• 제목/요약/키워드: Collecting evidence

Search Result 92, Processing Time 0.026 seconds

A Mechanism for Securing Digital Evidences of Computer Forensics in Smart Home Environment (스마트홈 환경에서 컴퓨터 포렌식스의 디지털 증거 무결성 보증 메커니즘)

  • Lee, Jong-Sup;Park, Myung-Chan;Jang, Eun-Gyeom;Choi, Yong-Rak;Lee, Bum-Suk
    • The Journal of Information Technology
    • /
    • v.10 no.3
    • /
    • pp.93-120
    • /
    • 2007
  • A Smart Home is a technically expanded from home network that gives us a comfortable life. But still there is a problem such as mal function of devices and intrusions by malicious parties since it is based on home network. The intrusion by malicious parties causes a critical problem to the individual's privacy. Therefore to take legal actions against to the intruders, the intrusion evidence collecting and managing technology are widely researched in the world. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That's why we have to prove the evidence's integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

  • PDF

Deep Learning based violent protest detection system

  • Lee, Yeon-su;Kim, Hyun-chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.3
    • /
    • pp.87-93
    • /
    • 2019
  • In this paper, we propose a real-time drone-based violent protest detection system. Our proposed system uses drones to detect scenes of violent protest in real-time. The important problem is that the victims and violent actions have to be manually searched in videos when the evidence has been collected. Firstly, we focused to solve the limitations of existing collecting evidence devices by using drone to collect evidence live and upload in AWS(Amazon Web Service)[1]. Secondly, we built a Deep Learning based violence detection model from the videos using Yolov3 Feature Pyramid Network for human activity recognition, in order to detect three types of violent action. The built model classifies people with possession of gun, swinging pipe, and violent activity with the accuracy of 92, 91 and 80.5% respectively. This system is expected to significantly save time and human resource of the existing collecting evidence.

On-demand Evidence Collection of Host Infringement based on the Analysis of Severity levels (위험도 분석에 기반한 On-demand 방식의 호스트 침해 증거 자료 수집 방안)

  • Choi, Yoon-Ho;Park, Jong-Ho;Kim, Sang-Kon;Seo, Seung-U;Kang, Yu;Choi, Jin-Gi;Moon, Ho-Gun;Lee, Myung-Su
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.33-34
    • /
    • 2006
  • Computer Forensics is a research area which finds the malicious users by collecting and analyzing the intrusion or infringement evidence of the computer crime. Many research about Computer Forensics has been done. But those research have focussed on how to collect the evidence after receiving the damage reports from computer users or network administrators. This paper describes about collecting the evidence of good quality at the time of infringement occurrence by the malicious user. By calculating Infringement severity of observable and protective hosts and referring to this value, we collect the evidence at the time of infringement occurrence to minimize the information modification of the evidence. We can reduce also the amount of logs that we use to analyze the infringement and can minimize the loss of the evidence.

  • PDF

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

Proposal of AI-based Digital Forensic Evidence Collecting System

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.124-129
    • /
    • 2021
  • As the 4th industrial era is in full swing, the public's interest in related technologies such as artificial intelligence, big data, and block chain is increasing. As artificial intelligence technology is used in various industrial fields, the need for research methods incorporating artificial intelligence technology in related fields is also increasing. Evidence collection among digital forensic investigation techniques is a very important procedure in the investigation process that needs to prove a specific person's suspicions. However, there may be cases in which evidence is damaged due to intentional damage to evidence or other physical reasons, and there is a limit to the collection of evidence in this situation. Therefore, this paper we intends to propose an artificial intelligence-based evidence collection system that analyzes numerous image files reported by citizens in real time to visually check the location, user information, and shooting time of the image files. When this system is applied, it is expected that the evidence expected data collected in real time can be actually used as evidence, and it is also expected that the risk area analysis will be possible through big data analysis.

A Study evidence collection and analysis procedures for smartphone forensic (스마트폰 포렌식을 위한 증거수집 및 분석절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.463-466
    • /
    • 2012
  • Smartphones along with the development of crime evidence has been using smartphones. Phone's internal storage medium can be used as evidence in the case of images, video, phone, GPS information, there are Internet access and other data records. Therefore, these data to collect evidence of a systematic procedure for collecting and analyzing evidence is needed. In this paper, the target mobile phone forensics forensic evidence collection, evidence analysis, and reporting results to the procedures and how to draw. Through this paper, phone forensics and will serve as a basis for the investigation.

  • PDF

A study of the preparation And procedures by Smartphone Mobile Forensic evidence collection and analysis (스마트폰 모바일 포렌식 증거 수집 분석을 위한 준비사항 및 절차 연구)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.269-272
    • /
    • 2011
  • The lawsuit is being made on the smart phone. And recent is getting a lot of evidence for the smart phone data in a court of law. Thus, the evidence of illegal use smartphone for the extraction of data and evidence collection, forensic procedure is a need for research. In this paper, evidence of phone forensic procedure for the extraction of the data suggests. And, by collecting forensic evidence from smartphones ensure the integrity of digital evidence and how to solve the case investigated. With this study, smartphone forensic will be able to contribute to the development.

  • PDF

Use of Web-Based Evidence-based Clinical Practice Guidelines for Patients following Gastrectomy: Effects on Body Temperature, Shivering, Perceived Thermal Comfort, and Satisfaction with Temperature Management (웹기반 체온 관리 근거중심 간호실무 가이드라인이 위절제술 환자의 체온, 전율, 체온 불편감, 체온 관리 만족도에 미치는 효과)

  • Hong, Sung-Jung;Lee, Eunjoo
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.21 no.2
    • /
    • pp.112-122
    • /
    • 2014
  • Purpose: The purpose of this study was to examine the effects on body temperature, shivering, and perceived thermal comfort of web-based evidence-based practice guideline for patients undergoing gastrectomy. Methods: Eighty patients scheduled for gastrectomy were recruited and assigned to the control or experimental group by sequential order. Before collecting data from the experimental group, a systematic educational program on evidence-based guidelines was provided to the nurses as well anesthesiologists. Data were analyzed using t-test and repeated measured ANOVA. Results: The experimental group showed higher body temperature from the induction of anesthesia until four hours after surgery compared to the control group. In addition, the levels of thermal comfort as well as satisfaction with thermal management were significantly higher in the experiment group. Conclusion: Use of evidence-based guidelines was effective in maintaining body temperature, lowering sensitivity to shivering, and promoting perceived thermal comfort. Therefore, adoption of evidence-based interventions in nursing practice is recommended.

Environmental survey on the vectors and hosts of Tsutsugamushi disease in Jeonnam province, Korea (전남지방에서 쯔쯔가무시병 숙주와 매개체의 서식환경 조사)

  • Song, Hyeon-Je
    • Korean Journal of Veterinary Service
    • /
    • v.35 no.3
    • /
    • pp.183-189
    • /
    • 2012
  • Tsutsugamushi disease or scrub typhus cause by Orientia tsutsugamushi is an endemic disease in Korea. Chigger mites and field rodents play roles in transmission of the disease by the vector and host of the agent. The purpose of this study is to investigate the density of the chigger mites and field rodents due to environmental factors such as temperature, relative humidity, soil thickness and the various vegetations to the 9 field rodent collection sites. The total 62 field rodents was captured by the Sherman collapsible traps from April to October 2009 at the Jangseong of Jeonnam Province, Korea. The trapping rate of the field rodents by the different collecting sites was dominant at subside storage water (24%), bush near by dam (22%), bank around field (20%), followed by 18% of grassy field and surround cattle shed. The distribution of chigger mites by the different collecting sites was the highest at Bush near by dam (28.7%). And the sites of subside storage water, bank around field and surround cattle shed were 20.4%, 18.8%, 16.4%, respectively. On the other hand the collecting sites of stream bank and ridges between rice paddies were not collected. The temperature to the collecting sites was showed $24.1^{\circ}C$ in June and $24.2^{\circ}C$ in October which was higher than April ($10.6^{\circ}C$), whereas lower than May ($25.3^{\circ}C$) and September ($26.8^{\circ}C$). The highest number of mites was collected at $24.2^{\circ}C$ and 46.6% relative humidity in October. The chigger mites and field rodents were highly collected between 18 and 24% at the sites where are loosely in the superficial layers of the soil from 8.0 cm to 10.2 cm. Total 25 species of vegetation were distributed at the collecting sites. In the present study, strong evidence was found that bank around field and grassy field were provided for the prevalence sites of tsutsugamushi disease.

A Study on Digital Evidence Collection System in Cyberspace (사이버 공간 내 디지털 증거 수집 시스템에 관한 연구)

  • Jeong, Hyojeong;Choi, Jong-hyun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.869-878
    • /
    • 2018
  • Digital Evidence Data in cyberspace is easy to modify or delete, and changes are reflected in real time, so it is necessary to acquire evidence data quickly. Collecting evidence on the client side is advantageous in that data can be acquired without time delay due to additional administrative procedures, but collection of large data is likewise vulnerable to collection time delay problem. Therefore, this paper proposes an automated evidence collection method on the client side, focusing on the major web-based services in cyberspace, and enables efficient evidence collection for large volumes of data. Furthermore, we propose a digital evidence collection system in cyberspace that guarantees the integrity of the collected digital evidence until the court submission.