Digital Forensics in Distributed Environment

Digital Forensics in Distributed Environment

Asha Joseph, K. John Singh
ISBN13: 9781522541004|ISBN10: 1522541004|EISBN13: 9781522541011
DOI: 10.4018/978-1-5225-4100-4.ch013
Cite Chapter Cite Chapter

MLA

Joseph, Asha, and K. John Singh. "Digital Forensics in Distributed Environment." Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., IGI Global, 2018, pp. 246-265. https://doi.org/10.4018/978-1-5225-4100-4.ch013

APA

Joseph, A. & Singh, K. J. (2018). Digital Forensics in Distributed Environment. In G. Shrivastava, P. Kumar, B. Gupta, S. Bala, & N. Dey (Eds.), Handbook of Research on Network Forensics and Analysis Techniques (pp. 246-265). IGI Global. https://doi.org/10.4018/978-1-5225-4100-4.ch013

Chicago

Joseph, Asha, and K. John Singh. "Digital Forensics in Distributed Environment." In Handbook of Research on Network Forensics and Analysis Techniques, edited by Gulshan Shrivastava, et al., 246-265. Hershey, PA: IGI Global, 2018. https://doi.org/10.4018/978-1-5225-4100-4.ch013

Export Reference

Mendeley
Favorite

Abstract

This chapter is about an ongoing implementation of a digital forensic framework that could be used with standalone systems as well as in distributed environments, including cloud systems. It is oriented towards combining concepts of cyber forensics and security frameworks in operating systems. The framework consists of kernel mechanisms for data and event monitoring. The system monitoring is done in kernel mode by various kernel modules and forensic model mapping is done in user mode using the data collected by those kernel modules. Further, the authors propose a crime model mapping mechanism that makes use of rule sets that are derived from common cyber/digital crime patterns. The decision-making algorithm can be easily extended from a node in a computing cluster, to a cloud. The authors discuss the challenges to digital forensics in distributed environment and cloud extensions and provide some case studies where the proposed framework is applied.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.