Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage
<p class="MsoNormal" style="margin: 0cm 0cm 0pt; line-height: 200%;"><span style="mso-ansi-language: EN-US;" lang="EN-US"><span style="font-size: small;"><span style="font-family: Times New Roman;">Based on existing...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Association of Digital Forensics, Security and Law
2010-03-01
|
Series: | Journal of Digital Forensics, Security and Law |
Online Access: | http://ojs.jdfsl.org/index.php/jdfsl/article/view/1 |
_version_ | 1828395143655325696 |
---|---|
author | Aleksander Byrski Wojciech Stryjewski Bartłomiej Czechowicz |
author_facet | Aleksander Byrski Wojciech Stryjewski Bartłomiej Czechowicz |
author_sort | Aleksander Byrski |
collection | DOAJ |
description | <p class="MsoNormal" style="margin: 0cm 0cm 0pt; line-height: 200%;"><span style="mso-ansi-language: EN-US;" lang="EN-US"><span style="font-size: small;"><span style="font-family: Times New Roman;">Based on existing software aimed at investigation support in the analysis of computer data storage overtaken during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.</span></span></span></p> |
first_indexed | 2024-12-10T08:06:28Z |
format | Article |
id | doaj.art-5a81ed437aea403d9f1f3a1bef1d58cc |
institution | Directory Open Access Journal |
issn | 1558-7215 1558-7223 |
language | English |
last_indexed | 2024-12-10T08:06:28Z |
publishDate | 2010-03-01 |
publisher | Association of Digital Forensics, Security and Law |
record_format | Article |
series | Journal of Digital Forensics, Security and Law |
spelling | doaj.art-5a81ed437aea403d9f1f3a1bef1d58cc2022-12-22T01:56:39ZengAssociation of Digital Forensics, Security and LawJournal of Digital Forensics, Security and Law1558-72151558-72232010-03-015149621Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data StorageAleksander Byrski0Wojciech Stryjewski1Bartłomiej Czechowicz2AGH University of Science and Technology, Krakow, PolandAGH University of Science and Technology, Krakow, PolandAGH University of Science and Technology, Krakow, Poland<p class="MsoNormal" style="margin: 0cm 0cm 0pt; line-height: 200%;"><span style="mso-ansi-language: EN-US;" lang="EN-US"><span style="font-size: small;"><span style="font-family: Times New Roman;">Based on existing software aimed at investigation support in the analysis of computer data storage overtaken during investigation (PyFlag), an extension is proposed involving the introduction of dedicated components for data identification and filtering. Hash codes for popular software contained in NIST/NSRL database are considered in order to avoid unwanted files while searching and to classify them into several categories. The extension allows for further analysis, e.g. using artificial intelligence methods. The considerations are illustrated by the overview of the system's design.</span></span></span></p>http://ojs.jdfsl.org/index.php/jdfsl/article/view/1 |
spellingShingle | Aleksander Byrski Wojciech Stryjewski Bartłomiej Czechowicz Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage Journal of Digital Forensics, Security and Law |
title | Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage |
title_full | Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage |
title_fullStr | Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage |
title_full_unstemmed | Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage |
title_short | Adaptation of PyFlag to Efficient Analysis of Overtaken Computer Data Storage |
title_sort | adaptation of pyflag to efficient analysis of overtaken computer data storage |
url | http://ojs.jdfsl.org/index.php/jdfsl/article/view/1 |
work_keys_str_mv | AT aleksanderbyrski adaptationofpyflagtoefficientanalysisofovertakencomputerdatastorage AT wojciechstryjewski adaptationofpyflagtoefficientanalysisofovertakencomputerdatastorage AT bartaomiejczechowicz adaptationofpyflagtoefficientanalysisofovertakencomputerdatastorage |