Open Access. Powered by Scholars. Published by Universities.®

Physical Sciences and Mathematics Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 16 of 16

Full-Text Articles in Physical Sciences and Mathematics

Towards An Automated Forensic Examiner (Afe) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, S M. Furnell Dec 2013

Towards An Automated Forensic Examiner (Afe) Based Upon Criminal Profiling & Artificial Intelligence, M Al Fahdi, N L. Clarke, S M. Furnell

Australian Digital Forensics Conference

Digital forensics plays an increasingly important role within society as the approach to the identification of criminal and cybercriminal activities. It is however widely known that a combination of the time taken to undertake a forensic investigation, the volume of data to be analysed and the number of cases to be processed are all significantly increasing resulting in an ever growing backlog of investigations and mounting costs. Automation approaches have already been widely adopted within digital forensic processes to speed up the identification of relevant evidence – hashing for notable files, file signature analysis and data carving to name a …


Acquisition Of Evidence From Network Intrusion Detection Systems, Brian Cusack, Muteb Alqahtani Dec 2013

Acquisition Of Evidence From Network Intrusion Detection Systems, Brian Cusack, Muteb Alqahtani

Australian Digital Forensics Conference

The literature reviewed suggests that Network Intrusion Systems (NIDS) are valuable tools for the detection of malicious behaviour in network environments. NIDS provide alerts and the trigger for rapid responses to attacks. Our previous research had shown that NIDS performance in wireless networks had a wide variation under different workloads. In this research we chose wired networks and asked the question: What is the evidential value of NIDS? Three different NIDS were tested under two different attacks and with six different packet rates. The results were alarming. As the work loading increased the NIDS detection capability fell rapidly and as …


Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis, Maxim Chernyshev Dec 2013

Verification Of Primitive Sub Ghz Rf Replay Attack Techniques Based On Visual Signal Analysis, Maxim Chernyshev

Australian Digital Forensics Conference

As the low cost options for radio traffic capture, analysis and transmission are becoming available, some security researchers have developed open source tools that potentially make it easier to assess the security of the devices that rely on radio communications without the need for extensive knowledge and understanding of the associated concepts. Recent research in this area suggests that primitive visual analysis techniques may be applied to decode selected radio signals successfully. This study builds upon the previous research in the area of sub GHz radio communications and aims to outline the associated methodology as well as verify some of …


Steganographic Checks In Digital Forensic Investigation: A Social Networking Case, Brian Cusack, Aimie Chee Dec 2013

Steganographic Checks In Digital Forensic Investigation: A Social Networking Case, Brian Cusack, Aimie Chee

Australian Digital Forensics Conference

Steganography is an ancient art that has received a mega boost in the digital age. Electronic communications are easily accessible by most people and have a wide range of opportunities to embed secret messages in a diverse range of cover objects. Our research questions were: What can an investigator do to check for hidden messages in social media? And, how much searching is enough? The testing was conducted in replicated social networking sites and digital images were selected as the cover objects. The research findings showed that steganography is as easy as sending an email and not much more difficult …


A Forensic Analysis And Comparison Of Solid State Drive Data Retention With Trim Enabled File Systems, Alastair Nisbet, Scott Lawrence, Matthew Ruff Dec 2013

A Forensic Analysis And Comparison Of Solid State Drive Data Retention With Trim Enabled File Systems, Alastair Nisbet, Scott Lawrence, Matthew Ruff

Australian Digital Forensics Conference

Solid State Drives offer significant advantages over traditional hard disk drives. No moving parts, superior resistance to shock, reduced heat generation and increased battery life for laptops. However, they are susceptible to cell failure within the chips. To counter this, wear levelling is used so that cells are utilised for data at approximately the same rate. An improvement to the original wear levelling routine is TRIM, which further enhances the lifetime of the cells by allowing the garbage collection process as one operation rather than an on going process. The advantages of TRIM for the user is that it increases …


An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, Yunhan Jiang Dec 2013

An Investigation Into The Efficiency Of Forensic Data Erasure Tools For Removable Usb Flash Memory Storage Devices, Krishnun Sansurooah, Haydon Hope, Hani Almutairi, Fayadh Alnazawi, Yunhan Jiang

Australian Digital Forensics Conference

Securely erasing data is of key importance to anyone that is concerned with the security of their sensitive information, whether an individual or an organization. Simply deleting the data in question or formatting the storage device is not enough to ensure that the data cannot be recovered. Furthermore, with the uptake of Universal Serial Bus drives (USBs) flash memory based storage devices have replaced previous portable secondary storage media. Therefore, it is of a major concern whether these tools and products developed for securely erasing data secondary storage Hard Disk Drives (HDDs) would be as efficient when targeting the USB …


Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell Dec 2013

Volatile Memory Acquisition Tools – A Comparison Across Taint And Correctness, William Campbell

Australian Digital Forensics Conference

The growth in volatile memory forensics has steadily increased in recent times. With this growth comes a need to test the tools associated with this practise. Although there appears to be a large amount of effort in testing static memory capture tools, there is perhaps less so for volatile memory capture. This paper describes the attempts at categorizing criteria for testing, and then introduces and extends upon a methodology proposed by Lempereur and colleagues in 2012. Four tools (Windows Memory Reader, WinPmem, FTK Imager and DumpIt) are tested against two criteria (impact and completeness). WMR and DumpIt were found to …


Security Of Internet Protocol Cameras – A Case Example, William Campbell Dec 2013

Security Of Internet Protocol Cameras – A Case Example, William Campbell

Australian Digital Forensics Conference

The interaction of consumer devices and the internet, especially in relation to security, has always been tenuous. Where it is in the best interests of companies to produce products that are cheap and accessible, these traits often go against that of security. This investigation undertakes an analysis of one such device – the DCS 930L internet protocol camera from D Link. This camera is analysed for vulnerabilities, with an emphasis on those relating to authentication mechanisms. Several vulnerabilities are identified, and potential attacks based on these are discussed. Solutions or mitigations to these vulnerabilities are presented.


Including Network Routers In Forensic Investigation, Brian Cusack, Raymond Lutui Dec 2013

Including Network Routers In Forensic Investigation, Brian Cusack, Raymond Lutui

Australian Digital Forensics Conference

Network forensics concerns the identification and preservation of evidence from an event that has occurred or is likely to occur. The scope of network forensics encompasses the networks, systems and devices associated with the physical and human networks. In this paper we are assessing the forensic potential of a router in investigations. A single router is taken as a case study and analysed to determine its forensic value from both static and live investigation perspectives. In the live investigation, tests using steps from two to seven routers were used to establish benchmark expectations for network variations. We find that the …


Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones, Andri P. Heriyanto Dec 2013

Procedures And Tools For Acquisition And Analysis Of Volatile Memory On Android Smartphones, Andri P. Heriyanto

Australian Digital Forensics Conference

Mobile phone forensics have become more prominent since mobile phones have become ubiquitous both for personal and business practice. Android smartphones show tremendous growth in the global market share. Many researchers and works show the procedures and techniques for the acquisition andanalysisthe non volatile memory inmobile phones. On the other hand, the physical memory (RAM) on the smartphone might retain incriminating evidence that could be acquired and analysed by the examiner. This study reveals the proper procedure for acquiring the volatile memory inthe Android smartphone and discusses the use of Linux Memory Extraction (LiME) for dumping the volatile memory. The …


Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim Dec 2013

Security Analysis And Forensic Investigation Of Home & Commercial Alarm Systemsin New Zealand: Current Research Findings, Alastair Nisbet, Maria Kim

Australian Digital Forensics Conference

Alarm systems with keypads, sensors and sirens protect our homes and commercial premises from intruders. The reliability of these systems has improved over the past years but the technology has remained largely as it was 3 decades ago. With simple keypads and generally 4 digit PIN codes used for setting and unsetting the alarms, the main protection against a determined intruder is the necessity to choose robust PIN codes. However, with PIN codes chosen that are generally easy to remember and therefore relatively easy to guess, or numbers chosen to follow a pattern on the keypad, the main protection from …


Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, Kiyotsugu Sato Dec 2013

Robust Watermarking Method By Systematic Block Diffusion Using Discrete Cosine Transform, Kazuo Ohzeki, Kazutaka Bannai, Yutaka Hirakawa, Kiyotsugu Sato

Australian Digital Forensics Conference

Digital watermarks have long been considered as a security feature. A watermarking method that involves the diffusion of limited watermark information into a large part of an image’s data has high robustness. The diffused information is summed up to a single component before detecting the watermark. The summing up process eliminates small noises by an averaging effect, which improves the robustness of the embedded watermark against attack. In this field, thus far, only an asymmetrical Chirp transformation with a small block size has been attempted. In this study, a new verification experiment for a large block size of 256 × …


Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood Dec 2013

Identifying Bugs In Digital Forensic Tools, Brian Cusack, Alain Homewood

Australian Digital Forensics Conference

Bugs can be found in all code and the consequences are usually managed through upgrade releases, patches, and restarting operating systems and applications. However, in mission critical systems complete fall over systems are built to assure service continuity. In our research we asked the question, what are the professional risks of bugs in digital forensic tools? Our investigation reviewed three high use professional proprietary digital forensic tools, one in which we identified six bugs and evaluated these bug in terms of potential impacts on an investigator’s work. The findings show that yes major brand name digital forensic tools have software …


Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy Dec 2013

Forensic Memory Dump Analysis And Recovery Of The Artefacts Of Using Tor Bundle Browser – The Need, Divya Dayalamurthy

Australian Digital Forensics Conference

The Onion Routing (TOR) project is a network of virtual tunnels that facilitates secure, private communications on the internet. A recent article published in “The Registry” claims that TOR bundle browser usage has increased in recent years; statistics show that in January 2012, there were approximately 950,000 users globally and now in August 2013 that figure is estimated to have reached 1,200,000 users. The report also illustrates that The United states of America and the United Kingdom are major contributors towards the massive increase in TOR usage. Similarly, other countries like India and Brazil have increased usage to 32,000 and …


Patterns And Patter - An Investigation Into Ssh Activity Using Kippo Honeypots, Craig Valli, Priya Rabadia, Andrew Woodward Jan 2013

Patterns And Patter - An Investigation Into Ssh Activity Using Kippo Honeypots, Craig Valli, Priya Rabadia, Andrew Woodward

Australian Digital Forensics Conference

This is an investigation of the activity detected on three honeypots that utilise the Kippo SSH honeypot system on VPS servers all on the same C class address. The systems ran on identical software bases and hardware configurations. The results are over the period 21st March 2013 until Tuesday 04 June 2013. The initial analysis covered in this paper examines behaviours and patterns detected of the attacking entities. The attack patterns were not consistent and there was large disparity in numbers and magnitude of attacks on all hosts. Some of these issues are explored in the paper.


Sellers Continue To Give Away Confidential Information On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Nikki Robins, Krishnun Sansurooah Jan 2013

Sellers Continue To Give Away Confidential Information On Second Hand Memory Cards Sold In Australia, Patryk Szewczyk, Nikki Robins, Krishnun Sansurooah

Australian Digital Forensics Conference

Second hand storage devices can be treasure troves of confidential data. This study investigated the remnant data on second hand memory cards that were purchased through Australian second hand auction websites throughout 2013. Memory cards continue to increase in capacity and are used in both smart phones and tablet computers as persistent storage. During this study a total of 140 second hand memory cards were purchased throughout 2013. Each memory card had its data recovered and subsequently analysed. The results show that sellers are sending memory cards with no evidence of erasure; poor attempts to erase data; or simply asking …