Design and Implementation of A Live-Analysis Digital Forensic System
Design and Implementation of A Live-Analysis Digital Forensic System
ABSTRACT the investigator inquiring into computer crime must have the
As the popularity of the internet continues growing, not only aid of the computer forensics knowledge and technology in
change our life, but also change the way of crime. Number of the computer forensic field.
crime by computer as tools, place or target, cases of such Digital evidence is not physically and it was storage on the
offenders increases these days, fact to the crime of computer media. It has the following characteristics [4]: (1) easily to
case traditional investigators have been unable to complete copy or modify, (2) difficult to confirm the source and
the admissibility of evidence. To solve this problem, we must integrity, (3) cannot directly to understand its contents, etc.
collect the evidence by digital forensics tools and analysis During an investigation, the procedures must according to
the digital data, or recover the damaged data. the International Organization of Computer Evidence
In this research, we use the open source digital forensics proposed The Good Practice Guide for Computer-Based
tools base on Linux and want to make sure the stability of Evidence in order to have legal effect of digital evidence in
software then prove the evidence what we have. To avoid the 1999 [8].
data loss due to the shutdown of machines, we use the Live-
analysis to collect data and design the Live DVD/USB to
make image file and analysis the image. We use the MD5 2. RELATED WORKS
and SHA-1 code to identity the file before the final report In this paper focus on the digital evidence collect and recover
and ensure the reliability of forensic evidence on court. from electronic media, and accented the identity of source of
evidences. The following we will describe the details of the
digital forensic.
Keywords
Digital Forensics, Digital Evidences, Live-analysis, Live 2.1. Digital Forensics
DVD/USB
Digital forensics is the science of obtaining, preserving and
documenting evidence from electronic media, such as tablet
1. INTRODUCTION PC, server, digital camera, PDA, fax machine, iPod, smart
Internet is the most popular application in modern society. It phone and various memory storage devices [17].
brings a lot of convenience of communication to human. On
the other hand, due to its rapid development, lacking of Generally, the purpose for digital forensic is designed to
proper regulations, Internet happened to be crime breeding. investigate the evidence and it applications include computer
The most serious problem of Internet is Cybercrime. intrusion, unauthorized access, child pornography, etc.
January-June 2008 of crimes of computer in Taiwan Fundamentals of Computer Forensics analysis process as
published by National Police Agency [12], Ministry of The falling into three distinct areas acquisition, analysis and
Interior, 4,981 of Internet Fraud, 2,023 of Infringement of Presentation [2]. The list below briefs those procedures:
Computer Usage, 1,871 of Prevention and Punishment of Acquisition Phase: This phase is focus on the obtaining the
Sex-Trade Act, 1,340 of Copyright Act and 1,131of states of systems that have storage devices and all the digital
Obscenity, that show the seriousness of computer crimes. data for later analysis. We usually used the forensic tools to
But that have extremely distinct difference between in image the disk.
computer criminal offense and traditional crime action, so
Analysis phase: Identification of the evidences we have
collected, which include file types, contexts of directory and
rescue data for find the related between evidence and
incident.
Presentation Phase: Documentation of analyze of data for
assist the prosecutors to reference.
At present, the mining and analysis of evidence can not be Encase FTK TSK
completed manually. We must depend on the forensics tools techniques
such as EnCase and Forensic Toolkit (FTK) [7]. Most of such as file
them are commercial software. It is expensive for the small contest,
enterprises or individual. keyword,
metadata,
In this research, we used the open source tools to design and
etc.
implement our system.
No
Using Live
DVD/USB to run
Shutdown
the Dead-analysis.
Imaged disk
Analysis
Report
4. IMPLEMENTATION
6. CONCLUSIONS
In recent years, there are more and more cases of computer
Figure 5. AIR
crime, the term hacking is no longer news. Therefore, the
Figure 5 shows the AIR to make an image file while investigator how to collect any information of computer after
computing and identifying of the MD5 value. an incident is becoming an important issue. The mostly of
the digital forensics software are commercial version, cost is
so high, and just support English version which obstacle to
use.
In this paper, this study is based on the open source software
to reduce cost and we revised autopsy’s graphic interface
into the Traditional Chinese. We created a Live DVD/USB
for analyzing Microsoft and Unix/Linux file systems (Dead
analysis). Additionally, we collected the volatile information
of system by using Live-analysis, which avoid lost the data
due to showdown of machine.
7. ACKNOWLEDGMENTS
This work was supported in part by research grants (NSC 98-
2221-E-017-010-MY3) from the National Science Council of
Taiwan.