• Title/Summary/Keyword: 포렌식 연구

Search Result 328, Processing Time 0.026 seconds

A research for partition recovery method in a forensic perspective (포렌식 관점의 파티션 복구 기법에 관한 연구)

  • Namgung, Jaeung;Hong, Ilyoung;Park, Jungheum;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.655-666
    • /
    • 2013
  • As the capacity of storage devices becomes larger, most users divide them into several logical partitions for convenience of storing and controlling data. Therefore, recovering partitions stably which are artificially hidden or damaged is the most important issue in the perspective of digital forensic. This research suggests partition recovery algorithm that makes stable and effective analysis using characteristics of each file system. This algorithm is available when partition is not distinguishable due to concealment of partition or damage in partition area.

Automatic Creation of Forensic Indicators with Cuckoo Sandbox and Its Application (Cuckoo Sandbox를 이용한 포렌식 침해지표 자동생성 및 활용 방안)

  • Kang, Boong Gu;Yoon, Jong Seong;Lee, Min Wook;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.11
    • /
    • pp.419-426
    • /
    • 2016
  • As the threat of cyber incident grows continuously, the need of IOC(Indicators of Compromise) is increasing to identify the cause of incidents and share it for quick response to similar incidents. But only few companies use it domestically and the research about the application of IOC is deficient compared to foreign countries. Therefore in this paper, a quick and standardized way to create IOC automatically based on the analysis result of malwares from Cuckoo Sandbox and its application is suggested.

A Study of Trace for Data Wiping Tools (완전삭제 도구 사용 흔적에 관한 연구)

  • Kim, Yeon-Soo;Bang, Je-Wan;Kim, Jin-Kook;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.159-164
    • /
    • 2010
  • The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.

Limitations on the method of recovery for deleted record in Database (데이터베이스의 삭제된 레코드 복구 기법의 한계)

  • Kim, Dong-Hwi
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.05a
    • /
    • pp.289-292
    • /
    • 2018
  • 데이터베이스는 대용량의 데이터를 효율적으로 관리할 수 있는 장점을 가지고 있기 때문에 다양한 분야에서 사용되고 있다. 관련 범죄 발생 시 PC, 스마트폰 등 다지털 기기의 정보를 수집, 복구, 분석해 활용하는 '디지털포렌식'을 이용하여 수사가 진행된다. 이 때 삭제된 데이터의 복구가 중요하며 관련 연구가 많이 진행되고 있지만 삭제 방법보다 복구 방안에 초점을 두고 진행하는 경우가 많다. 따라서 본 논문에서는 실제 수사에서 데이터 복구 실패한 사례를 통해 기존 연구된 삭제된 레코드 복구 기법 방식을 실험한다.

특수유형 OSP(Online Service Provider)의 대용량 데이터베이스 포렌식 분석 방안 연구

  • Lee, Dong-Young;Jeon, Wan-Keum;Kim, Hong-Yun
    • Review of KIISC
    • /
    • v.21 no.6
    • /
    • pp.49-56
    • /
    • 2011
  • 다수의 사람과 파일을 공유할 수 있는 웹하드 서비스의 이점을 이용하여 각종 불법복제물 등의 업로드를 유도하고 다운로드를 통해 이득을 취하는 특수유형의 OSP(Online Service Provider, 온라인 서비스 제공자)들이 출현하게 되었다. 이런 범죄가 일어나는 업체의 데이터베이스에는 모든 이용자들의 관련 기록을 담고 있어 헤비업로더의 활동내역뿐만 아니라 업체측의 방조혐의 등의 증거를 추출할 수 있다. 본 논문에서는 특수유행 OSP들의 대용량 데이터베이스를 신속하고 정확하게 무결성을 유지하며 데이터베이스의 데이터를 수집할 수 있는 방법에 대해 연구해보고, 수집한 데이터 또한 신속하게 분석하는 방법을 제안하였다.

A Study to Improve Recovery Ratio of Deleted File Using the Parsing Algorithm of the HFS + Journal File (HFS+ 저널 파일 파싱 알고리즘을 이용한 삭제된 파일 복구 기법 향상 방안)

  • Bang, Seung Gyu;Jeon, Sang Jun;Kim, Do Hyun;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.463-470
    • /
    • 2016
  • With the growing demand for MAC-based system, the need for digital forensic techniques of these system has been increasing. In the digital forensic analysis process, sometimes analysts have recovered the deleted files when they prove the allegations if system user try to remove the evidence deliberately. Research and analysis that recover the deleted files from a file system constantly been made and HFS+ that is a file system of MAC-based system also has been researched. Carving techniques primarily has been used to recover the deleted file from HFS+ a file system because metadata of folder or file overwrite metadata of a deleted file when file is deleted from a file system on HFS+ characteristic. But if the file content is saved by separated state in a file system, Carving techniques also can't recover the whole or a part of the deleted file. In this paper we describe technique the deleted file recovery technique using HFS+ file system a journal. This technique that is suggested by existing research and analysis result is the technique that recover the deleted file by metadata that is maintained in a journal on HFS+ file system. but this technique excludes specific files and this problem needs to be reformed. In this paper we suggest algorithm that analysis a journal of HFS+ file system in detail. And we demonstrate that the deleted file cat be recovered from the extracted metadata by this algorithm without the excluded file.

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

국내 환경에 맞는 컴퓨터 포렌식에서의 초기 신고 시스템

  • 이하영;김현상;최운호;이상진;임종인
    • Review of KIISC
    • /
    • v.15 no.1
    • /
    • pp.67-75
    • /
    • 2005
  • 현재 국내에도 컴퓨터 포렌식의 중요성에 대한 인식이 확산됨에 따라 민·관·군의 여러 단체에서 포렌식 연구를 수행하고 있고, 침해사고 대응 센터와 같은 CERT 관련 단체들이 많아지고 있다. 하지만 현재 국내의 신고 시스템을 아직 1∼1.5세대 정도로 분류된다. 또한 선진국들의 신고 시스템을 보면 어느 정도의 전문 지식이 없으면 신고서를 작성하기가 힘들게 되어있다. 본고에서는 선진국의 체계적인 신고 시스템을 바탕으로 일반인도 좀 더 쉽게 신고할 수 있는 시스템의 체계를 설계, 구현한 시스템을 제안해 보고자 한다.

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF