Live Memory Forensic Analysis
Live Memory Forensic Analysis
Volume: 3 Issue: 5
ISSN: 2321-8169
2775 - 2778
_______________________________________________________________________________________________
Aditya Sinha
Abstract - The live memory image acquired in live forensics is always view in terms of integrity and reliability when presented as evidence. In
this work, I describe how evidence like live memory obtained from physical memory image (RAM) and trustworthiness of evidence is studied.
The evidence in live memory image can be taken as how accurately the memory image of RAM shows the real memory of the target machine.
Based on a live memory analysis, investigator can test memory acquisition tool and after that live memory image is analyzed. Then, I describe
the part of live memory analysis in the digital cyber forensics process and its use to address many challenges of the digital forensic investigation.
In this work, I provide a method to overcome these problems. I highlight at some of the existing methods to live memory analysis. This work is
done using acquisition and analysis tools.
Keywords - Computer Forensic, Physical Memory Forensic, Live Memory Analysis
__________________________________________________*****_________________________________________________
I.
INTRODUCTION
_______________________________________________________________________________________
ISSN: 2321-8169
2775 - 2778
_______________________________________________________________________________________________
c) Redline
d) Microsoft crash dump
II.
RESEARCH METHOLOGY
III.
PROPOSED METHOD
_______________________________________________________________________________________
ISSN: 2321-8169
2775 - 2778
_______________________________________________________________________________________________
f) Drivers
3) Scan for Outliers
a) Unlinked Processes, DLLs, sockets and
threads
b) Unmapped pages with execute privileges
In proposed method, there are various steps to collect live
memory image from running device. With this method,
investigator can make sure that he/she will get raw image of
live memory at every time stamp and stored in database. So,
this database is used later to analyze live memory and also
used to collect evidence of wrong doing which can be used to
present in law of court.
2777
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________
ISSN: 2321-8169
2775 - 2778
_______________________________________________________________________________________________
So I am looking forward to implement algorithm for given
solution.
REFERENCES
AAron Walters, Nick L. Patroni, Jr., Integrating Volatile Memory
Forensics into the Digital Investigation Process
[2] Lianfu Yin, Research on Windows Physical Memory Forensic
Analysis, 2012 Fourth International Symposium on Information
Science and Engineering
[3] Sarmoria CG, Chapin SJ. Monitoring access to shared memory
mappedfiles. Digital Forensic Research Workshop (DFRWS),2005
[4] Liming Cai, Jing Sha, Wei Qian,Study on Forensic Analysis of Physical
Memory, 2nd International Symposium on Computer, Communication,
Control and Automation (3CA 2013)
[5] Lianhai Wang, Ruichao Zhang, Shuhui Zhang,A Model of Computer
Live Forensics Based on Physical Memory Analysis, The 1st
International Conference on Information Science and Engineering
(ICISE2009)
[6] AmerAljaedi, Dale Lindskog, PavolZavarsky, Ron Ruhl, Fares
Almari,Comparative Analysis of Volatile Memory Forensics - Live
Response vs. Memory Imaging, 2011 IEEE International Conference on
Privacy, Security, Risk, and Trust, and IEEE International Conference
on Social Computing
[7] Gabriela Limon Garcia, Forensic physical memory analysis: an
overview of tools and techniques
[8] GCFA Gold Certification, Techniques and Tools for Recovering and
Analyzing Data from Volatile Memory
[9] Guidance
Software.
EnCase
forensic.
Retrievedfrom:http://www.guidancesoftware.com/products/ef_index.asp.
[10] Microsoft Corporation. Windows Hardware Developer Central. Memory
Management: What Every Driver Writer Needs to Know. Retrieved
from:
http://www.microsoft.com/whdc/driver/kernel/memmgmt.mspxFebruary 2005. On January, 2009.
[11] https://www.blackhat.com/presentations/bh-dc-07/Walters/paper/bh-dc07-Walters-WP.pdf
[1]
CONCLUSION
2778
IJRITCC | May 2015, Available @ http://www.ijritcc.org
_______________________________________________________________________________________