Abstract
The memory of network attack and the reclusion of network crime make part of the key digital evidence only exist in physical memory or temporarily stored in the page exchange file, which makes the traditional file system-based computer forensics can not effectively deal with. Memory forensics as important supplement of traditional file system, is an important part of computer forensics science, through comprehensive access to memory data memory data, detailed analysis, based on the extraction and attack or network crime related to digital evidence, in recent years, sustained attention, memory forensics has won the security community obtained rapid development and wide application, in the network emergency response and network crime investigation play an irreplaceable role. We motivate this research from the perspective of the key points and core elements involved in memory forensics analysis. This paper presents a comprehensive theoretical exposition and framework analysis on memory forensics, combined with the practice of specific tools.
| Original language | English |
|---|---|
| Title of host publication | ICBDT 2022 - 2022 5th International Conference on Big Data Technologies |
| Publisher | Association for Computing Machinery |
| Pages | 314-319 |
| Number of pages | 6 |
| ISBN (Electronic) | 9781450396875 |
| DOIs | |
| Publication status | Published - 23 Sept 2022 |
| Event | 5th International Conference on Big Data Technologies, ICBDT 2022 - Virtual, Online, China Duration: 23 Sept 2022 → 25 Sept 2022 |
Publication series
| Name | ACM International Conference Proceeding Series |
|---|
Conference
| Conference | 5th International Conference on Big Data Technologies, ICBDT 2022 |
|---|---|
| Country/Territory | China |
| City | Virtual, Online |
| Period | 23/09/22 → 25/09/22 |
UN SDGs
This output contributes to the following UN Sustainable Development Goals (SDGs)
-
SDG 16 Peace, Justice and Strong Institutions
Keywords
- attacks
- digital forensics
- memory forensics
- prevention
- threats
Fingerprint
Dive into the research topics of 'Methods and Tools for Investigating Attacks - Memory Forensics'. Together they form a unique fingerprint.Cite this
- APA
- Author
- BIBTEX
- Harvard
- Standard
- RIS
- Vancouver