data output into Forensic Lucid. We conclude in Section 5.

Complete Article List

Search this Journal:
Reset
Volume 16: 1 Issue (2024)
Volume 15: 1 Issue (2023)
Volume 14: 3 Issues (2022)
Volume 13: 6 Issues (2021)
Volume 12: 4 Issues (2020)
Volume 11: 4 Issues (2019)
Volume 10: 4 Issues (2018)
Volume 9: 4 Issues (2017)
Volume 8: 4 Issues (2016)
Volume 7: 4 Issues (2015)
Volume 6: 4 Issues (2014)
Volume 5: 4 Issues (2013)
Volume 4: 4 Issues (2012)
Volume 3: 4 Issues (2011)
Volume 2: 4 Issues (2010)
Volume 1: 4 Issues (2009)
View Complete Journal Contents Listing