首页> 外文会议>International Workshop on Systematic Approaches to Digital Forensic Engineering >Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution
【24h】

Challenge Paper: Validation of Forensic Techniques for Criminal Prosecution

机译:挑战论文:验证刑事检控的法医技术

获取原文

摘要

As in many domains, there is increasing agreement in the user and research community that digital forensics analysts would benefit from the extension, development and application of advanced techniques in performing large scale and heterogeneous data analysis. Modem digital forensics analysis of cyber-crimes and cyber-enabled crimes often requires scrutiny of massive amounts of data. For example, a case involving network compromise across multiple enterprises might require forensic analysis of numerous sets of network logs and computer hard drives, potentially involving 100's of gigabytes of heterogeneous data, or even terabytes or petabytes of data. Also, the goal for forensic analysis is to not only determine whether the illicit activity being considered is taking place, but also to identify the source of the activity and the full extent of the compromise or impact on the local network. Even after this analysis, there remains the challenge of using the results in subsequent criminal and civil processes. Given this enormous volume of data, new tools and techniques are needed in order to analyze and resolve this data in the form of a forensic analysis. Currently, much digital data goes completely unanalyzed due to the time requirements imposed by their analysis. Thus, many researchers are exploring novel techniques for the analysis of digital data to more efficiently and effectively understand the extent of cyber-crimes and cyber-enabled crimes. In addition to the analysis of the digital data itself, there is an equally pressing issue as to whether or not the techniques being developed are incorporating the capabilities needed for the application to criminal and civil processes. For instance, is the analysis process reproducible, demonstrable, and validatable? Is the analysis process following accepted forensic analysis requirements? When presented in court, will opposing council be able to successfully attack the credibility of the presented material, and the foundation for the evidence's construction, or will these materials pass muster of acceptability?
机译:与许多域名一样,用户和研究社区在越来越多的协议中,数字取证分析师将从进行大规模和异构数据分析的高级技术的扩展,开发和应用中受益。调制解调器的数字取证对网络犯罪和网络犯罪的分析通常需要仔细审查大量数据。例如,涉及跨多个企业的网络妥协的案例可能需要对许多网络日志和计算机硬盘驱动器的取证分析,可能涉及100次千兆字节的异构数据,甚至是数据特征或数据特征。此外,法医分析的目标是不仅确定所考虑的非法活动是否正在发生,而且还要识别活动的来源以及对本地网络的妥协或影响的全部范围。即使在这个分析之后,仍然存在在随后的刑事和民事进程中使用结果的挑战。鉴于这种巨大的数据量,需要新的工具和技术,以便以法医分析的形式分析和解决此数据。目前,由于分析所施加的时间要求,许多数字数据完全不明显。因此,许多研究人员正在探索用于分析数字数据的新技术,以更有效地,有效地了解网络犯罪和网络犯罪的程度。除了对数字数据本身的分析外,还有一个同样紧迫的问题,以及正在开发的技术是否正在包含刑事和民事过程所需的能力。例如,分析过程是可重复的,可观的,可验证的吗?分析过程是否接受了法医分析要求?在法庭上提交时,反对委员会将能够成功地攻击所提出的物质的可信度,以及证据的建设的基础,或者这些材料将通过可接受性的融资吗?

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号