TY - GEN
T1 - Methods and Tools for Investigating Attacks - Memory Forensics
AU - Peng, Lixun
AU - Mogos, Gabriela
N1 - Publisher Copyright:
© 2022 ACM.
PY - 2022/9/23
Y1 - 2022/9/23
N2 - The memory of network attack and the reclusion of network crime make part of the key digital evidence only exist in physical memory or temporarily stored in the page exchange file, which makes the traditional file system-based computer forensics can not effectively deal with. Memory forensics as important supplement of traditional file system, is an important part of computer forensics science, through comprehensive access to memory data memory data, detailed analysis, based on the extraction and attack or network crime related to digital evidence, in recent years, sustained attention, memory forensics has won the security community obtained rapid development and wide application, in the network emergency response and network crime investigation play an irreplaceable role. We motivate this research from the perspective of the key points and core elements involved in memory forensics analysis. This paper presents a comprehensive theoretical exposition and framework analysis on memory forensics, combined with the practice of specific tools.
AB - The memory of network attack and the reclusion of network crime make part of the key digital evidence only exist in physical memory or temporarily stored in the page exchange file, which makes the traditional file system-based computer forensics can not effectively deal with. Memory forensics as important supplement of traditional file system, is an important part of computer forensics science, through comprehensive access to memory data memory data, detailed analysis, based on the extraction and attack or network crime related to digital evidence, in recent years, sustained attention, memory forensics has won the security community obtained rapid development and wide application, in the network emergency response and network crime investigation play an irreplaceable role. We motivate this research from the perspective of the key points and core elements involved in memory forensics analysis. This paper presents a comprehensive theoretical exposition and framework analysis on memory forensics, combined with the practice of specific tools.
KW - attacks
KW - digital forensics
KW - memory forensics
KW - prevention
KW - threats
UR - http://www.scopus.com/inward/record.url?scp=85145873979&partnerID=8YFLogxK
U2 - 10.1145/3565291.3565342
DO - 10.1145/3565291.3565342
M3 - Conference Proceeding
AN - SCOPUS:85145873979
T3 - ACM International Conference Proceeding Series
SP - 314
EP - 319
BT - ICBDT 2022 - 2022 5th International Conference on Big Data Technologies
PB - Association for Computing Machinery
T2 - 5th International Conference on Big Data Technologies, ICBDT 2022
Y2 - 23 September 2022 through 25 September 2022
ER -