Vis enkel innførsel

dc.contributor.authorKarresand, Nils Martin Mikael
dc.contributor.authorWarnqvist, Asalena
dc.contributor.authorLindahl, David
dc.contributor.authorAxelsson, Stefan
dc.contributor.authorDyrkolbotn, Geir Olav
dc.date.accessioned2019-12-04T12:44:00Z
dc.date.available2019-12-04T12:44:00Z
dc.date.created2019-09-30T12:53:05Z
dc.date.issued2019
dc.identifier.citationIFIP Advances in Information and Communication Technology. 2019, 569 133-158.nb_NO
dc.identifier.issn1868-4238
dc.identifier.urihttp://hdl.handle.net/11250/2631764
dc.description.abstractDigital forensics and, especially, file carving are burdened by the large amounts of data that need to be processed. Attempts to solve this problem include efficient carving algorithms, parallel processing in the cloud and data reduction by filtering uninteresting files. This research addresses the problem by searching for data where it is more likely to be found. This is accomplished by creating a probability map for finding unique data at various logical block addressing positions in storage media. SHA-1 hashes of 512 B sectors are used to represent the data. The results, which are based on a collection of 30 NTFS partitions from computers running Microsoft Windows 7 and later versions, reveal that the mean probability of finding unique hash values at different logical block addressing positions vary between 12% to 41% in an NTFS partition. The probability map can be used by a forensic analyst to prioritize relevant areas in storage media without the need for a working filesystem. It can also be used to increase the efficiency of hash-based carving by dynamically changing the random sampling frequency. The approach contributes to digital forensic processes by enabling them to focus on interesting regions in storage media, increasing the probability of obtaining relevant results faster.nb_NO
dc.language.isoengnb_NO
dc.publisherSpringer Verlagnb_NO
dc.titleCreating a map of user data in NTFS to improve file carvingnb_NO
dc.typeJournal articlenb_NO
dc.typePeer reviewednb_NO
dc.description.versionacceptedVersionnb_NO
dc.source.pagenumber133-158nb_NO
dc.source.volume569nb_NO
dc.source.journalIFIP Advances in Information and Communication Technologynb_NO
dc.identifier.doi10.1007/978-3-030-28752-8_8
dc.identifier.cristin1731383
dc.relation.projectNorges forskningsråd: ArsForensica 248094nb_NO
dc.description.localcodeThis is a post-peer-review, pre-copyedit version of an article published in [IFIP Advances in Information and Communication Technology] Locked until 7.8.2020 due to copyright restrictions. The final authenticated version is available online at: https://doi.org/10.1007/978-3-030-28752-8_8nb_NO
cristin.unitcode194,63,30,0
cristin.unitnameInstitutt for informasjonssikkerhet og kommunikasjonsteknologi
cristin.ispublishedtrue
cristin.fulltextpostprint
cristin.qualitycode1


Tilhørende fil(er)

Thumbnail

Denne innførselen finnes i følgende samling(er)

Vis enkel innførsel