We apologize for a recent technical issue with our email system, which temporarily affected account activations. Accounts have now been activated. Authors may proceed with paper submissions. PhDFocusTM
CFP last date
20 December 2024
Reseach Article

Obfuscating Live Computer Forensic Investigative Process on a Windows 7 Operating System: A Criminal's Perspective

by Dinesh Mothi
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 122 - Number 6
Year of Publication: 2015
Authors: Dinesh Mothi
10.5120/21701-4814

Dinesh Mothi . Obfuscating Live Computer Forensic Investigative Process on a Windows 7 Operating System: A Criminal's Perspective. International Journal of Computer Applications. 122, 6 ( July 2015), 1-7. DOI=10.5120/21701-4814

@article{ 10.5120/21701-4814,
author = { Dinesh Mothi },
title = { Obfuscating Live Computer Forensic Investigative Process on a Windows 7 Operating System: A Criminal's Perspective },
journal = { International Journal of Computer Applications },
issue_date = { July 2015 },
volume = { 122 },
number = { 6 },
month = { July },
year = { 2015 },
issn = { 0975-8887 },
pages = { 1-7 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume122/number6/21701-4814/ },
doi = { 10.5120/21701-4814 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T23:09:49.899845+05:30
%A Dinesh Mothi
%T Obfuscating Live Computer Forensic Investigative Process on a Windows 7 Operating System: A Criminal's Perspective
%J International Journal of Computer Applications
%@ 0975-8887
%V 122
%N 6
%P 1-7
%D 2015
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Live forensic investigation is conducted when the computer system is turned on whilst the data is gathered in a forensically sound manner, from the physical memory, in the form of evidence. As time progressed, criminals have been developing methodologies by which live analysis could be defeated. One such method implemented by the criminals is that of a rookit being installed on the victim's machine. A rookit can be dangerous, and very risky to deal with from an investigator's point of view, because it has the power to subvert the kernel of an operating system. This paper presents, how easy it is for a criminal to thwart the process of live forensic investigation by downloading and installing free software tools; needing, no prior knowledge of the windows 7 operating system's kernel, and how frustrating it would be for the investigator to examine the computer system and make a valid forensic report. Thus, making live analysis a daunting task for the forensic investigator on field. Finally, a mathematical formula is derived for detecting the presence of hidden processes in the memory.

References
  1. Thomas Sudkamp (1986), Inference propagation in emitter, system hierarchies, Proceedings of the ACM SIGART International Symposium on Methodologies for Intelligent Systems, ACM Press New York, NY, USA, pp 165-173
  2. Amihai Motro, Philipp Anokhin and Aybar C. Acar (2004), 'Utility-based Resolution of Data Inconsistencies Information Quality in Informational Systems', Proceedings of the 2004 international workshop on Information quality in information systems, ACM Press New York, NY, USA, pp 35-43.
  3. Brian D. Carrier 2006, 'Risks of Live Digital Forensic Analysis', Communications of the ACM, Vol. 49, No. 2, pp. 56-61.
  4. Pei-Hua Yen, Chung-Huang Yang, Tae-Nam Ahn (2009), 'Design and Implementation of a Live-analysis Digital Forensic System', International Conference on Convergence and Hybrid Information Technology, Proc. ACM, pp. 239-243.
  5. John G. Levine, Julian B. Grizzard and Henry L. Owen (2006), 'Detecting and Categorizing Kernel-Level Rootkits to Aid Future Detection'. In IEEE Security and Privacy, Proc. ACM pp 24-25.
  6. Iain Sutherland , Jon Evans , Theodore Tryfonas , Andrew Blyth (2008), 'Acquiring volatile operating system data tools and techniques, ACM SIGOPS Operating Systems Review, v. 42 n. 3, pp. 65-73.
  7. Luka Milkovic (2012) 'Defeating Windows Memory Forensics', INFIGO Information Security, Available at: http://www. youtube. com/watch?v=RPVmLhP7K6U (Accessed 18th January 2013)
  8. S. Mocas (2003) 'Building Theoretical Underpinnings for Digital Forensics Research', Portland State University, Digital Investigations, pp. 1-10.
  9. D. Dittrich (2002) 'Root Kits and Hiding Files/Directories/ Processes after a Break-In', Available at: http://staff. washington. edu/dittrich/misc/faqs/rootkits. faq. (Accessed 5th August 2011)
  10. B. Carrier (2009) 'The Sleuth Kit and Autopsy', Available at: http://www. sleuthkit. org/autopsy/desc. php (Accessed 18th August 2011)
  11. B. Westbrook and B. Zornado (2001), Proposal for electronic records management task force, Available at: http://www. uclibraries. net/sopag/erm/ERMTFReport. pdf (Accessed 27th September 2011)
  12. C. Pogue, C. Altheide and T. Haverkos (2008), UNIX and Linux Forensic Analysis DVD Toolkit, Syngress Publishing.
  13. F. Adelstein (2006), Live forensics: diagnosing your system without killing it first, Communications of the ACM, Vol. 49, No. 2, pp. 63-66.
  14. Harlan Carvey (2005), 'Windows Forensics and Incident Recovery', Addison Wesley, Burlington.
  15. Bill Blunden (2009), The Rootkit Arsenal: Escape and Evasion, Jones and Bartlett Learning, Texas.
  16. Kevin Mandia, Chris Prosise, and Matt Pepe (2003), 'Incident Response and Computer Forensics', McGraw-Hill Osborne Media, 2 edition.
  17. Information Security and Forensics Society (ISFS) (2004), Computer Forensics, Part 2: Best Practices, Available at: http://www. isfs. org. hk/publications/ComputerForensics/ComputerForensics_part2. pdf (Accessed 21th August 2011)
  18. Steve Anson and Steve Bunting. 2007 Mastering Windows Network Forensics and Investigation. Wiley Publishing Inc.
  19. Internet Engineering Task Force, url: https://www. ietf. org/rfc/rfc3227. txt
  20. Microsoft, url: http://www. microsoft. com/en-us/windows
Index Terms

Computer Science
Information Sciences

Keywords

Anti-Forensics Digital Forensics Computer Forensics Memory Forensics Live Response.